{"title":"Wireless Bonding for Maximizing Throughput in Multi-Radio Mesh Networks","authors":"Sung-Ho Kim, Young-Bae Ko","doi":"10.1109/PERCOMW.2007.126","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.126","url":null,"abstract":"To enhance the per node throughput, mesh nodes in wireless mesh networks can be equipped with multiple network interfaces (NIC). In this paper, we propose a new multi-interface equipped architecture, named \"wireless bonding (WBond)\", which enables each node to fully utilize all its available interfaces, resulting in increased throughput. The proposed WBond provides a method for exposing a single virtual interface by bonding multiple NICs. When a node needs to transfer a packet, WBond selects one among the multiple interfaces depending upon the channel quality assigned to each interface. A novel method for measuring channel quality, called as \"ChanQual\", is presented and used by the WBond with high accuracy and no additional overhead. Comparison studies using ns-2 simulations show that our WBond scheme can achieve the most reliable and highest performance (i.e., network throughput) compared to traditional multi-interface architectures","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127420233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Carrier-Assisted Routing in Mobile Networks","authors":"Jie Wu","doi":"10.1109/PERCOMW.2007.41","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.41","url":null,"abstract":"We propose to use node mobility to enhance routing capability in a mobile network. A dual-control planes model is presented, which includes the traditional S(stationary)-plane for message routing among stationary nodes using connection-based message routing. In addition, we introduce a new control plane, M(mobile)-plane, for trajectory control of mobile nodes. A message routing consists of a sequence of control plane switches, alternating between store-and-forward in the S-plane and store-carry-forward in the M-plane. Intra-plane and inter-plane communication is performed through contacts. In the M-plane, unlike most existing works that focus on two extremes of spectrums (random movement and tightly controlled movement), our approach focuses on loosely-controlled movement of mobile nodes to assist message routing in a store-carry-forward paradigm. The challenge lies in adapting the degree of control to support a certain degree of flexibility, such as using dynamic node trajectory to maximize route sharing to minimize the number of carriers, while ensuring some desirable global properties, such as short average-moving-distance and a small number of relays to increase network capacity","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129895301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NFC on Mobile Phones: Issues, Lessons and Future Research","authors":"V. Kostakos, E. O'Neill","doi":"10.1109/PERCOMW.2007.84","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.84","url":null,"abstract":"In this paper we discuss some issues arising from our implementation and evaluation of two systems that enable mobile phone users to identify common address book contacts. These systems were implemented using Bluetooth and NFC. Here we discuss development and deployment issues, users' perceptions and preferences, and suggest promising future research directions","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129840053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A User Interaction Model for NFC Enabled Applications","authors":"Yaw Anokwa, G. Borriello, T. Pering, R. Want","doi":"10.1109/PERCOMW.2007.18","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.18","url":null,"abstract":"Near field communication (NFC) is a short-range wireless protocol that allows users to connect devices and access content and services by simply holding enabled devices near each other. This paper introduces a user interaction model for NFC enabled applications. Our model specifies that enabled devices take on the properties and context of the objects required in the interaction. This transformation leverages the existing knowledge users have about certain objects and thus can support a number of different applications tied together with simple, intuitive and repeatable interactions. In this paper, we present an overview of the model and the system we have implemented to enable evaluation. We also detail some research challenges we are pursuing","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126400809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Leonardo B. Oliveira, R. Dahab, Julio López Hernandez, Felipe Daguano, A. Loureiro
{"title":"Identity-Based Encryption for Sensor Networks","authors":"Leonardo B. Oliveira, R. Dahab, Julio López Hernandez, Felipe Daguano, A. Loureiro","doi":"10.1109/PERCOMW.2007.56","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.56","url":null,"abstract":"In spite of several years of intense research, the area of security and cryptography in wireless sensor networks (WSNs) still has a number of open problems. On the other hand, the advent of identity-based encryption (IBE) has enabled a wide range of new cryptographic solutions. In this work, we argue that IBE is ideal for WSNs and vice versa. We discuss the synergy between the systems, describe how IBE can solve the key agreement problem in WSNs, and present some estimates of performance","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115452064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"'That's my PDA!' The Role of Personalization for Handhelds in the Classroom","authors":"L. Mifsud, A. Mørch","doi":"10.1109/PERCOMW.2007.1","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.1","url":null,"abstract":"In this paper we describe primary school students' use and personalization of handheld devices (PDAs). The paper reports on a case study in a 6th and 7th grade classroom in Norway. The findings revealed that personalization is an important component in many educational activities and that it can lead to more motivated use. This included customizing the user interface and the organization of folders. We draw on Vygotskian socio-cultural approach to analyze our findings","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115477789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Voice Quality Guaranteed Service over Best-Effort IP Network for Pervasive Environments","authors":"Jinsul Kim, Hyun-Woo Lee, Won Ryu, B. Lee","doi":"10.1109/PERCOMW.2007.124","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.124","url":null,"abstract":"Pervasive computing with voice application service must be providing unprecedented levels of technology in order to adapt the continually changed computing resources in ubiquitous environment. A number of conditions differ from the speech signal over IP network with heterogeneous devices while voice traffic is transported by packet-based in ubiquitous environment. In this paper, voice signals in packet loss and noise is controlled for the guaranteed quality of service (QoS) on the IP network which are responsible for digitizing, encoding, decoding, and playing out the speech signal. We implement the algorithms of packet loss concealment (PLC) and noise reduction, which is called PEA (pervasive environment adaptation)-PLC, PEA-noise reduction together, for providing high quality voice-based pervasive computing services. The proposed PEA-PLC algorithms are applied as post-processing after decoding on devices, and then PEA-noise reduction method is applied as pre-processing before speech coding. The proposed PEA-algorithms for packet loss and noise are applied in G.729A codec optimally using mobile-softphone and a 1-port gateway PSTN phone system. The performances of the proposed methods are evaluated by the PESQ measurement in various packet loss and noisy conditions","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132414829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"When the Sensors Hit the Roads (Invited Talk)","authors":"H. Balakrishnan","doi":"10.1109/PERCOMW.2007.125","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.125","url":null,"abstract":"Summary form only given. Over the past few years, impressive advances in wireless networking and embedded computing have led to the \"first generation\" of wireless sensor networks. In general, these are used for monitoring or tracking applications characterized by low data rates and static deployments. In this talk, I will motivate what the \"second generation\" might look like, focusing on mobile sensor networks gathering heterogeneous \"media-rich\" data. These networks offer the opportunity to sense the world at much higher scale and finer fidelity than their static counterparts, especially over large areas. With hundreds of millions of automobiles and over a billion cell phone-equipped people in the world, cars and humans may turn out to be the vehicles of the world's largest and most dynamic sensor networks in the coming years. This talk will discuss several network architecture challenges in realizing this vision. Meeting these challenges will give us a network architecture that can support a wide range of vehicular network applications, far beyond the area of mobile sensor networks","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131557931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supporting Pluggable Configuration Algorithms in PCOM","authors":"M. Handte, K. Herrmann, Gregor Schiele, C. Becker","doi":"10.1109/PERCOMW.2007.111","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.111","url":null,"abstract":"Pervasive computing envisions distributed applications that optimally leverage the resources present in their ever-changing execution environment. To ease the development of pervasive applications, we have created a pervasive component system (PCOM). PCOM automates the configuration and runtime adaptation of a component-based application using a built-in distributed configuration algorithm. In this paper, we present an architectural extension that allows switching between different algorithms. This enables PCOM to dynamically select an algorithm that suits the computational resources present in an environment. To validate the extended architecture, we compare the overheads of a distributed and a centralized configuration algorithm in two different environments","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130737701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed, Uncertainty-Aware Access Control for Pervasive Computing","authors":"U. Hengartner, Ge Zhong","doi":"10.1109/PERCOMW.2007.39","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.39","url":null,"abstract":"Access control to sensitive resources in pervasive computing needs to take uncertainty into account. Previous research has developed uncertainty-aware access-control models for environments that are managed by a centralized administrator. We demonstrate that environments managed in a distributed way require a more powerful model. Furthermore, we point out additional challenges that need to be considered when deploying uncertainty-aware access control, namely, identifying and authenticating both people and their intended actions, associating uncertainty with time, providing monotonicity, and defending against Sybil attacks. We present an access-control model that addresses these challenges and discuss a sample implementation","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130960708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}