2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services最新文献

筛选
英文 中文
A Security Architecture for Personal Networks 面向个人网络的安全体系结构
A. Jehangir, S. Groot
{"title":"A Security Architecture for Personal Networks","authors":"A. Jehangir, S. Groot","doi":"10.1109/MOBIQW.2006.361752","DOIUrl":"https://doi.org/10.1109/MOBIQW.2006.361752","url":null,"abstract":"Personal network (PN) is a new concept utilizing pervasive computing to meet the needs of the user. As PNs edge closer towards reality, security becomes an important concern since any vulnerability in the system will limit its practical use. In this paper we introduce a security architecture designed for PNs. Our aim is to use secure but lightweight mechanisms suitable for resource constrained devices and wireless communication. We support pair-wise keys for secure cluster formation and use group keys for securing intra-cluster communication. In order to analyze the performance of our proposed mechanisms, we carry out simulations using ns-2. The results show that our mechanisms have a low overhead in terms of delay and energy consumption","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124531613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Service Composition for Mobile Personal Networks 移动个人网络的业务组成
S. Herborn, A. Seneviratne
{"title":"Service Composition for Mobile Personal Networks","authors":"S. Herborn, A. Seneviratne","doi":"10.1109/MOBIQW.2006.361750","DOIUrl":"https://doi.org/10.1109/MOBIQW.2006.361750","url":null,"abstract":"Personalised networks (PN) introduce new mobility management challenges since individual devices participating in a PN may exhibit different mobility behaviour relative to one another and to human users. Mobility events may result in devices either leaving or joining the PN. In this paper we propose that PN mobility be managed by redirecting ongoing application data streams between endpoint devices in the PN. We describe a scheme to facilitate application level inter-device mobility by extending the PN to include composed network based adaptation services that adapt and reroute ongoing data streams to new endpoint devices. In order to cope with device heterogeneity and mobility, services are composed on demand and adapted in response to changes in the availability of endpoint devices. We analyse simulation results which show that our approach enables enhanced mobility handling over a range of conditions","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114711485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Context-Based Adaptation of Mobile Phones Ussing Near-Field Communication 基于上下文的手机近场通信适配
S. Krishnamurthy, Dipanjan Chakraborthy, S. Jindal, S. Mittal
{"title":"Context-Based Adaptation of Mobile Phones Ussing Near-Field Communication","authors":"S. Krishnamurthy, Dipanjan Chakraborthy, S. Jindal, S. Mittal","doi":"10.1109/MOBIQ.2006.340390","DOIUrl":"https://doi.org/10.1109/MOBIQ.2006.340390","url":null,"abstract":"Smart environments that can adapt based on the current context are extremely useful for automating even simple, mundane tasks. The key components of such an environment are sources that can extract the raw context, a synthesizer that can draw inferences by aggregating the context from different sources, and a set of policies that drive the adaptation. In this paper, we describe a context-based adaptation system to alleviate the distraction caused by one of the most ubiquitous devices of modern day-the mobile phone. Our system makes use of sources, such as RFID devices, that employ near-field communication technology to extract raw context. We describe how we adapt the roles of these devices to extract both environmental and personal context. To reduce the distraction caused by mobile phones, we have developed a policy-based mechanism to enable context-based adaptation of these devices. We have implemented a prototype of our system and conducted some usage studies. We describe the details of our implementation and present the lessons learned from the usability experiments","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126388669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Byzantine Generals Problem in the Light of P2P Computing P2P计算下的拜占庭将军问题
N. Fedotova, L. Veltri
{"title":"Byzantine Generals Problem in the Light of P2P Computing","authors":"N. Fedotova, L. Veltri","doi":"10.1109/MOBIQW.2006.361758","DOIUrl":"https://doi.org/10.1109/MOBIQW.2006.361758","url":null,"abstract":"Security problems in P2P environment become more complicated with the growing number of P2P networks and applications. Hence, it is very important to find reliable mechanisms of detection and elimination of various threats, attack sources, and malicious nodes. In this paper we consider how it is possible to apply some classical solutions for Byzantine generals problem (BGP), originally described by Lamport and Shostak, in a P2P environment to solve such problems","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131518784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Identifying meaningful locations 确定有意义的位置
P. Nurmi, J. Koolwaaij
{"title":"Identifying meaningful locations","authors":"P. Nurmi, J. Koolwaaij","doi":"10.1109/MOBIQ.2006.340429","DOIUrl":"https://doi.org/10.1109/MOBIQ.2006.340429","url":null,"abstract":"Existing context-aware mobile applications often rely on location information. However, raw location data such as GPS coordinates or GSM cell identifiers are usually meaningless to the user and, as a consequence, researchers have proposed different methods for inferring so-called places from raw data. The places are locations that carry some meaning to user and to which the user can potentially attach some (meaningful) semantics. Examples of places include home, work and airport. A lack in existing work is that the labeling has been done in an ad hoc fashion and no motivation has been given for why places would be interesting to the user. As our first contribution we use social identity theory to motivate why some locations really are significant to the user. We also discuss what potential uses for location information social identity theory implies. Another flaw in the existing work is that most of the proposed methods are not suited to realistic mobile settings as they rely on the availability of GPS information. As our second contribution we consider a more realistic setting where the information consists of GSM cell transitions that are enriched with GPS information whenever a GPS device is available. We present four different algorithms for this problem and compare them using real data gathered throughout Europe. In addition, we analyze the suitability of our algorithms for mobile devices","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130340755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 83
Biometric Authentication for a Mobile Personal Device 移动个人设备的生物识别认证
Q. Tao, R. Veldhuis
{"title":"Biometric Authentication for a Mobile Personal Device","authors":"Q. Tao, R. Veldhuis","doi":"10.1109/MOBIQ.2006.340409","DOIUrl":"https://doi.org/10.1109/MOBIQ.2006.340409","url":null,"abstract":"Secure access is prerequisite for a mobile personal device (MPD) in a personal network (PN). An authentication method using biometrics, specifically face, is proposed in this paper. A fast face detection and registration method based on a Viola-Jones detector is implemented, and a face-authentication method based on subspace metrics is developed. Experiments show that the authentication method is effective with an equal error rate (EER) of 1.2%, despite its simplicity","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128207458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Using semantic policies for ad-hoc coalition access control 使用语义策略进行临时联盟访问控制
A. Dersingh, R. Liscano, A. Jost
{"title":"Using semantic policies for ad-hoc coalition access control","authors":"A. Dersingh, R. Liscano, A. Jost","doi":"10.1109/MOBIQW.2006.361756","DOIUrl":"https://doi.org/10.1109/MOBIQW.2006.361756","url":null,"abstract":"Coalition access control models are required in order to properly manage access to resources among different collaborating organizations. When these relationships are long term inter-organizational agreements and policies can be established that can satisfy appropriate access to the resources owned by those entities. When these coalitions are spontaneous access rights to resources among the parties in the coalition need to be specified by users and must be context dependant. A good example of this is in ad-hoc collaborative scenarios. Controlling access to private services being shared within the collaborative group is a challenge in these scenarios. This paper presents a semantic Web approach in order to represent context that can be shared and used by a policy engine to form dynamic groups based on the context of the situation, as well as manage access to the private Web services that each group introduces to the ad-hoc collaborative environment. The approach leverages the distributed policy framework (Rein) built on top of a rule-base reasoner (CWM)","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131503257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Generic Context Management Framework for Personal Networking Environments 面向个人网络环境的通用上下文管理框架
Luis Sánchez, J. Lanza, R. Olsen, M. Bauer, M. Girod-Genet
{"title":"A Generic Context Management Framework for Personal Networking Environments","authors":"Luis Sánchez, J. Lanza, R. Olsen, M. Bauer, M. Girod-Genet","doi":"10.1109/MOBIQW.2006.361743","DOIUrl":"https://doi.org/10.1109/MOBIQW.2006.361743","url":null,"abstract":"In this paper we introduce a high level architecture for a context management system for personal networks (PN). The main objective of the context management framework (CMF) described in this paper is to support the interactions between context information sources and context aware components, services and applications in a generic manner, independently of their nature and operation area. To this end, we propose a structure consisting of a context management interface, context access manager module, processing and storage module, and a data source abstraction layer. Nodes provide a certain set of these modules depending on their computational capabilities and their role within the system. We differentiate between basic context nodes (BCN), enhanced context nodes (ECN) and context management nodes (CMN) within the CMF. CMNs operate on two levels, i.e., local/cluster level and PN level. In the paper we also describe how these entities will interact with each other and how different context information will be exchanged within the personal network. Finally, we provide an outlook of the work and issues that need to be addressed in order to complete the described framework","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131041590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Overload-Driven Mobility-Aware Cache Management in Wireless Environments 无线环境中过载驱动的移动性感知缓存管理
H. Topcu-Altintas, Y. Huang, N. Venkatasubramanian
{"title":"Overload-Driven Mobility-Aware Cache Management in Wireless Environments","authors":"H. Topcu-Altintas, Y. Huang, N. Venkatasubramanian","doi":"10.1109/MOBIQW.2006.361731","DOIUrl":"https://doi.org/10.1109/MOBIQW.2006.361731","url":null,"abstract":"In this paper, we propose a novel cache management strategy that uses the notion of \"overload\" where overload is defined as a situation when there is insufficient proxy cache for a new incoming user in a mobile region. In an overloaded situation, there will be increased network traffic (since the original server will need to be contacted) and increased service delays for mobile hosts (due to cache misses). The proposed techniques attempt to decrease the penalty of overloaded traffic and to reduce the number of remote accesses by increasing cache hit ratio. Our cache replacement algorithm is holistic in that it considers (i) mobility of the clients, (ii) predicted overloads, (iii) sizes of cached objects and (iv) their access frequencies in determining which object's cache (how much cache space) to be replaced, and when to replace. Performance results show that our overload-driven cache management strategy outperforms the existing popular policies","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130686240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Access Control and Authentication for Converged Wireless Networks 融合无线网络的接入控制与认证
Z. Fu, J. Strassner
{"title":"Access Control and Authentication for Converged Wireless Networks","authors":"Z. Fu, J. Strassner","doi":"10.1109/MOBIQW.2006.361755","DOIUrl":"https://doi.org/10.1109/MOBIQW.2006.361755","url":null,"abstract":"This paper presents a novel AAA architecture featuring the use of role-based access control and authentication for a converged wireless network where a single operator, as in one of the North American operators who offer both cellular and DSL service, provides the converged services and broadband access. Important features, such as mutual authentication, fast roaming and NAT traversal issues in heterogeneous wireless networks, are discussed. In addition, the paper proposes a modeling approach to address converged network security in a systematic and cost efficient manner","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127340267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信