{"title":"Defining Strong Privacy for RFID","authors":"A. Juels, Stephen A. Weis","doi":"10.1145/1609956.1609963","DOIUrl":"https://doi.org/10.1145/1609956.1609963","url":null,"abstract":"In this work, we consider privacy in radio frequency identification (RFID) systems. Our contribution is twofold: (1) we propose a simple, formal definition of strong privacy useful for basic analysis of RFID systems, as well as a different (weaker) definition applicable to multi-verifier systems; and (2) we apply our definition to reveal vulnerabilities in proposed privacy-enhancing RFID protocols. This paper is a highly abbreviated version of Juels, A et al, (2005)","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132448823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Social Group-Aware and Tunnel-Based Scatternet Formation Scheme","authors":"Myeong-A Yang, Y. Ko, Dongman Lee","doi":"10.1109/PERCOMW.2007.12","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.12","url":null,"abstract":"Bluetooth is a major technology for short range wireless communication. Scatternets expand its use to larger networks. If communication patterns are known before scatternet formation, frequently communicating pairs could be connected directly or with fewer hops to enhance performance. Communication patterns are obtainable by observing traffic, but this approach is ineffective in a pervasive computing environment where interactions are mostly spontaneous. We propose to use social group membership as an estimate of communication patterns. The proposed scatternet formation scheme forms a scatternet per a social group and then connects scatternets through tunnels. In order to ensure that each communicating pair has a reasonable share of bandwidth, the proposed scheme considers the number of hops and branches and traffic distribution when interconnecting scatternets. Simulation results show that the proposed scheme not only enhances the total throughput of scatternets but also shares network capacity more fairly among communicating pairs","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131795826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Context-Sensitive Service Discovery Meets Information Retrieval","authors":"J. Kuck, Melanie Gnasa","doi":"10.1109/PERCOMW.2007.32","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.32","url":null,"abstract":"With the emergence of mobile devices, Web services are made available for users in nearly all situations of every day life. While the WWW offers a multitude of Web services there is a lack of search engines which support the users in finding adequate services out of the bulk of available Web services. Within this paper, we will introduce a context-sensitive approach for effective Web service discovery. As a huge amount of context information could be gathered by the use of mobile devices, this approach is especially directed towards users of these mobile devices. Examples for context information are the actual visited place, the actual temperature, the recent illumination, etc. Also communities of users who share common contexts, interests and service needs arise. While existing systems for Web service discovery generally do not consider context and community information of their users, we will focus on these topics, taking advantage of an novel adaption of information retrieval techniques","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"47 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134329251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Sensor Sampling and Quality of Information: A Starting Point","authors":"C. Bisdikian","doi":"10.1109/PERCOMW.2007.88","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.88","url":null,"abstract":"Many sensor-based applications (re)act following the detection of certain events of interest. Hence, the effectiveness of these applications depends on the quality of the information (QoI) provided by their sensor-based event detectors. In this paper, we derive relationships between the QoI attributes of timeliness and confidence and the operational characteristics of sensor systems and the events they detect. By building upon the Neyman-Pearson hypothesis testing procedure, we study the dependence of these characteristics and attributes on each other and establish their theoretical performance boundaries","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132389129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Peer-to-Peer Network","authors":"Hovhannes A. Harutyunyan, Junlei He","doi":"10.1109/PERCOMW.2007.9","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.9","url":null,"abstract":"In this paper we propose a new peer-to-peer network based on Knodel graphs Wd,n of even order n and degree d, where 1 les d les lfloorlog2nrfloor. We then present routing algorithms in the P2P network based on the Knodel graph. The algorithm takes advantage of the routing heuristics in the Knodel graph and reduces the routing length of the P2P network by half. This P2P network can be configured flexibly to be based on the partial Knodel graph, where each peer is connected to the selected dimensions, thus decrease the size of the routing table with trading off the routing length. The applications may choose the configuration according to the computing ability of the peers and other requirements","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130774715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ontology-Based Pervasive Spatial Knowledge for Car Driver Assistance","authors":"M. Tönnis, G. Klinker, Jan-Gregor Fischer","doi":"10.1109/PERCOMW.2007.90","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.90","url":null,"abstract":"Deducing spatial knowledge for car driver assistance is of special importance for upcoming advanced driver assistance systems. Such systems can not only rely on car mounted sensors, but also require environmental tracking. We illustrate our approach of a distributed ad-hoc infrastructure that collects and disseminates tracking data of environmental objects and thus allows for vehicle- and ontology-based reasoning. We discuss, where such a system can facilitate in driver assistance systems, that require spatial knowledge","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122270721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dual Ownership: Access Management for Shared Item Information in RFID-enabled Supply Chains","authors":"A. Ilic, F. Michahelles, E. Fleisch","doi":"10.1109/PERCOMW.2007.40","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.40","url":null,"abstract":"RFID tags combined with globally unique numbering schemes such as the electronic product code (EPC) help standardizing the communication along the supply chain. Participants generate and share item information to collectively build digital lifecycle records. Yet, the challenge of efficient access management for item-level information still remains open. This paper introduces a novel concept for data access management, called dual ownership. The model grants access control to parties that can prove the physical possession of an item. RFID technology hereby tracks the transitions of physical possession to translate them to data access permissions. This paper describes the concept of dual ownership and discusses its implications","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117125834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andrés Marín López, W. Müller, R. Schaefer, F. Almenárez, Daniel Díaz Sánchez, Max Ziegler
{"title":"Middleware for Secure Home Access and Control","authors":"Andrés Marín López, W. Müller, R. Schaefer, F. Almenárez, Daniel Díaz Sánchez, Max Ziegler","doi":"10.1109/PERCOMW.2007.80","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.80","url":null,"abstract":"User adaptive systems in the context of pervasive computing can only unveil their power if based on a generic middleware managing private data and context information in combination with flexible device access and control. However, managing those data poses severe privacy problems both legally and from a trust perspective. Therefore we propose a home automation middleware for secure management of user and context data that gives access to services just for the authorized users and devices. The middleware has been successfully tested at the ambient computing (AC-LAB) at the University of Paderborn","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"452 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124295938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Korakis, Zhifeng Tao, Yevgeniy B. Slutskiy, S. Panwar
{"title":"A Cooperative MAC Protocol for Ad Hoc Wireless Networks","authors":"T. Korakis, Zhifeng Tao, Yevgeniy B. Slutskiy, S. Panwar","doi":"10.1109/PERCOMW.2007.5","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.5","url":null,"abstract":"Cooperative communications fully leverages the broadcast nature of the wireless channel and spatial diversity, thereby achieving tremendous improvements in system capacity and delay. By enabling additional collaboration from stations that otherwise will not directly participate in the transmission, cooperative communications ushers in a new design paradigm for wireless communications. In this paper, we extend a cooperative MAC protocol called CoopMAC into the ad hoc network environment. The new protocol is based on the idea of involving in an ongoing communication an intermediate station that is located between the transmitter and the receiver. The intermediate station acts as a helper and forwards to the destination the traffic it receives from the source. Thus, a slow one-hop transmission is transformed into a faster two-hop transmission, thereby decreasing the transmission time for the traffic being handled. Extensive simulations in a large scale wireless ad-hoc network (150 stations) show that CoopMAC significantly improves the ad hoc network performance in terms of throughput and delay, and indicate how such cooperative schemes can boost the performance of traditional solutions (e.g., IEEE 802.11)","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124775277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The XVC Framework for In-Vehicle User Interfaces","authors":"Jonathan P. Munson, Y. Tak","doi":"10.1109/PERCOMW.2007.116","DOIUrl":"https://doi.org/10.1109/PERCOMW.2007.116","url":null,"abstract":"XVC (extensible viewer composition) is an in-vehicle user interface framework for telematics applications. It provides a document-oriented applications model that eliminates the requirement for application providers to provide custom clients for their applications. Application providers compose interactive user interfaces through compound documents that specify content for a set of viewers, each oriented to a particular content medium. A viewer's content may define actions on other viewers. This approach offers the additional benefit of offering a higher-level model to application developers, hence reducing application development costs. Our current set of viewers is oriented toward the domain of telematics applications, and includes viewers for map features, HTML-based messages, sound clips, and ticker messages. The framework is extensible to other application domains through the definition of new, domain-appropriate viewers","PeriodicalId":352348,"journal":{"name":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131163453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}