{"title":"A Modified Inhomogeneity Measure in Spatial Distribution","authors":"Cheng Li, Z. Zhong, Hao Wu, Lei Xiong","doi":"10.1109/IMIS.2013.69","DOIUrl":"https://doi.org/10.1109/IMIS.2013.69","url":null,"abstract":"In this paper, we investigated the traditional inhomogeneity measure and proposed a modified inhomogeneity measure. The traditional inhomogeneity measure adopted absolute value as norm. However, it was not accurate enough when used in sparse spatial distribution. The modified inhomogeneity measure adopted Euclidean distance instead of absolute value. An example was taken to compare the traditional inhomogeneity measure and the modified inhomogeneity measure, and verified the modified inhomogeneity measure was more accurate in sparse spatial distribution. Simulation compared the inhomogeneity measured by different method, and the results showed that the modified inhomogeneity measure better fits human perception.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116340274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Idowu, D. Hagos, W. Tesfay, A. Famurewa, Juwel Rana, K. Synnes
{"title":"NexTrend: Context-Aware Music-Relay Corridors Using NFC Tags","authors":"S. Idowu, D. Hagos, W. Tesfay, A. Famurewa, Juwel Rana, K. Synnes","doi":"10.1109/IMIS.2013.101","DOIUrl":"https://doi.org/10.1109/IMIS.2013.101","url":null,"abstract":"The rise of pervasive computing presents unique opportunities due to increasing availability of smart devices such as mobile phones and tablets equipped with various sensors enabling Near Field Communication (NFC) technologies. The growth of mobile computing has led to an increase in access to digital music. With the growth of digital music, the development of music information sharing services for users becomes important. The existing sharing methods are based on the users' social network and preferences in music. However, sometimes, sharing music according to location and time is needed. This paper presents work on smart spaces equipped with NFC tags, deployed at different locations in hallways for discovering and sharing new music experiences. This concept provides a new way of interaction between passers-by for discovering music in relation to location. For example, the hallway locations use sensing devices to provide an automatic means of exchanging music information among the passers-by. We utilized NFC tags as Music-Relay hot spots. The hot spot retrieves information about the music a user is playing on her/his device while s/he is passing by the hot spot. The work contributes to a pervasive service that equips an environment with music context intelligence about a passer-bys choice of music and allows users to feel the musical presence of other users who have been in the same location at previous point in time. In general, this paper proposes a new music information sharing service using the music information captured from users at a specific location in time.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"379 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123438638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Instruction Fault Attack on the Miller Algorithm in a Pairing-Based Cryptosystem","authors":"KiSeok Bae, S. Moon, JaeCheol Ha","doi":"10.1109/IMIS.2013.36","DOIUrl":"https://doi.org/10.1109/IMIS.2013.36","url":null,"abstract":"Some fault attacks such as counter and data corruption have been proposed for pairing-based cryptosystems. However, a fault model that can skip the if instruction in traditional schemes such as RSA and ECC(elliptic curve cryptosystem) does not appear in the literature in terms of pairing-based cryptography. This paper investigated the vulnerability of skipping the emph{if} instruction in the last iteration of the Miller algorithm and describes how to extract the secret information. Indeed, the proposed method of attack is more efficient than previous counter fault attacks against the Miller algorithm. As evidence, a fault attack in Affine and Jacobian coordinate systems that finds the secret information using one faulty output is described. The feasibility of our fault model was verified by a practical laser fault injection experiment.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124669059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Composite Business Ecosystems for the Web of Everything: Using Cloud Platforms for Web Convergence","authors":"I. Thomas, Sebastien Gaide, Matthieu Hug","doi":"10.1109/IMIS.2013.95","DOIUrl":"https://doi.org/10.1109/IMIS.2013.95","url":null,"abstract":"The Web is constantly expanding its reach into new areas, growing out from its relatively simple beginnings as a platform for information sharing and linking. Over the last few years the rise of cloud, mobile and social technologies have driven the influence of the Web into traditional value chains, digitizing many transactional and social interactions and opening up opportunities for new business models. At the same time new initiatives such as 6LoWPAN and CoAP are pushing the edges of the Web even further out, opening up opportunities to digitize and socialize the millions of sensors and other physical devices operating at the edge of the network. In this paper we discuss the way in which we are building out a converged, Web-scale cloud platform for the aggregation, orchestration and monetization of new forms of converged value webs. Such value webs - or Composite Business Ecosystems - will be able to transparently leverage a diverse range of node types across this new Web of Everything.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128738023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-hop Connected Probability Based on Dependence among Consecutive Links in VANETs","authors":"Muchen Wu, Z. Zhong, Hao Wu, Minming Ni","doi":"10.1109/IMIS.2013.73","DOIUrl":"https://doi.org/10.1109/IMIS.2013.73","url":null,"abstract":"Vehicular Ad hoc NETworks (VANETs) distinguish from traditional Mobile Ad hoc NETworks (MANETs), because VANETs are aimed at constructing wireless connection among highly dynamic vehicles. The majority of research concentrates on multi-hop connectivity assuming that the links have independent and identical distribution as well as without taking the dependence among several consecutive links into consideration. The authors also obtain the distribution of multi-hop path lifetime using the similar assumption. However, when an intermediate vehicle moves to other location or leaves the road abruptly, the change can directly influence at least two consecutive links. This simultaneous change is the essential issue that our work deals with. In this paper, we make use of the mobility model to derive the vehicles' appearing distribution based on the relative distance to the reference vehicle. Besides, incorporating the geographical distribution of all potential intermediate vehicles, we propose an improved algorithm for multi-hop connected probability that contains the dependent correlation among consecutive links instead of independent link assumption. The performance of our analysis is evaluated by comparing to the simulation results.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132483412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Arcangelo Castiglione, C. D’Ambrosio, A. D. Santis, Aniello Castiglione, F. Palmieri
{"title":"On Secure Data Management in Health-Care Environment","authors":"Arcangelo Castiglione, C. D’Ambrosio, A. D. Santis, Aniello Castiglione, F. Palmieri","doi":"10.1109/IMIS.2013.120","DOIUrl":"https://doi.org/10.1109/IMIS.2013.120","url":null,"abstract":"Health-care management systems are of great relevance because they provide an easy and quick management of all aspects regarding a patient, not necessarily medical. Furthermore, there are more and more cases of pathologies in which diagnosis and treatment can be only carried out by using medical imaging techniques. With an ever-increasing prevalence, medical images are directly acquired in or converted into digital form, for their storage as well as subsequent retrieval and processing. Similarly, text interpreting medical image with other associated patient information, are included into or acquired directly in digital form and stored. It is easy to note that greater is the amount of clinical data available to the specialists, acquired for example on previously treated cases, and better is the quality and the rapidity of diagnosis and treatment. It is therefore important, if not essential, to share easily and quickly data and clinical experiences. However, such sharing among different entities, whether public or private, is a non-trivial task, since such information are always subjected to restrictions related to privacy laws and to health insurance regulations. To the best of our knowledge, in literature there are no systems which allows the rapid and secure sharing of clinical experiences among different entities. We propose a fully distributed system which allows secure sharing of all information (both medical and not) necessary for patients management. With our system, each node belonging to it, can access quickly, easily and in a secure way to a considerable amount of data, thereby improving the speed and quality of clinical evaluation performed by the physician.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130911814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Ou, C. Huang, C. Hu, J. W. Liu, E. Chu, C. Shih
{"title":"An Asynchronous Message Delivery Service for iGaDs (Intelligent Guards Against Disasters)","authors":"Y. Ou, C. Huang, C. Hu, J. W. Liu, E. Chu, C. Shih","doi":"10.1109/IMIS.2013.152","DOIUrl":"https://doi.org/10.1109/IMIS.2013.152","url":null,"abstract":"This paper describes architecture and middleware for a system of intelligent Guards against Disasters, called iGaDs for short. iGaDs are smart devices and applications that can receive, authenticate and process standard-conforming disaster alert messages from authorized senders and respond by taking appropriate actions to help us to be better prepared for nature disasters. They are designed to be used ubiquitously as elements of future disaster-prepared smart homes and environments. The prototype prioritized asynchronous alert message delivery service described here is built by using a data bridge to connect Qpid and PubSubHubbub as a way to push alert messages to a large system of iGaDs via Internet.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129275736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Srinivasarengan, Y. G. Goutam, M. Chandra, S. Kadhe
{"title":"A Framework for Non Intrusive Load Monitoring Using Bayesian Inference","authors":"K. Srinivasarengan, Y. G. Goutam, M. Chandra, S. Kadhe","doi":"10.1109/IMIS.2013.78","DOIUrl":"https://doi.org/10.1109/IMIS.2013.78","url":null,"abstract":"Non-Intrusive Load Monitoring (NILM) refers to the disaggregation of electric appliances from a single point measurement. The problem is gaining a lot of attention recently, primary due to the promising energy savings as well as potential business prospects such a solution brings. However, in a large scale deployment, the digital meter is unlikely to have multiple electrical parameters which most existing NILM research rely on. In this paper, we report the results of using a Bayesian approach to obtain the disaggregation of the loads where only active power measurements are available at a sampling rate of a few seconds. The proposed method requires the prior availability of appliance information (i.e., the prior probability and appliance ratings). To obtain the appliance information for the disaggregation algorithm, we adopt an unsupervised learning approach. Further, we present the results of these algorithms on a simulated and an open household electric consumption data set.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126234622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using a Stored-Value Card to Provide an Added-Value Service of Payment Protocol in VANET","authors":"Chin-Ling Chen, Wei-Chen Tsai, Yu-Yi Chen, Woei-Jiunn Tsaur","doi":"10.5755/j01.itc.42.4.4471","DOIUrl":"https://doi.org/10.5755/j01.itc.42.4.4471","url":null,"abstract":"With the rapid development of the Internet applications, added-value service is widely used in the Internet. The added-value service provides different kind of services for users. In this paper, we propose a stored-value card to provide an added-value service of payment protocol in VANET. When the user wants to use the added-value service, the service provider verifies the request and sends it to the payment gateway. And then, the payment gateway will forward the transaction message to the Issuer and Acquirer to process it. In our scheme, we use symmetric cryptography and digital signature to solve the security problem of payment scheme in VANET. Our scheme achieves protection against double-spending, unforgeability, non-repudiation, anonymity and the recovery issue.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121040614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation and Evaluation of Resilient Network Based on Cognitive Wireless Network Framework","authors":"Goshi Sato, Noriki Uchida, Y. Shibata","doi":"10.1109/IMIS.2013.24","DOIUrl":"https://doi.org/10.1109/IMIS.2013.24","url":null,"abstract":"Since the conventional communication means are severely damaged and cannot be functioned at the occurrence of disaster, more robust and redundant information infrastructure has to be constructed to prepare the estimated large disasters. In this paper, we reported the implementations and evaluation of the resilient network system, which is based on cognitive wireless network framework in order to provide a robust and quick recovery from the damages. In the proposed methods, we introduced autonomous wireless link and path changes by the network environment and user policy changes, and the prototype is used for the evaluation of the proposed methods.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123826110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}