2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)最新文献

筛选
英文 中文
More Than Old Wine in New Bottles: A Secure Live Virtual Machine Job Migration Framework for Cloud Systems Integrity 新瓶装旧酒:云系统完整性的安全实时虚拟机作业迁移框架
Hanif Deylami, Jairo Gutiérrez, R. Sinha
{"title":"More Than Old Wine in New Bottles: A Secure Live Virtual Machine Job Migration Framework for Cloud Systems Integrity","authors":"Hanif Deylami, Jairo Gutiérrez, R. Sinha","doi":"10.23919/ICMU.2018.8653611","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653611","url":null,"abstract":"Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing information technology services over the Internet. However, cloud computing presents an added level of risk because essential services are often outsourced to a third party, which makes it harder to maintain data security and privacy, support data and service availability, and demonstrate compliance.While existing cloud computing threat detection and prevention techniques are improving, they are still not effective enough to meet the needs of next-generation systems, such as secure dynamic resource pools, high usability, and secure virtual machine migration. This paper aims to provide an understanding of the different potential attack vectors created by virtualization in a public Infrastructure-as-a-Service cloud, in particular, the security associated with the live virtual machine migration of jobs. The vectors will be investigated, concentrating on the threats emerging from various potential attackers (internal/external) to cloud systems. The overarching aim of this study, therefore, is to design and develop a secure live virtual machine migration framework that enables a virtual trusted platform module for multiple virtual machines running on a hardware platform while maintaining the cloud system’s integrity.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121933412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Development of Secure Safety Confirmation System Using Virtual Private Cloud 基于虚拟私有云的安全确认系统开发
M. Nagata, Yusuke Abe, Nobuyuki Takanashi, M. Fukui, Kunihiro Yamazaki, Takahiro Hasegawa
{"title":"Development of Secure Safety Confirmation System Using Virtual Private Cloud","authors":"M. Nagata, Yusuke Abe, Nobuyuki Takanashi, M. Fukui, Kunihiro Yamazaki, Takahiro Hasegawa","doi":"10.23919/ICMU.2018.8653589","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653589","url":null,"abstract":"A safety confirmation system is a system intended to enable users to share information about the extent of damage in the event of a disaster. In recent years, these systems have generally been implemented as a Web system using cloud computing. The configuration used for the safety confirmation system included a Web server and DB server, amongst others, and these resources can be easily procured by cloud computing. In addition, implementation in the cloud has many merits such as a shortened development period and accelerated service start time. However, cloud computing is a system on the Internet; thus, there is concern about the risk of illegal access from the outside and information leakage. The safety confirmation system requires a secure system infrastructure in which to store attribute information and users’ personal information. Therefore, a cloud-based safety confirmation system would need to be convenient to use and secure. In this paper, we propose to improve the safety by constructing the safety confirmation system in a virtual private cloud environment. The evaluation of the system showed that it was possible to prevent external illegal access and information leakage and to operate the safety confirmation system such that it was highly convenient to use.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127112847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Transmit Power and Carrier Sense Control for Massive Machine-to-Machine Communication in Wireless Ultra-dense Networks 无线超密集网络中大规模机对机通信的发射功率和载波感知控制
Yu Yu, Yuto Lim, Yasuo Tan
{"title":"Transmit Power and Carrier Sense Control for Massive Machine-to-Machine Communication in Wireless Ultra-dense Networks","authors":"Yu Yu, Yuto Lim, Yasuo Tan","doi":"10.23919/ICMU.2018.8653615","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653615","url":null,"abstract":"Besides the traditional voice and data services, 5G is expected to support new communication paradigm, i.e., Internet of Things (IoT) and Machine-to-Machine (M2M) services. Nonetheless, the system designs of transmit power control (TPC) and carrier sense threshold (CST) will be crucial when the huge number of these user equipment (UE) are densely engaged in vast number of data traffic transmissions. One practical and effective approach is to study the system design through numerical simulation. In this paper, we formalize the problem of minimizing the energy consumption and maximizing the average end-to-end throughput of massive M2M communication by optimally using a proposed consensus TPC scheme. To validate the effectiveness of our proposed scheme, we also focus the impact of the CST on the trade-off in between UE experienced data rate and network energy efficiency.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129948313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Congestion Control for Handover in Heterogeneous Mobile Content-Centric Networking 异构移动内容中心网络中切换的自适应拥塞控制
Daiki Iwamoto, Daisuke Sugahara, M. Bandai, M. Yamamoto
{"title":"Adaptive Congestion Control for Handover in Heterogeneous Mobile Content-Centric Networking","authors":"Daiki Iwamoto, Daisuke Sugahara, M. Bandai, M. Yamamoto","doi":"10.23919/ICMU.2018.8653625","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653625","url":null,"abstract":"CCN (Content-Centric Networking) is receiver-driven architecture whose communication is triggered by consumer requests. When a consumer changes its access point (handover), it cannot receive requested Data packets. However, the consumer can retransmit in-flight Interest packets to a new route and reconstruct its route to obtain corresponding Data packets. Each consumer has its own parameters for congestion control, e.g. congestion window size, congestion threshold and timeout value. In the case of a handover to a heterogeneous network, e.g. from LTE to Wi-Fi, when congestion parameters set just before the handover are carried over, they probably are inadequate for new network environments. In this paper, we propose an effective receiver-driven control, Congestion Parameter Initialization. Our policy is quite simple and a consumer initializes its congestion parameters just after the handover. Our simulation results show that our proposal can adapt its congestion parameters to new network environment quickly.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129989346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fall Detection Using Smartphones to Enhance Safety and Security of Older Adults at Home 使用智能手机进行跌倒检测以增强老年人在家中的安全和保障
H. Nguyen, F. Zhou, Farhaan Mirza, M. Naeem
{"title":"Fall Detection Using Smartphones to Enhance Safety and Security of Older Adults at Home","authors":"H. Nguyen, F. Zhou, Farhaan Mirza, M. Naeem","doi":"10.23919/ICMU.2018.8653613","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653613","url":null,"abstract":"Falling is a global common health problem among older adults which causes minor to serious injuries such as fracture or even death. In recent years, many falls detection systems have been developed to support early detection and timely care to eliminate grave consequences. This research evaluates the potential of using smartphones for fall detection. In this research, two smartphones were used to collect acceleration data. Threshold approaches were applied on the collected data to detect potential falls. Evaluation results show that with proper chosen thresholds, the tested fall detection algorithm performs well with both sensitivity and specificity.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"358 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134503089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Hybrid Access Network Integrated with Radio-over-Fiber and Passive Optical Network 光纤上无线电和无源光网络的混合接入网
Liwei Yang, Junning Zhang, Wenjie Zhang
{"title":"Hybrid Access Network Integrated with Radio-over-Fiber and Passive Optical Network","authors":"Liwei Yang, Junning Zhang, Wenjie Zhang","doi":"10.23919/ICMU.2018.8653623","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653623","url":null,"abstract":"A RoF system based on the OCS modulation for WDM-PON is presented and experimentally evaluated as a solution for next generation broadband access networks. 20-GHz subcarrier system over 25 km transmission is established and verified. Suppressing the optical carrier enables the baseband signals and radio frequency (RF) signals to be detected by photodiode. Experimental results demonstrate BER of 10-4 at the received Rx 3.25dBm with the link length of about 25km. A technique for source-less upstream transmission is also experimentally demonstrated, as downstream transmission channels can transfer the baseband signals and RF signals simultaneously.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126987140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Interactive Video CAPTCHA for Better Resistance to Automated Attack 交互式视频验证码,更好地抵抗自动攻击
Shotaro Usuzaki, K. Aburada, H. Yamaba, T. Katayama, M. Mukunoki, Mirang Park, N. Okazaki
{"title":"Interactive Video CAPTCHA for Better Resistance to Automated Attack","authors":"Shotaro Usuzaki, K. Aburada, H. Yamaba, T. Katayama, M. Mukunoki, Mirang Park, N. Okazaki","doi":"10.23919/ICMU.2018.8653624","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653624","url":null,"abstract":"A “Completely Automated Public Turing Test to Tell Computers and Humans Apart” (CAPTCHA) widely used online services so that prevents bots from automatic getting a large of accounts. Interactive video type CAPTCHAs that attempt to detect this attack by using delay time due to communication relays have been proposed. However, these approaches remain insufficiently resistant to bots. We propose a CAPTCHA that combines resistant to automated and relay attacks. In our CAPTCHA, the users recognize a moving object (target object) from among a number of randomly appearing decoy objects and tracks the target with mouse cursor. The users pass the test when they were able to track the target for a certain time. Since the target object moves quickly, the delay makes it difficult for a remote solver to break the CAPTCHA during a relay attack. It is also difficult for a bot to track the target using image processing because it has same looks of the decoys. We evaluated our CAPTCHA’s resistance to relay and automated attacks. Our results show that, if our CAPTHCA’s parameters are set suitable value, a relay attack cannot be established economically and false acceptance rate with bot could be reduced to 0.01% without affecting human success rate.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128275229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Sidewalk-level People Flow Estimation Using Dashboard Cameras Based on Deep Learning 基于深度学习的仪表盘摄像头行人流量估计
Yusuke Hara, A. Uchiyama, T. Umedu, T. Higashino
{"title":"Sidewalk-level People Flow Estimation Using Dashboard Cameras Based on Deep Learning","authors":"Yusuke Hara, A. Uchiyama, T. Umedu, T. Higashino","doi":"10.23919/ICMU.2018.8653595","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653595","url":null,"abstract":"In future smart cities, understanding people flow is essential for a wide variety of applications such as urban planning and event detection. In this paper, we propose a method to estimate low of pedestrians walking on the sidewalks. Our goal is to achieve high accuracy with wide area coverage at low cost. For this purpose, we use dashboard cameras (dashcams) recently wide-spreading for providing evidence on accidents, etc.Our method combines Deep Learning-based pedestrian detection and model-based tracking to overcome the challenges of frequent occlusion (overlaps of objects in images) and false positives. In pedestrian detection, faces and backs of heads are separately detected to understand moving directions of pedestrians as well as their existence by applying CNN (Convolutional Neural Networks) and LSTM (Long-Short-Term-Memory). Then, the trajectories of the detected bounding boxes are estimated based on location and color similarities with the knowledge about moving speeds of vehicles and pedestrians.Through the evaluation using real dashcam videos, we have confirmed that our method works well, showing within ±13.6% mean absolute error rate of bi-directional people low estimation.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130140130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Garbage Collections Delays on Java GUIs Java gui上的垃圾收集延迟
Panagiotis Patros, Michael H. Dawson, K. Kent
{"title":"Garbage Collections Delays on Java GUIs","authors":"Panagiotis Patros, Michael H. Dawson, K. Kent","doi":"10.23919/ICMU.2018.8653592","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653592","url":null,"abstract":"Tablets, smartphones, wearables, etc. project a (usually graphical) interface to their human users that offloads the majority of the computation to a cloud/fog system. Graphical User Interface (GUI) applications are frequently written in high-level programming languages, which provide automatic memory management: placement and deletion of memory objects is not performed manually; instead, an underlying software component called a Garbage Collector (GC) handles this. Nevertheless, the GC policies and algorithms that are best suited for large datacenters are not necessarily ideal for a small, embedded device. Therefore, in this paper, we present GUI GC, a JavaFX GUI benchmark, which we use to compare the performance of the four GC policies of the IBM J9 Java runtime on a resource-constrained environment. Overall, our experiments suggest that the default policy Gencon, outperformed its counterparts. Additionally, the region-based policy, Balanced, did not fully utilize blocking times; thus, using GUI GC, we conducted experiments with explicit GC invocations that measured significant improvements of up to 13.22% when multiple CPUs were available.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134368777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Investigating User Reactions to Interactive-signage-based Stimulation Toward Behavior Change 调查用户对基于交互标志的刺激对行为改变的反应
Zhihua Zhang, Yuta Takahashi, Manato Fujimoto, Yutaka Arakawa, K. Yasumoto
{"title":"Investigating User Reactions to Interactive-signage-based Stimulation Toward Behavior Change","authors":"Zhihua Zhang, Yuta Takahashi, Manato Fujimoto, Yutaka Arakawa, K. Yasumoto","doi":"10.23919/ICMU.2018.8653587","DOIUrl":"https://doi.org/10.23919/ICMU.2018.8653587","url":null,"abstract":"In recent years, many research and developments of behavior change have been conducted. The purpose of behavior change is to improve people’s lifestyle pattern or to maintain the improvement for a long time aiming to achieve a goal of promoting health condition improvement. In order to achieve the foundation of a new lifestyle, it is necessary to recognize the daily life patterns of users and give triggers to users in their daily life for behavior change. To realize this, in this study, we construct an interactive signage which is able to positively talk to the passing user and try to induce behavior change by sending visual stimulation and auditory stimulation. In this paper, we report the result of the investigation on users’ reactions and feelings to the proposed interactive signage. As a survey experiment, we set up 4 interactive signage on a floor of our university and asked 15 participants to carry a name tag with a BLE beacon during their daily life. There are 4 different dialogue scenarios and a scenario is posted to the participants when he/she approaches the interactive signage. Participants can respond to these scenarios through a touchscreen. Based on the result of the experiment, it is found that the interactive signage can induce behavior change effectively.","PeriodicalId":398108,"journal":{"name":"2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116320199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信