Georgios Kontaxis, Iasonas Polakis, S. Ioannidis, E. Markatos
{"title":"Detecting social network profile cloning","authors":"Georgios Kontaxis, Iasonas Polakis, S. Ioannidis, E. Markatos","doi":"10.1109/PERCOMW.2011.5766886","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766886","url":null,"abstract":"Social networking is one of the most popular Internet activities, with millions of users from around the world. The time spent on sites like Facebook or LinkedIn is constantly increasing at an impressive rate. At the same time, users populate their online profile with a plethora of information that aims at providing a complete and accurate representation of themselves. Attackers may duplicate a user's online presence in the same or across different social networks and, therefore, fool other users into forming trusting social relations with the fake profile. By abusing that implicit trust transferred from the concept of relations in the physical world, they can launch phishing attacks, harvest sensitive user information, or cause unfavorable repercussions to the legitimate profile's owner. In this paper we propose a methodology for detecting social network profile cloning. We present the architectural design and implementation details of a prototype system that can be employed by users to investigate whether they have fallen victims to such an attack. Our experimental results from the use of this prototype system prove its efficiency and also demonstrate its simplicity in terms of deployment by everyday users. Finally, we present the findings from a short study in terms of profile information exposed by social network users.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129823221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Daniele Riboni, L. Pareschi, Laura Radaelli, C. Bettini
{"title":"Is ontology-based activity recognition really effective?","authors":"Daniele Riboni, L. Pareschi, Laura Radaelli, C. Bettini","doi":"10.1109/PERCOMW.2011.5766927","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766927","url":null,"abstract":"While most activity recognition systems rely on data-driven approaches, the use of knowledge-driven techniques is gaining increasing interest. Research in this field has mainly concentrated on the use of ontologies to specify the semantics of activities, and ontological reasoning to recognize them based on context information. However, at the time of writing, the experimental evaluation of these techniques is limited to computational aspects; their actual effectiveness is still unknown. As a first step to fill this gap, in this paper, we experimentally evaluate the effectiveness of the ontological approach, using an activity dataset collected in a smart-home setting. Preliminary results suggest that existing ontological techniques underperform data-driven ones, mainly because they lack support for reasoning with temporal information. Indeed, we show that, when ontological techniques are extended with even simple forms of temporal reasoning, their effectiveness is comparable to the one of a state-of-the-art technique based on Hidden Markov Models. Then, we indicate possible research directions to further improve the effectiveness of ontology-based activity recognition through temporal reasoning.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124675068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decoupling context-aware services","authors":"S. Debois, A. Glenstrup, Francesco Zanitti","doi":"10.1109/PERCOMW.2011.5766932","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766932","url":null,"abstract":"We present a novel software architecture for context-aware applications based on a distributed, non-monolithic, simple and extensible relational model for representing context; a service-oriented architecture for computing these relations in a decoupled, flexible fashion; and with data driven, event based communication providing the kind of fine grained dynamic service composition required in mobile and volatile environments. A prototype implementation is running a Bluetooth-sensor-based active map of users at our home university.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121781545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User-centric service selection, integration and management through daily events","authors":"Zhenzhen Zhao, N. Laga, N. Crespi","doi":"10.1109/PERCOMW.2011.5766979","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766979","url":null,"abstract":"This paper presents an end-to-end framework to manage user-centric services through daily events. In contrast to existing service discovery, selection and composition approaches, the proposed framework addresses the management issue from a new perspective by firstly learning end-user's intent through daily events, while recommending relevant functionalities to the user; and then enabling the user to select the services offering the required functionalities based on their own selection rules. An event hierarchy and a selection model are proposed respectively to retrieve relevant functional requirements and specify the service selection rules in response to the user's non-functional requirements. The context-oriented system framework for functionality discovery, user-centric service selection and intuitive service composition, is also presented in detail. Finally, an event based service selection and integration system is introduced as a proof-of-concept of the proposed approach.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127758277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web-based real-time remote monitoring for pervasive healthcare","authors":"Bingchuan Yuan, J. Herbert","doi":"10.1109/PERCOMW.2011.5766964","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766964","url":null,"abstract":"The goal of the CARA (Context-Aware Real-time Assistant) healthcare architecture is to enable improved healthcare through the intelligent use of wireless remote monitoring of patient vital signs, supplemented by rich contextual information. One of its applications currently being deployed is the remote live monitoring of a patient by a healthcare professional. The vital signs are monitored using a wireless BAN based on sensors that can monitor position in space, ECG, blood pressure, and blood oxygenation. A design goal of ubiquitous access means that all communications are performed using recent web technologies, thereby minimizing issues with firewalls and facilitating remote ease of access. The only tool required for this application is a web browser with the commonly-available Adobe Flash plug-in installed. Thus remote monitoring, independent of geographic location, is possible form any computer or suitable smartphone. Important aspects of this application include: inter-visibility between patient and caregiver; real-time interactive medical consultation; and replay, review and annotation of the remote consultation by the medical professional. The annotation of significant parts of the multi-modal monitored signals by the medical professional provides the basis for the automated intelligent analysis of the CARA system. The paper discusses the application in the context of the overall CARA healthcare architecture, and presents results of some experiments using the application.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115423673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Gutiérrez, I. Nikolaidis, Eleni Stroulia, Sean Gouglas, Geoffrey Rockwell, Patricia M. Boechler, Mike Carbonaro, S. King
{"title":"fAR-PLAY: A framework to develop Augmented/Alternate Reality Games","authors":"L. Gutiérrez, I. Nikolaidis, Eleni Stroulia, Sean Gouglas, Geoffrey Rockwell, Patricia M. Boechler, Mike Carbonaro, S. King","doi":"10.1109/PERCOMW.2011.5766947","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766947","url":null,"abstract":"Augmented/Alternate Reality Games are a relatively new, yet increasingly interesting, class of social applications. These games are fundamentally intertwined with the players' real life, in that the players' everyday activities generate events that advance the game logic. At the same time, they augment the players' “regular” activities with game-related tasks and challenges and with rich digital content that is communicated to the players through a variety of devices, usually augmenting their mobile-device views. In our work, we have been developing a software framework, fAR-Play, to support the development of educational AARG games, in the treasure-hunt style, using space as the context for communicating information. Our toolkit extends the stereotypical notion of AARGs to include a virtual world in which the players can also interact and play. Our toolkit has been evaluated through (and has evolved based on our experience with) the development of several specific games.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128661744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Challenges in securing the interface between the cloud and pervasive systems","authors":"Brent Lagesse","doi":"10.1109/percomw.2011.5766850","DOIUrl":"https://doi.org/10.1109/percomw.2011.5766850","url":null,"abstract":"Cloud computing presents an opportunity for pervasive systems to leverage computational and storage resources to accomplish tasks that would not normally be possible on such resource-constrained devices. Cloud computing can enable hardware designers to build lighter systems that last longer and are more mobile. Despite the advantages cloud computing offers to the designers of pervasive systems, there are some limitations of leveraging cloud computing that must be addressed. We take the position that cloud-based pervasive system must be secured holistically and discuss ways this might be accomplished. In this paper, we discuss a pervasive system utilizing cloud computing resources and issues that must be addressed in such a system. In this system, the user's mobile device cannot always have network access to leverage resources from the cloud, so it must make intelligent decisions about what data should be stored locally and what processes should be run locally. As a result of these decisions, the user becomes vulnerable to attacks while interfacing with the pervasive system.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123522348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Demystifying privacy in sensory data: A QoI based approach","authors":"Supriyo Chakraborty, Haksoo Choi, M. Srivastava","doi":"10.1109/PERCOMW.2011.5766914","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766914","url":null,"abstract":"There is a growing consensus regarding the emergence of privacy concerns as a major deterrent towards the widespread adoption of emerging technologies such as mobile healthcare, participatory sensing and other social network based applications. In this paper, we motivate the need for privacy awareness, present a taxonomy of the privacy problems, and the various existing solutions. We highlight the tension that exists between quality of service at the receiver and the privacy requirement at the source and present a linear program formalization to model the tradeoff between the two objectives. We further present the design and architecture of SensorSafe, a framework which allows privacy-aware sharing of sensory information.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117339988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Apostolos Papageorgiou, André Miede, D. Schuller, Stefan Schulte, R. Steinmetz
{"title":"Always Best Served: On the behaviour of QoS- and QoE-based algorithms for Web service adaptation","authors":"Apostolos Papageorgiou, André Miede, D. Schuller, Stefan Schulte, R. Steinmetz","doi":"10.1109/PERCOMW.2011.5766975","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766975","url":null,"abstract":"One of the primary issues in pervasive computing is the adaptation of the communication to the needs of limited devices. Web services are one of the technologies that present both big challenges and big potentials when it comes to their adapted usage in pervasive systems, because they carry communication overhead in order to support interoperability and platform-independence through self-description. In this paper it is explained how Web service communication can be adapted for limited devices and why it is important to choose intelligently among a variety of adaptation mechanisms, based on the system context. Further, two algorithms (one Quality of Service-based and one Quality of Experience-based) for the decision support of the mentioned problem are provided in order to measure and discuss the impact that the peculiarities of the problem have on their behaviour.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131755213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Papaoulakis, C. Patrikakis, Chryssanthi Stefanoudaki, Platon Sipsas, A. Voulodimos
{"title":"Load balancing through terminal based dynamic AP reselection for QoS in IEEE 802.11 networks","authors":"N. Papaoulakis, C. Patrikakis, Chryssanthi Stefanoudaki, Platon Sipsas, A. Voulodimos","doi":"10.1109/PERCOMW.2011.5766960","DOIUrl":"https://doi.org/10.1109/PERCOMW.2011.5766960","url":null,"abstract":"In this paper, a mechanism for supporting Quality of Service in wireless networks through the dynamic reselection of Access Points (APs) according to a terminal based load balancing scheme is presented. The mechanism is analyzed, and a corresponding implementation on laptops is presented, while evaluation through both simulation and actual field trials are included. Implementation refers to both Linux and MS OS systems. For the evaluation of the mechanism in the field trials, a very demanding streaming video scenario is selected, and the results are assessed with respect to the improvements that can be introduced in the end user Quality of Experience, even over state of the art streaming adaptation solutions.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"375 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132808239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}