{"title":"A Security Architecture for Personal Networks","authors":"A. Jehangir, S. Groot","doi":"10.1109/MOBIQW.2006.361752","DOIUrl":"https://doi.org/10.1109/MOBIQW.2006.361752","url":null,"abstract":"Personal network (PN) is a new concept utilizing pervasive computing to meet the needs of the user. As PNs edge closer towards reality, security becomes an important concern since any vulnerability in the system will limit its practical use. In this paper we introduce a security architecture designed for PNs. Our aim is to use secure but lightweight mechanisms suitable for resource constrained devices and wireless communication. We support pair-wise keys for secure cluster formation and use group keys for securing intra-cluster communication. In order to analyze the performance of our proposed mechanisms, we carry out simulations using ns-2. The results show that our mechanisms have a low overhead in terms of delay and energy consumption","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124531613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Service Composition for Mobile Personal Networks","authors":"S. Herborn, A. Seneviratne","doi":"10.1109/MOBIQW.2006.361750","DOIUrl":"https://doi.org/10.1109/MOBIQW.2006.361750","url":null,"abstract":"Personalised networks (PN) introduce new mobility management challenges since individual devices participating in a PN may exhibit different mobility behaviour relative to one another and to human users. Mobility events may result in devices either leaving or joining the PN. In this paper we propose that PN mobility be managed by redirecting ongoing application data streams between endpoint devices in the PN. We describe a scheme to facilitate application level inter-device mobility by extending the PN to include composed network based adaptation services that adapt and reroute ongoing data streams to new endpoint devices. In order to cope with device heterogeneity and mobility, services are composed on demand and adapted in response to changes in the availability of endpoint devices. We analyse simulation results which show that our approach enables enhanced mobility handling over a range of conditions","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114711485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Krishnamurthy, Dipanjan Chakraborthy, S. Jindal, S. Mittal
{"title":"Context-Based Adaptation of Mobile Phones Ussing Near-Field Communication","authors":"S. Krishnamurthy, Dipanjan Chakraborthy, S. Jindal, S. Mittal","doi":"10.1109/MOBIQ.2006.340390","DOIUrl":"https://doi.org/10.1109/MOBIQ.2006.340390","url":null,"abstract":"Smart environments that can adapt based on the current context are extremely useful for automating even simple, mundane tasks. The key components of such an environment are sources that can extract the raw context, a synthesizer that can draw inferences by aggregating the context from different sources, and a set of policies that drive the adaptation. In this paper, we describe a context-based adaptation system to alleviate the distraction caused by one of the most ubiquitous devices of modern day-the mobile phone. Our system makes use of sources, such as RFID devices, that employ near-field communication technology to extract raw context. We describe how we adapt the roles of these devices to extract both environmental and personal context. To reduce the distraction caused by mobile phones, we have developed a policy-based mechanism to enable context-based adaptation of these devices. We have implemented a prototype of our system and conducted some usage studies. We describe the details of our implementation and present the lessons learned from the usability experiments","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126388669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Byzantine Generals Problem in the Light of P2P Computing","authors":"N. Fedotova, L. Veltri","doi":"10.1109/MOBIQW.2006.361758","DOIUrl":"https://doi.org/10.1109/MOBIQW.2006.361758","url":null,"abstract":"Security problems in P2P environment become more complicated with the growing number of P2P networks and applications. Hence, it is very important to find reliable mechanisms of detection and elimination of various threats, attack sources, and malicious nodes. In this paper we consider how it is possible to apply some classical solutions for Byzantine generals problem (BGP), originally described by Lamport and Shostak, in a P2P environment to solve such problems","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131518784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identifying meaningful locations","authors":"P. Nurmi, J. Koolwaaij","doi":"10.1109/MOBIQ.2006.340429","DOIUrl":"https://doi.org/10.1109/MOBIQ.2006.340429","url":null,"abstract":"Existing context-aware mobile applications often rely on location information. However, raw location data such as GPS coordinates or GSM cell identifiers are usually meaningless to the user and, as a consequence, researchers have proposed different methods for inferring so-called places from raw data. The places are locations that carry some meaning to user and to which the user can potentially attach some (meaningful) semantics. Examples of places include home, work and airport. A lack in existing work is that the labeling has been done in an ad hoc fashion and no motivation has been given for why places would be interesting to the user. As our first contribution we use social identity theory to motivate why some locations really are significant to the user. We also discuss what potential uses for location information social identity theory implies. Another flaw in the existing work is that most of the proposed methods are not suited to realistic mobile settings as they rely on the availability of GPS information. As our second contribution we consider a more realistic setting where the information consists of GSM cell transitions that are enriched with GPS information whenever a GPS device is available. We present four different algorithms for this problem and compare them using real data gathered throughout Europe. In addition, we analyze the suitability of our algorithms for mobile devices","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130340755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Biometric Authentication for a Mobile Personal Device","authors":"Q. Tao, R. Veldhuis","doi":"10.1109/MOBIQ.2006.340409","DOIUrl":"https://doi.org/10.1109/MOBIQ.2006.340409","url":null,"abstract":"Secure access is prerequisite for a mobile personal device (MPD) in a personal network (PN). An authentication method using biometrics, specifically face, is proposed in this paper. A fast face detection and registration method based on a Viola-Jones detector is implemented, and a face-authentication method based on subspace metrics is developed. Experiments show that the authentication method is effective with an equal error rate (EER) of 1.2%, despite its simplicity","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128207458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using semantic policies for ad-hoc coalition access control","authors":"A. Dersingh, R. Liscano, A. Jost","doi":"10.1109/MOBIQW.2006.361756","DOIUrl":"https://doi.org/10.1109/MOBIQW.2006.361756","url":null,"abstract":"Coalition access control models are required in order to properly manage access to resources among different collaborating organizations. When these relationships are long term inter-organizational agreements and policies can be established that can satisfy appropriate access to the resources owned by those entities. When these coalitions are spontaneous access rights to resources among the parties in the coalition need to be specified by users and must be context dependant. A good example of this is in ad-hoc collaborative scenarios. Controlling access to private services being shared within the collaborative group is a challenge in these scenarios. This paper presents a semantic Web approach in order to represent context that can be shared and used by a policy engine to form dynamic groups based on the context of the situation, as well as manage access to the private Web services that each group introduces to the ad-hoc collaborative environment. The approach leverages the distributed policy framework (Rein) built on top of a rule-base reasoner (CWM)","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131503257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Luis Sánchez, J. Lanza, R. Olsen, M. Bauer, M. Girod-Genet
{"title":"A Generic Context Management Framework for Personal Networking Environments","authors":"Luis Sánchez, J. Lanza, R. Olsen, M. Bauer, M. Girod-Genet","doi":"10.1109/MOBIQW.2006.361743","DOIUrl":"https://doi.org/10.1109/MOBIQW.2006.361743","url":null,"abstract":"In this paper we introduce a high level architecture for a context management system for personal networks (PN). The main objective of the context management framework (CMF) described in this paper is to support the interactions between context information sources and context aware components, services and applications in a generic manner, independently of their nature and operation area. To this end, we propose a structure consisting of a context management interface, context access manager module, processing and storage module, and a data source abstraction layer. Nodes provide a certain set of these modules depending on their computational capabilities and their role within the system. We differentiate between basic context nodes (BCN), enhanced context nodes (ECN) and context management nodes (CMN) within the CMF. CMNs operate on two levels, i.e., local/cluster level and PN level. In the paper we also describe how these entities will interact with each other and how different context information will be exchanged within the personal network. Finally, we provide an outlook of the work and issues that need to be addressed in order to complete the described framework","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131041590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Topcu-Altintas, Y. Huang, N. Venkatasubramanian
{"title":"Overload-Driven Mobility-Aware Cache Management in Wireless Environments","authors":"H. Topcu-Altintas, Y. Huang, N. Venkatasubramanian","doi":"10.1109/MOBIQW.2006.361731","DOIUrl":"https://doi.org/10.1109/MOBIQW.2006.361731","url":null,"abstract":"In this paper, we propose a novel cache management strategy that uses the notion of \"overload\" where overload is defined as a situation when there is insufficient proxy cache for a new incoming user in a mobile region. In an overloaded situation, there will be increased network traffic (since the original server will need to be contacted) and increased service delays for mobile hosts (due to cache misses). The proposed techniques attempt to decrease the penalty of overloaded traffic and to reduce the number of remote accesses by increasing cache hit ratio. Our cache replacement algorithm is holistic in that it considers (i) mobility of the clients, (ii) predicted overloads, (iii) sizes of cached objects and (iv) their access frequencies in determining which object's cache (how much cache space) to be replaced, and when to replace. Performance results show that our overload-driven cache management strategy outperforms the existing popular policies","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130686240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Access Control and Authentication for Converged Wireless Networks","authors":"Z. Fu, J. Strassner","doi":"10.1109/MOBIQW.2006.361755","DOIUrl":"https://doi.org/10.1109/MOBIQW.2006.361755","url":null,"abstract":"This paper presents a novel AAA architecture featuring the use of role-based access control and authentication for a converged wireless network where a single operator, as in one of the North American operators who offer both cellular and DSL service, provides the converged services and broadband access. Important features, such as mutual authentication, fast roaming and NAT traversal issues in heterogeneous wireless networks, are discussed. In addition, the paper proposes a modeling approach to address converged network security in a systematic and cost efficient manner","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127340267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}