Skip to main content

2005 | Buch

Embedded and Ubiquitous Computing – EUC 2005 Workshops

EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005. Proceedings

herausgegeben von: Tomoya Enokido, Lu Yan, Bin Xiao, Daeyoung Kim, Yuanshun Dai, Laurence T. Yang

Verlag: Springer Berlin Heidelberg

Buchreihe : Lecture Notes in Computer Science

insite
SUCHEN

Inhaltsverzeichnis

Frontmatter

The Second International Symposium on Ubiquitous Intelligence and Smart Worlds (UISW 2005)

Session 1: Smart Environments and Systems I

Human Activity Recognition Based on Surrounding Things

This paper proposes human activity recognition based on the actual semantics of the human’s current location. Since predefining the semantics of location is inadequate to identify human activities, we process information about things to automatically identify the semantics based on the concept of affordance. Ontology is used to deal with the various possible representations of things detected by RFIDs, and a multi-class Naïve Bayesian approach is used to detect multiple actual semantics from the terms representing things. Our approach is suitable for automatically detecting possible activities under a variety of characteristics of things including polysemy and variability. Preliminary experiments on manually collected datasets of things demonstrated its noise tolerance and ability to rapidly detect multiple actual semantics from existing things.

Naoharu Yamada, Kenji Sakamoto, Goro Kunito, Kenichi Yamazaki, Satoshi Tanaka
Baton: A Service Management System for Coordinating Smart Things in Smart Spaces

Smart spaces are open complex computing systems, consisting of a large variety of cooperative smart things. Central to building smart spaces is the support for sophisticated coordination among diverse smart things collaborating to accomplish specified tasks. Multi-agent systems are often used as the software infrastructures to address the coordination in smart spaces. However, since agents in smart spaces are dynamic, resource-bounded and have complicated service dependencies, current approaches to coordination in multi-agent systems encounter new challenges when applied in smart spaces. In this paper, we present Baton, a service management system to explicitly resolve the particular issues stemming from smart spaces while coordinating agents (delegating smart things in smart spaces). Baton is designed as a complement to coordination approaches in multi-agent systems with a focus on mechanisms for service discovery, service composition, request arbitration and dependency maintenance. Baton has been now deployed in our own smart spaces to achieve better coordination for smart things.

Jingyu Li, Yuanchun Shi
An Extensible Ubiquitous Architecture for Networked Devices in Smart Living Environments

Continuous technological innovation is entailing that living environments be equipped with products that improve the quality of daily life. Unluckily, the adopted solutions do not always represent an adequate support and people continue to execute repetitive tasks that software infrastructures could perform automatically. This is partially due to the fact that the existent technological solutions cannot be always integrated in a coherent communication platform, as they use proprietary protocols and ad hoc implementations not easily reusable. This paper proposes an extensible ubiquitous architecture for networked virtualized devices in smart living environments. The aim is realizing ubiquitous applications and integrating networked devices through an architecture that hides their complexity and heterogeneity. Several intelligence techniques have been integrated for offering a smart environment through the use of automatic learning techniques.

Thierry Bodhuin, Gerardo Canfora, Rosa Preziosi, Maria Tortorella
A World Model for Smart Spaces

A world model for ubiquitous computing environments is presented. It can be dynamically organized like a tree based on geographical containment, such as in a user-room-floor-building hierarchy and each node in the tree can be constructed as an executable software component. It provides a unified view of the locations of not only physical entities and spaces, including users and objects, but also computing devices and services. A prototype implementation of this approach was constructed on a Java-based mobile agent system.

Ichiro Satoh

Session 2: Agent Based Smart Computing

Dealing with Emotional Factors in Agent Based Ubiquitous Group Decision

With the increasing globalization of economy and consequent increasing in the inter and intra organizational competitiveness, the role of groups in organizations and businesses achieve greater significance. The work, as well as the responsibility involved to reach a decision, is distributed among group members, which may be distributed geographically and may cooperate in an asynchronous way. This paper shortly presents the

WebMeeting

prototype, which is a group decision support system that supports ubiquitous group decision meetings. It is also discussed the influence of emotional factors in group decision making and it is proposed a multi-agent model to simulate ubiquitous group decision making processes, where argumentation and emotional capabilities are considered.

Goreti Marreiros, Carlos Ramos, José Neves
A Multi-agent Software Platform Accommodating Location-Awareness for Smart Space

Software Platform is a middleware component of Smart Space to coordinate and manage all modules. Location-awareness is a common feature of many modules. Current several typical methods for distributed systems can hardly be competent for both the role of Software Platform and accommodating location-awareness simultaneously. Aiming at this, we present our method: SLAP (Smart Location-awareness-Accommodating Platform). The method, on the basis of OAA (Open Agent Architecture), adopts such new technologies as

Poll-Ack mechanism

,

dual-central coupling model

and

hybrid architecture

. Consequently it not only reserves the advantages of OAA to coordinate multi-modal modules efficiently and flexibly, but also accommodates location-aware computing well.

Hongliang Gu, Yuanchun Shi, Guangyou Xu, Yu Chen
Context-Aware Ubiquitous Data Mining Based Agent Model for Intersection Safety

In USA, 2002, approximately 3.2 million intersection-related crashes occurred, corresponding to 50 percent of all reported crashes. In Japan, more than 58 percent of all traffic crashes occur at intersections. With the advances in Intelligent Transportation Systems, such as off-the-shelf and in-vehicle sensor technology, wireless communication and ubiquitous computing research, safety of intersection environments can be improved. This research aims to investigate an integration of intelligent software agents and ubiquitous data stream mining, for a novel context-aware framework that is able to: (1) monitor an intersection to learn for patterns of collisions and factors leading to a collision; (2) learn to recognize potential hazards in intersections from information communicated by road infrastructures, approaching and passing vehicles, and external entities; (3) warn particular threatened vehicles that are approaching the intersection by communicating directly to the in-vehicle system.

Flora Dilys Salim, Shonali Krishnaswamy, Seng Wai Loke, Andry Rakotonirainy
Development of Knowledge-Filtering Agent Along with User Context in Ubiquitous Environment

In this paper, we propose combination of Ubiquitous Computing and Semantic Web. Data and services will be annotated even in the ubiquitous devices, and should be connected to the web of the semantics near future. We call it Ubiquitous Semantics, where we would find huge amount of knowledge information, but also find most of them transitive along with user context. Therefore, in order for an agent to meet user’s real-time query it is required to efficiently retrieve timely and useful piece of the knowledge from the Ubiquitous Semantics. Thus, this paper shows a knowledge-filtering agent, which quickly responds the query by dynamic classification of the necessary information along with the user context changing in the real world. Further, to evaluate our approach we validate the performance of an application: Recipe Recommendation Agent.

Takao Takenouchi, Takahiro Kawamura, Akihiko Ohsuga

Session 3: Smart Computing Environments

Application-Driven Customization of an Embedded Java Virtual Machine

Java for embedded devices is today synonym of “embeddable pseudo-Java”. Embedded flavors of Java introduce incompatibilities against the standard edition and break its portability rule. In this paper, we introduce a way to embed applications written for Java 2 Standard Edition. The applications are pre-deployed into a virtual Java execution environment, which is analyzed in order to tailor the embedded Java virtual machine according to their runtime needs. Experiments reveal that this method produces customized virtual machines that are comparable in size to existing embedded Java solutions, while being more flexible and preserving standard Java compatibility.

Alexandre Courbot, Gilles Grimaud, Jean-Jacques Vandewalle, David Simplot-Ryl
A Study on Fast JCVM with New Transaction Mechanism and Caching-Buffer Based on Java Card Objects with a High Locality

Java Card is now a mature and accepted standard for smart card and SIM technology. Java Card is distinguished primarily by its independence from hardware platforms and portability and is now the most important open standard. However, the main concern of Java Card is now its low execution speed caused by the hardware limitation. In this paper, we propose how to improve a execution speed of Java Card by reducing the number of EEPROM writing. Our approaches are an object-buffer based on a high locality of Java Card objects, the use of RAM, has a speed more faster 1000 times than EEPROM, as much as possible and new transaction mechanism using RAM.

Min-Sik Jin, Won-Ho Choi, Yoon-Sim Yang, Min-Soo Jung
Intelligent Object Extraction Algorithm Based on Foreground/Background Classification

In this paper, we propose an intelligent object extraction algorithm based on foreground/background classification. The proposed algorithm can offer the users more friendly interface for object extraction from image without unnecessary steps. After the interactive steps from user (marking the foreground and background parts), the wanted object is extracted from the background automatically. The proposed algorithm processes the input image by watershed to produce the regions. Then, the regions are labeled after marking parts of regions. We also introduce an implementation of hierarchical queues to store the unlabeled regions. The classification of foreground and background will generate the final image with selected object. In our experimental results, the proposed algorithm provides the output image with high efficiency. The wanted object is generated after user marking the foreground and background parts less than one second. In addition, the application of this work also can be used in image synthesis or object removal in other fields of image processing.

Jhing-Fa Wang, Han-Jen Hsu, Jyun-Sian Li
Thin Client Based User Terminal Architecture for Ubiquitous Computing Environment

In this paper, the authors examine the use of thin client based user terminals to realize the RFID tag based ubiquitous computing environment. The ubiquitous service targeted is not information retrieval via RFID but the user observation service based on environment perception. Thus the user terminal must ensure service consistency even when the communication link to the server is disconnected. In order to achieve this, the authors propose an event cache mechanism that stores predicted event conditions and the corresponding reactions. A prototype and evaluation results are also described.

Tatsuo Takahashi, Satoshi Tanaka, Kenichi Yamazaki, Tadanori Mizuno
An Application Development Environment for Rule-Based I/O Control Devices

In this paper, we propose an application development environment for the ubiquitous chip, which is a rule-based event-driven input/output (I/O) control device for constructing ubiquitous computing environments. The proposed development environment simulates the behaviors of multiple ubiquitous chips and helps users to create rules. Moreover, it has a function for developing applications by cooperation between virtual ubiquitous chips and real ubiquitous chips. The application environment enables both programmers and general users to develop and customize applications for ubiquitous computing environments.

Ryohei Sagara, Yasue Kishino, Tsutomu Terada, Tomoki Yoshihisa, Masahiko Tsukamoto, Shojiro Nishio
A uWDL Handler for Context-Aware Workflow Services in Ubiquitous Computing Environments

To develop context-aware workflow services in ubiquitous computing environments, a service developer must describe and recognize context information as transition constraints. uWDL (ubiquitous Workflow Description Language) [1] is a workflow language that describes the situation information of ubiquitous environments as a rule-based service transition condition. In this paper, we suggest a uWDL handler that supports workflow’s service transition to be aware of user’s condition information. The uWDL handler consists of a uWDL parser and a uWDL context mapper. The uWDL parser represents contexts described in the scenario with sub-trees of a DIAST (Document Instance Abstract Syntax Tree) as a result of the parsing. To derive the right transition of workflow services, the uWDL context mapper compares contexts described in sub-trees of DIAST with a user’s situation information generated from ubiquitous environments by using a context comparison algorithm. Therefore, the uWDL handler will be used in developing context-aware workflow applications that can change the flow of a service scenario according to the user’s situation information in the ubiquitous computing environment.

Yongyun Cho, Joohyun Han, Jaeyoung Choi, Chae-Woo Yoo

Session 4: Smart Environments and Systems II

SMMART, a Context-Aware Mobile Marketing Application: Experiences and Lessons

A new class of m-commerce applications is emerging due to the unique features of handheld devices, such as mobility, personalization and location-awareness. This paper presents SMMART, a context-aware, adaptive and personalized m-commerce application designed to deliver targeted promotions to the users of mobile devices. SMMART adapts to changing interests of its user by monitoring his or her shopping habits and guarantees the privacy of its users by not transmitting any personally identifiable information to the retailers. We describe our experiences of building and evaluating a fully functional prototype of SMMART implemented for Pocket PCs.

Stan Kurkovsky, Vladimir Zanev, Anatoly Kurkovsky
Ubiquitous Organizational Information Service Framework for Large Scale Intelligent Environments

In this paper, we introduce a concrete, practical Ubiquitous Organizational Information (UOI) service framework, providing novice users intelligent and useful services with respect to the environment. The UOI framework based on the sensor networks is composed of 3-level hierarchical network architecture. To provide a rich array of services, the modular software framework and foundation software are designed and implemented on our hardware prototype. We define three representative UOI services and illustrate each service flow operating on the proposed UOI network. In addition, we describe some details in the implementation of a distributed UOI network on the UOI test-bed.

Kwang-il Hwang, Won-hee Lee, Seok-hwan Kim, Doo-seop Eom, Kyeong Hur
TS-U: Temporal-Spatial Methodology for Application Checking of the Systems in the Ubiquitous Environment

In the paper a novel methodology, TS-U, is proposed based on existing model checking techniques that were extended to successfully model the systems in a ubiquitous environment by introducing time and space constraints relevant in modeling of some ubiquitous system for its validation. Method proposed requires only slight modification of the existing model checking tools by introducing the notion of a Transition Checking Matrix (TCM) which holds time and space constraints for model’s transitions. By applying TS-U methodology, regular CTL formulae can be used without modifications to successfully check the system’s model as in the traditional model checking based on the Kripke structure.

Fran Jarnjak, Jinhyung Kim, Yixin Jing, Hoh Peter In, Dongwon Jeong, Doo-Kwon Baik
Ubiquitous Learning on Pocket SCORM

With advanced technologies, computer devices have become smaller and powerful. As a result, many people enjoy ubiquitous learning using mobile devices such as Pocket PCs. Pocket PCs are easy to carry and use as a distance learning platform. In this paper, we focus on the issues of transferring the current PC based Sharable Content Object Reference Model (SCORM) to Pocket PC based. We will also introduce the Pocket SCORM Run-Time Environment (RTE) which has been developed in our lab. Pocket SCORM architecture is able to operate, even when the mobile device is off-line. It will keep the students’ learning record. When it is on line, the records will then be sent back to Learning Management System (LMS). With memory limitation, we provides course caching algorithm to exchange the course content on the Pocket SCORM.

Hsuan-Pu Chang, Wen-Chih Chang, Yun-Long Sie, Nigel H. Lin, Chun-Hong Huang, Timothy K. Shih, Qun Jin
An Application Based on Spatial-Relationship to Basketball Defensive Strategies

This paper aims to develop a simulated system used for teaching and training basketball defensive strategies. Respectively, defensive strategies can be described within one method by editing video recorded from basketball games into desired clips for analysis and storing them into the database. In this paper, we used Spatial-Temporal Relationships to describe the local defensive movements by the basketball players in a game. The system will automatically capture tracks of defensive movements by the basketball players in the video clips, from which basketball coaches and players can learn various defensive strategies within the shortest period of time. The simulated system is expected to become a computerized educational aid to basketball teaching and training and to replace the unscientific and stereotyped system of basketball teaching and training.

Su-Li Chin, Chun-Hong Huang, Chia-Tong Tang, Jason C. Hung
Intrinsically Motivated Intelligent Rooms

Intelligent rooms are responsive environments in which human activities are monitored and responses are generated to facilitate these activities. Research and development on intelligent rooms currently focuses on the integration of multiple sensor devices with pre-programmed responses to specific triggers. Developments in intelligent agents towards intrinsically motivated learning agents can be integrated with the concept of an intelligent room. The resulting model focuses developments in intelligent rooms on a characteristic reasoning process that uses motivation to guide action and learning. Using a motivated learning agent model as the basis for an intelligent room opens up the possibility of intelligent environments being able to adapt both to people’s changing usage patterns and to the addition of new capabilities, via the addition of new sensors and effectors, with relatively little need for reconfiguration by humans.

Owen Macindoe, Mary Lou Maher

Session 5: Smart Networking and Protocols I

Multivariate Stream Data Reduction in Sensor Network Applications

We evaluated several multivariate stream data reduction techniques that can be used in sensor network applications. The evaluated techniques include Wavelet-based methods, sampling, hierarchical clustering, and singular value decomposition (SVD). We tested the reduction methods over the range of different parameters including data reduction rate, data types, number of dimensions and data window size of the input stream. Both real and synthetic time series data were used for the evaluation. The results of experiments suggested that the reduction techniques should be evaluated in the context of applications, as different applications generate different types of data and that has a substantial impact on the performance of different reduction methods. The findings reported in this paper can serve as a useful guideline for sensor network design and construction.

Sungbo Seo, Jaewoo Kang, Keun Ho Ryu
Implementing a Graph Neuron Array for Pattern Recognition Within Unstructured Wireless Sensor Networks

Graph Neuron (GN) is a network-centric algorithm which envisages a stable and structured network of tiny devices as the platform for parallel distributed pattern recognition. However, the unstructured and often dynamic topology of a wireless sensor network (WSN) does not allow deployment of such applications. In this paper, using GN as a test-bed application, we show that a simple virtual topology overlay would enable distributed applications requiring stable structured networks to be deployed over dynamic unstructured networks without any alteration.

M. Baqer, A. I. Khan, Z. A. Baig
Building Graphical Model Based System in Sensor Networks

Consisting of a large number of sensing and computational devices distributed in an environment, a sensor network can gather and process data about a physical area in real time. Due to the limited computing power in each sensor, limited bandwidth connections, limited storage and other limitations, how to deal with the data and uncertainty knowledge is one of the most important and central problems in such kind of distributed systems. This paper presents a graphical model based intelligent system that can model the uncertainty knowledge in sensor networks. This system uses belief messages as a basis for communication. We focus on parameter learning process for building the model, and experiments are presented.

Dongyu Shi, Jinyuan You, Zhengwei Qi
Energy-Aware Broadcasting Method for Wireless Sensor Network

The communicative behaviors in Wireless Sensor Networks(WSNs) can be characterized by two different types: routing and broadcasting. The broadcasting is used for effective route discoveries and packet delivery. A blind flooding approach for broadcasting generates many redundant transmissions. The Dominant Pruning(DP) algorithm is reduced the redundant transmissions of packets based on 2-hop neighborhood information. However, in DP(include TDP/PDP) algorithm, a particular node is frequently selected as a rebroadcasting node and its life-time is shortened. As a result, DP algorithm is insufficient in terms of the overall energy dissipation in sensor network. In this paper, we propose the algorithm based on Partial Dominant Pruning(PDP) algorithm to enhance sensor network lifetime. We compare and analyze the simulation result of our algorithm with PDP.

Cheol-Min Park, Dae-Won Kim, Jun Hwang
Anonymous Routing in Wireless Mobile Ad Hoc Networks to Prevent Location Disclosure Attacks

Wireless Ad Hoc networks are particularly vulnerable due to their fundamental characteristics such as an open medium, dynamic topology, distributed cooperation and constrained capability. Location information of nodes can be critical in wireless ad hoc networks, especially in those deployed for military purposes. In this paper, we present a set of protocols for anonymous routing to prevent location disclosure attacks in wireless ad hoc networks.

Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Leonard Barolli

Session 6: Smart Environments and Systems III

The Design and Implementation of a Location-Aware Service Bundle Manager in Smart Space Environments

Ubiquitous computing as the integration of sensors, smart devices, and intelligent technologies to form a “smart space” environment relies on the development of both middleware and networking technologies. Several kinds of smart space middleware have been developed and OSGi (Open Service Gateway Initiative) was initiated mainly for interoperability support with service distribution among various middleware environments. In this paper, we analyze the weaknesses in the OSGi service platform such as a non-distributed framework, passive user management, device management, and service bundle management. Moreover, we propose that in a smart space environment, Location-aware SBM (Service Bundle Manager) is most capable of efficiently managing various service bundles. This paper concludes with the implementation results for the SBM.

Minwoo Son, Soonyong Choi, Dongil Shin, Dongkyoo Shin
A Context-Aware and Augmented Reality-Supported Service Framework in Ubiquitous Environments

We present a

C

ontext-Aware and

A

ugmented Reality-supported service

F

ram

e

work for distributed and collaborative interactions in

U

biquitous environments (U-CAFÉ). The proposed approach adopts semantic web-based context management and reasoning for supporting context-aware services. Further, it utilizes augmented reality for providing more relevant and human-centered interactions and collaborations. A semantic web representation language, Topic Map, is used to manage and reason about ubiquitous service-related contexts explicitly and systematically. Augmented reality-based interactions are used for embedding virtual models onto physical models considering contexts and for enabling bi-augmentation between virtual and physical models. The proposed framework has been successfully applied to design collaboration and intelligent home services.

Jae Yeol Lee, Dong Woo Seo
A Smart Method of Cooperative Learning Including Distant Lectures and Its Experimental Evaluations

Cooperative learning links students together to help them attain their learning objective under the guidance of teachers. With the spread of the Internet, cooperative learning has attracted educational technology interest, and research is proceeding into the use of bulletin boards, teleconferencing and chat rooms, etc., to support cooperative learning systems. However, cooperative learning systems tend to be used independently of distance learning, and very little work is being done on cooperative learning methods that include distant lectures. We believed that if remote lectures could be included in cooperative learning by students, the effectiveness of this cooperative learning could be improved. The article proposes a methodology for incorporating distant lectures in cooperative learning and provides an experimental evaluation. To evaluate this method we created a cooperative learning prototype and performed evaluations within our department.

Dilmurat Tilwaldi, Toshiya Takahashi, Yuichiro Mishima, Jun Sawamoto, Hisao Koizumi
u-KoMIPS: A Medical Image Processing System in a Ubiquitous Environment

The ubiquitous computing paradigm has made the telemedicine field being changed. However, research on the telemedicine field in a ubiquitous environment has not been carried out yet. In this paper, we have designed and implemented a ubiquitous medical image processing system for telemedicine applications based on the time-triggered message-triggered object (TMO) structuring scheme that is a distributed real-time object model. The initial version of our system is named KoMIPS (Konkuk Medical Image Processing System) that is a result of joint work with a Samsung Medical Center team. KoMIPS is a stand-alone system. Currently, KoMIPS is being extended to run on a ubiquitous environment. The extended version, named u-KoMIPS (ubiquitous KoMIPS), is designed with the TMO model and its execution environment is based on TMOSM/Linux that is an execution engine for a TMO structured program on Linux. The u-KoMIPS can acquire a medical image from various medical image scanners (e.g., MRI, CT, gamma camera, etc.) and then convert it into a DICOM image, transfer the DICOM image to one or more clients. Then, a client can analyze, process, and diagnose the DICOM image. We expect that telemedicine applications based on our system would accurately acquire a medical image from various medical image devices and efficiently analyze it.

Soo Jin Lee, Moon Hae Kim
The Extended PARLAY X for an Adaptive Context-Aware Personalized Service in a Ubiquitous Computing Environment

This paper describes the extended PARLAY X for the Adaptive Context-aware Personalized Service (ACPS) in a ubiquitous computing environment. It can be expected that the context-awareness, adaptation and personalization for the Quality of Service (QoS) / Quality of Experience (QoE) in a ubiquitous computing environment will be deployed. But the existing PARLAY X is lacking when considering QoS / QoE in network. To address this issue, this paper suggests the extended PARLAY X for ACPS. The objective of this paper is to support the architecture and the Application Programming Interface (API) of the network service for the context-awareness, adaptation and personalization in a ubiquitous computing environment. ACPS provides a user with QoS / QoE in network according to the detected context such as location, speed and user’s preference. The architecture of the extended PARLAY X for ACPS is comprised of a Service Creation Environment (SCE), the semantic context broker, and the overlay network. SCE uses Model Driven Architecture (MDA)-based Unified Modeling Language (UML) / Object Constraint Language (OCL) for an expression of context-awareness, adaptation, and personalization. The semantic context broker is a broker role between the SCE and PARLAY gateways. The overlay network is a broker role for QoS / QoE between PARLAY gateway and the IP network.

Sungjune Hong, Sunyoung Han, Kwanho Song
A Context-Aware System for Smart Home Applications

Context-awareness is an important part for ubiquitous computing. Many applications of ubiquitous computing have to access some related contexts in order to provide the right services at the right time and the right places. However, there are some challenges for applications in ubiquitous computing, especially for those in smart home. These challenges make the design of smart home applications much more difficult than other applications. Therefore, we propose a context-aware system, CASSHA (Context-Aware System for Smart Home Applications), which is designed for smart home applications. CASSHA consists of the components for processing, representation, provision, and coordination, and is able to provide required contexts for smart home applications without conflicts. The system overcomes most of the technical challenges for smart home applications, and satisfies the requirements for these applications.

Wen-Yang Wang, Chih-Chieh Chuang, Yu-Sheng Lai, Ying-Hong Wang

Session 7: Smart Computing

Human Position/Height Detection Using Analog Type Pyroelectric Sensors

Pyroelectric sensors can detect changes of infrared rays. Usually, typical pyroelectric sensors are the digital output type, used for lighting switches and security systems. We can acquire, however, limited information from such digital on or off signals. We can also acquire a wealth of sensor data by using the analog type. Thus, this paper proposes a new approach to human position detection that discriminates human height (adults or children) by using analog type pyroelectric sensors. The proposed method employs Fast Fourier Transform (FFT) to calculate human position and analyzes the spectrum distribution to discriminate between adults or children. We built an experimental room 2.5 meters square and 2.5 meters high. Analog type sensors were installed at intervals of 0.8 meters in a grid shape. The proposed position detection method can calculate human position even if two persons are in the same room. Our height detection method that discriminates between adults and children is almost 90% accurate. Future research targets are improvements in accuracy and the development of an application system using these sensors.

Shinya Okuda, Shigeo Kaneda, Hirohide Haga
ENME: An ENriched MEdia Application Utilizing Context for Session Mobility; Technical and Human Issues

We look into the combination of a SIP application (IP based multimedia telephony) together with a context-aware smart environment. We start by describing a scenario where it is highly relevant to use such a combination. The combined application is called ENME, and is managing and moving communication sessions based on user context. We are realizing the service with SIP REFER and SIP extensions. We also discuss briefly other solutions such as ’virtual terminals’, and we identify pros and cons of the different solutions. The application is implemented, and runs on a model railroad system, but the context model itself is more general. A next step would be to deploy the application in other smart environments, and we look briefly into a hospital environment. We end the paper by identifying some human issues for the service to work properly, and relate these issues to the technical solutions.

Egil C. Østhus, Per-Oddvar Osland, Lill Kristiansen
DartDataFlow: Semantic-Based Sensor Grid

We propose DartDataFlow, a semantic-base Sensor Grid to manage sense data. In our system, the data and subscriptions are all represents as RDF graph, so we provide a RDF Graph Filter to filter RDF graph to meet subscriptions. And also, we design an intelligent data dissemination framework to support different cases of data dissemination. This system integrates Semantic Web technology into Sensor Grid and can be used in intelligent transportation systems, military, weather forecast, environment monitor, etc.

Huajun Chen, Zhiyong Ye, Zhaohui Wu
Sentient Artefacts: Acquiring User’s Context Through Daily Objects

In this paper, we describe an augmentation of everyday artefact called

sentient artefact

. A sentient artefact is expected to capture the user’s specific context implicitly and naturally from its original usage since such an everyday artefact has inherent roles and functionalities. Therefore, a context-aware space is built incrementally using the specific contextual information. We show three types of everyday artefact augmentation, and propose a sensor selection framework that allows an artefact developer to systematically identify desirable sensors. Also, we discuss expectations and issues on the augmentation through prototyping.

Kaori Fujinami, Tatsuo Nakajima
A Multi-dimensional Model for Task Representation and Allocation in Intelligent Environments

In the future, homes will have numerous intelligent communicating devices, and the user would like to configure and coordinate their actions. Appliances and people in intelligent environments will have some degree of mobility. If the user wants to go from one place to another, using the same community, the agent should be able to generalize the service, trying to build an equivalent collection of coordinating services. This ‘work in progress’ paper addresses this issue by proposing a multi-dimensional model that allows visualistation of devices, temporal relationships, mutual interdependencies and the environment dynamics. The model both offers a simplified means of visualising the task space and the interdependencies together with a means of reasoning about algorithmic solutions to task processing. The work is aimed at supporting research into Pervasive Home Environment Networks (PHEN) which is funded by the UK’s Department of Trade and Industry Next Wave Technologies and Markets programme.

Victor Zamudio, Vic Callaghan, Jeannette Chin
Norms Enforcement as a Coordination Strategy in Ubiquitous Environments

Ubiquitous environments are characterized by their openness, dynamicity and autonomy. Electronic institutions are the agents’ counterpart of human organizations, which are specifically designed for providing support, trust, and legitimacy in ubiquitous applications. In this paper, we propose an algorithm for norms enforcement in electronic institutions as a coordination strategy in ubiquitous environments by introducing substitution rules that map the norms set for the electronic institution to normative rules that can be implemented in the protocols to govern agents’ interactions in ubiquitous environments.

Ismail Khalil Ibrahim, Reinhard Kronsteiner, Gabriele Kotsis

Session 8: Smart Objects

A Java-Based RFID Service Framework with Semantic Data Binding Between Real and Cyber Spaces

Recently there are getting more and more systems and applications using RFID. There is a necessity of a framework for them. This paper presents a Java-based framework that offers a set of general services to support various RFID systems for different purposes and application scenarios. The framework emphasizes on the semantic data binding for contextual information mapping between real and cyber spaces. The Java interface classes are provided to support general communications among a RFID, a reader and an application. Real and cyber spaces are synchronized via dynamic and real-time mapping from symbolic strings or IDs to the semantic XML data representations that are more effectively and efficiently useable by RFID applications. In this paper, the architecture and functional modules of the Java-based RFID service framework are explained in detail.

Kei Nakanishi, Makoto Setozaki, Jianhua Ma, Runhe Huang
Kallima: A Tag-Reader Protocol for Privacy Enhanced RFID System

Privacy is a major concern with RFID tags and many solutions have been proposed. As many approach requires secure hash function on each tag, cost of tags imposed by those solutions is significantly high for wide development. We propose a protocol that uses pre-calculated Bloom filter to send tag identity for increased privacy with little additional cost per tag. In our approach, secure hash function calculation is done in tag production phase and each tag does not have any hash functions. Instead, each tag must have random number generator and volatile memory.

Yusuke Doi, Shirou Wakayama, Masahiro Ishiyama, Satoshi Ozaki, Atsushi Inoue
Selective Collision Based Medium Access Control Protocol for Proactive Protection of Privacy for RFID

RFID is rapidly being deployed because of its versatility. However, the privacy problem cannot be handled effectively because of limited capability of RFID tags. We propose a secure medium access control(MAC) protocol to solve the privacy problem. Our secure MAC protocol defines a special kind of tag called an “ownership tag”. The singulation procedure is well defined only if the ownership tag is involved in the singulation process. Instead of scrambling the information of ordinary tag using the ownership tag’s key information and just sending ownership tag’s information in clear form, we use forced collision generated by the ownership tag to let a reader know garbage bits that are inserted in ordinary tags. Security and performance analysis for the protocol are provided.

JuSung Park, Jeonil Kang, DaeHun Nyang
iCane – A Partner for the Visually Impaired

Any modern society should be concerned over the well-being of the visually impaired citizen. It is the responsibility of the society to lessen the inconvenience and anxiety experienced by the handicapped. In addition to helping one to avoid obstacles on the sidewalks, technology can further help in navigating to places. In this paper we attempt to create a supportive environment with timely and useful information to guide the visually impaired to comfortably roam in a city that cares.

Tsung-Hsiang Chang, Chien-Ju Ho, David Chawei Hsu, Yuan-Hsiang Lee, Min-Shieh Tsai, Mu-Chun Wang, Jane Hsu

Session 9: Security and Fault Tolerance of Smart Systems I

ORAID: An Intelligent and Fault-Tolerant Object Storage Device

Hints for traditional storage system come from three aspects: file or directory attribute layout, user input and file content analysis. But in the OBS (object-based storage), object, a new fundamental storage component different from traditional storage unit (file or block), provides ample hints for storage system, which are help for designing more intelligent (or smarter) storage device. RAID (redundant arrays of independent disks) is a popular mechanism to offer fault-tolerance storage. But RAID based on file or block interface has very limited intelligence. This paper presents a novel object-based device: ORAID (object RAID). ORAID consolidates disk space of individual disk into a single storage spool and implements object-sharing and fault-tolerance through the object-interface. In ORAID, storage object is stored in form of original block fragments and their XOR verification fragments are among the disks of the device. As the higher abstract of data encapsulation, storage object provides more intelligent properties, and ORAID has more effective ability to implement online data re-layout and online capacity expansion.

Dan Feng, Lingfang Zeng, Fang Wang, Shunda Zhang
Architecture Based Approach to Adaptable Fault Tolerance in Distributed Object-Oriented Computing

To gain high level of performance in distributed object oriented computing, a required level of reliability in objects has to be maintained. This brings in a set of complex requirements into consideration. Furthermore depending on the unpredictability of the underlying environment, the replication should have architecture for the adaptable fault tolerance so that it can handle different situations of the underlying system before the system fails. We propose a mechanism for analyzing the complexity of this underlying environments and designing a dynamically reconfigurable architecture. The architecture provides the user required reliability by analyzing the performance and the reliability of the underlying environment and then either adjusting the replication degree or adaptively shifting to a suitable replication protocol. This architecture is a part of the Juice system which supports adaptation properties for a distributed environment.

Rodrigo Lanka, Kentaro Oda, Takaichi Yoshida
Security Analysis of Michael: The IEEE 802.11i Message Integrity Code

The latest IEEE 802.11i uses a keyed hash function, called

Michael

, as the message integrity code. This paper describes some properties and weaknesses of Michael. We provide a necessary and sufficient condition for finding collisions of Michael. Our observation reveals that the collision status of Michael only depends on the second last block message and the output of the block function in the third last round. We show that Michael is not collision-free by providing a method to find collisions of this keyed hash function. Moreover, we develop a method to find fixed points of Michael. If the output of the block function in any round is equal to any of these fixed points, a packet forgery attack could be mounted against Michael. Since the Michael value is encrypted by RC4, the proposed packet forgery attack does not endanger the security of the whole TKIP system.

Jianyong Huang, Jennifer Seberry, Willy Susilo, Martin Bunder
A Framework for Protecting Private Information Through User-Trusted-Program and Its Realizability

Thanks to the spread of mobile technologies, we will be able to realize the ubiquitous computing environment, in which equipment connected to the Internet assists users in their activities without special care on their part. Then, a function to protect private information is needed. This paper proposes a model for protecting private information. The basic idea of our model is to make use of private information through a program which a user trusts. A user offers a trusted program to a partner and compels a partner to make use of his private information through this program. In this way, a user prevents illegal use of his private information.

Ken’ichi Takahashi, Kouichi Sakurai, Makoto Amamiya

Session 10: Smart Networking and Protocols II

Performance Analysis of IP Micro-mobility Protocols in Single and Simultaneous Movements Scenario

The micro-mobility is an important aspect in ubiquitous communications, where the applications are anywhere and used anytime. In this paper, we analyze two solutions for IP micro-mobility. The first one is based on the Stream Control Transmission Protocol, which allows the dynamic address configuration of an association by means of the ASCONF messages. The second one is based on Session Iinitiation Protocol, which is the most popular protocol for multimedia communication over IP networks. Both in the single and simultaneous movements case, we show that for the SCTP solution, there is space for the further optimization of the handoff latency by using slight changes to the protocol. For the SIP solution, we show that for a correct and fast handoff, the SIP Server should be statefull.

Giuseppe De Marco, S. Loreto, Leonard Barolli
HMRP: Hierarchy-Based Multipath Routing Protocol for Wireless Sensor Networks

Wireless sensor networks consist of small nodes with sensing, computation, and wireless communications capabilities. The energy efficiency is a key design issue that needs to be enhanced to improve the life span of the network. In this paper, we propose a Hierarchy-Based Multipath Routing Protocol (HMRP) for wireless sensor networks. In HMRP, the network will be constructed to layered-network at first. Based on the layered-network, sensor nodes will have multipath route to sink node through some candidate parent nodes. The simulation results show that our HMRP can improve the lifetime of sensor networks

.

Ying-Hong Wang, Hung-Jen Mao, Chih-Hsiao Tsai, Chih-Chieh Chuang
On Energy-Aware Dynamic Clustering for Hierarchical Sensor Networks

This paper proposes an energy-efficient nonlinear programming based dynamic clustering protocol (NLP-DC) unique to sensor networks to reduce the consumption of energy of cluster heads and to prolong the sensor network lifetime. NLP-DC must cover the entire network, which is another basic functionality of topology control. To achieve these goals, NLP-DC dynamically regulates the radius of each cluster for the purpose of minimizing energy consumption of cluster heads while the entire sensor network field is still being covered by each cluster. We verify both

energy-efficiency

and

guarantee of perfect coverage

. Through simulation results, we show that NLP-DC achieves the desired properties.

Joongheon Kim, Wonjun Lee, Eunkyo Kim, Joonmo Kim, Choonhwa Lee, Sungjin Kim, Sooyeon Kim
Neighbor Node Discovery Algorithm for Energy-Efficient Clustering in Ubiquitious Sensor Networks

Clustering algorithm is an essential element to implement a hierarchical routing protocol, especially for a large-scale wireless sensor network. In this paper, we propose a new type of energy-efficient clustering algorithm, which maximizes the physical distance between cluster head and gateway by a neighbor node discovery mechanism. Furthermore, a slave/master patching scheme is introduced as a useful means of further improving the energy-efficiency. It has been shown that the number of cluster heads can be reduced by as many as 21% as compared with the existing clustering algorithms.

Ji Young Choi, Chung Gu Kang, Yong Suk Kim, Kyeong Hur

Session 11: Security and Fault Tolerance of Smart Systems II

A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World

We present a cryptanalysis on the short proxy signature scheme recently proposed in [11] and propose a novel short proxy signature scheme from bilinear pairings. Compared with the existing proxy signature schemes, the signature length of our scheme is the

shortest

. Our short proxy signature scheme satisfies all the properties required for proxy signatures. We prove that our scheme is secure in the random oracle model.

Xinyi Huang, Yi Mu, Willy Susilo, Fangguo Zhang, Xiaofeng Chen
The Design and Implementation of Secure Event Manager Using SPKI/SDSI Certificate

In the ubiquitous computing environment new service components should be able to connect to networks at any time, and clients also should be able to use them immediately even without extra settings. Jini is one of the widely used middlewares today. Although event management is an essential component of ubiquitous middlewares, Jini is distributed without event management service. Accordingly, we design and implement the event manager based on Jini and suggest three methods in which only right event consumer can listen to the event using Access-Control Lists and SPKI/SDSI certificates. In the proposed method, our event manager controls the access of events by putting trust checking engine on Jini.

YoungLok Lee, HyungHyo Lee, Seungyong Lee, HeeMan Park, BongNam Noh
Object Reminder and Safety Alarm

This paper introduces a novel approach to enhancing safety through RFID technology, location tracking, and monitoring person-object interaction. We design and develop RFID-based wearable devices for (1)tracking people’s locations, (2)monitoring person-object interactions, and (3)tracking objects’ locations. An intelligent object reminder and safety alert system is proposed to relief the common safety-related worries many of us face in our everyday lives – “Where did I leave my keys?”, “Did I turn off the stove?”, or “Did I close all the windows in my house?” etc. Experimental results on the precision of object identification and location tracking are also presented.

Chi-yau Lin, Chia-nan Ke, Shao-you Cheng, Jane Yung-jen Hsu, Hao-hua Chu
Synchronization and Recovery in an Embedded Database System for Read-Only Transactions

Transactions within an embedded database management system face many restrictions. These can not afford unlimited delays or participate in multiple retry attempts for execution. The proposed embedded concurrency control (ECC) techniques provide support on three counts, namely – to enhance concurrency, to overcome problems due to heterogeneity, and to allocate priority to transactions that originate from critical host.

Subhash Bhalla, Masaki Hasegawa

Session 12: Intelligent Computing

Learning with Data Streams – An NNTree Based Approach

The plasticity-stability dilemma is a key problem for learning with data streams. On the one hand, the learner must be plastic enough to adapt to the new data. On the other hand, it must be stable enough to integrate information. In this paper, we try to resolve this problem using neural network trees (NNTrees). An NNTree is a decision tree (DT) with each non-terminal node containing an expert neural network (ENN). The NNTrees are plastic because they can adapt to the new data through retraining of the ENNs and/or through generation of new nodes. The NNTrees are also stable because retraining is performed partially and locally. In this paper, we propose an algorithm that can grow NNTrees effectively and efficiently. Experiments with several public databases show that the NNTrees obtained by the proposed methods are comparable with the NNTrees or DTs obtained with all data provided all-at-once.

Qiangfu Zhao
Generating Smart Robot Controllers Through Co-evolution

To evolve robot controllers that generalize well, we should evaluate the controllers using as many environment patterns (evaluation patterns) as possible. However, to evolve the controllers faster, we should use as few evaluation patterns as possible in evaluation. It is difficult to know in advance what patterns can produce good controllers. To solve this problem, this paper studies co-evolution of the robot controllers and the evaluation patterns. To improve the effectiveness of co-evolution, we introduce fitness sharing in the population of evaluation patterns, and the inter-generation fitness in selecting good controllers. Simulation results show that the proposed method can get much better robot controllers than standard co-evolutionary algorithm.

Kouichi Sakamoto, Qiangfu Zhao
Integrated Multimedia Understanding for Ubiquitous Intelligence Based on Mental Image Directed Semantic Theory

An ideal ubiquitous computing environment can be a network system of such intelligent and human-friendly robots that never appear in front of humans except when needed. In this paper the distributed intelligent robot network (DIRN) is proposed as one kind of wireless sensor and actor networks (WSAN) consisting of one brain node and numerous sensor and actor nodes with human-friendly interfaces. In order to realize well-coordinated DIRNs, it is very important to develop a systematically computable knowledge representation language universal for any kind of device as well as efficient networking technologies. As a candidate for this purpose, the multimedia description language

L

md

was evaluated by applying it to simulation of DIRN-world interaction.

Masao Yokota, Genci Capi

Session 13: Smart Environments and Systems IV

Hyper-Interactive Video Browsing by a Remote Controller and Hand Gestures

Interactive video browsing tools are designed for e-learning applications on future interactive TVs. The integrated system includes an authoring tool that produces multi-paths videos and a playback tool that uses video tracking technology and a remote controller. The playback tool enables multi-modal interaction between the user and a multi-story video clip. Three types of hyper-interactive controls are incorporated, which include a reference link of a video object to show supplementary information on the Web, a hyper link to enable hyper-video jumps, and a choice link for online answers to pre-designed questions. The underlying video is coded using the standard MPEG technology, with navigation information hidden in the user-defined data of MPEG. Thus, the default sequence of a hypervideo can also be presented using an ordinary video player.

Hui-Huang Hsu, Timothy K. Shih, Han-Bin Chang, Yi-Chun Liao, Chia-Tong Tang
Mobile Computing with MPEG-21

In the field of multimedia content provision, many researchers investigate numerous techniques for adapting the content based on device, network, environment and user characteristics. In this paper, we present an MPEG-21 middleware design for dynamic content adaptation and we demonstrate a true mobile multimedia client that is able to communicate information about device and network characteristics and provide the necessary tools for the configuration of user preferences.

Marios C. Angelides, Anastasis A. Sofokleous, Christos N. Schizas
A Unified Context Model: Bringing Probabilistic Models to Context Ontology

Ontology is a promising tool to model and reason about context in-formation in pervasive computing environment. However, ontology does not support representation and reasoning about uncertainty. Besides, the underlying rule-based reasoning mechanism of current context-aware systems obviously can not reason about ambiguity and vagueness in context information. In this paper, we present an ongoing research on context modeling which follows the ontology-based approach while supports representation and reasoning about uncertain context. This unified context model then is used as a framework in our implementation of the context management and reasoning module of our context-aware middleware for ubiquitous systems.

Binh An Truong, YoungKoo Lee, Sung Young Lee

IFIP International Symposium on Network-Centric Ubiquitous Systems (NCUS 2005)

A Component-Based Adaptive Model for Context-Awareness in Ubiquitous Computing

A high adaptable middleware has been an essential platform to provide more flexible services for multimedia, mobile, and ubiquitous applications in ubiquitous computing environments. In addition, the persistent services of these application systems and their middleware in ubiquitous computing are required so that they can be aware of the frequent and unpredictable changes in users’ requirements as well as environmental conditions and adapt their behavioural changes. However, current approaches for supporting adaptability have made applications themselves trigger and execute an adaptive mechanism when the underling infrastructure notifies them about any changes. In this paper, we propose a novel component-based context-adaptive model for context-awareness middleware to support efficiently dynamic adaptation of application services. We also demonstrate the current implementation of the context-adaptive middleware that help applications to adapt their ubiquitous computing environments according to rapidly changing contexts such as user-specific preferences, application-specific preferences, and low-level configurations.

Soo-Joong Ghim, Yong-Ik Yoon, Ilkyeun Ra
Improvement of an Efficient User Identification Scheme Based on ID-Based Cryptosystem

In 2004, Hwang et al. proposed an efficient user identification scheme based on an ID-based cryptosystem that is suitable for the wireless/mobile environment. However, we find that their scheme is still vulnerable to impersonation attack. Accordingly, the current paper first shows the weakness of Hwang et al.’s scheme, and then presents an enhancement to resolve such problems.

Eun-Jun Yoon, Kee-Young Yoo
The Wrong Challenge of ‘Pervasive Computing’: The Paradigm of Sensor-Based Context-Awareness

This paper is concerned with providing a critical reflexion about Weiser’s vision implementation of what is supposed to appear as the new era of human computer interaction: Ubiquitous computing. The aim of this paper is not a review of the concept of Pervasive computing which is commonly, and at its advantage called Ubiquitous computing. Nor an unarguable inventory of contentions in favor of Pervasiveness or not. On contrary, this paper acknowledges a certain idea of inobtrusive interaction mobility but emits reserves of the means for realizing this vision. This paper encourages and challenges modestly the mobile computing community for adopting and reformulating new research directions for supporting Weiser’s vision.

Eric Angaman
An Abstract Model for Incentive-Enhanced Trust in P2P Networks

Peer-to-Peer (P2P) networks have emerged as a prime research topic, partly due to the vast unexploited possibilities unrestricted distribution of the workload provides. The main hindrance for unrestricted exploitation of the P2P topology is, due to lack of security-related issues, the gullible attitude taken towards unknown agents. Therefore, the severity of the vulnerabilities caused by gullibility must be mended by other means, for example, by an effective incentive scheme encouraging agents to trustworthy behaviour. This paper presents an abstract model for incentive enhanced trust, to progressively assign the participating agents rights for accessing distributed resources, emphasising consistent behaviour. The model consists of a degrading formula, an illustrative incentive triangle and a best-effort distributed supervision model. Moreover, the same incentive model facilitates anticipation of future behaviour concerning any given agent founded on several distinct agents’ opinion, suggesting that any knowledge concerning the counterpart is better than none.

Mats Neovius
Construction of Credible Ubiquitous P2P Content Exchange Communities

This paper describes methods for suppressing illegal behavior in P2P networks to construct ubiquitous P2P content exchange communities. Although rigid digital rights management has been established elsewhere, it requires rather a large processing load and time, and it is mainly effective at preventing illegal behavior of end users. Here, we propose a more efficient method for processing content distribution. It aims to control content exchange so that illegal activities can be reduced to a sufficiently low level. By observing content exchange interactions in rendezvous points, it detects illegal activities and identifies which peer performed them. Simulation results show the effectiveness of the proposal.

Yuki Yokohata, Hiroshi Sunaga, Hiroyuki Nakamura
Location-Based Routing Protocol for Energy Efficiency in Wireless Sensor Networks

Energy efficiency in wireless sensor networks is an important design consideration. We present a location-based routing protocol for energy efficiency in wireless sensor networks called GPSR-S(Greedy Perimeter Stateless Routing for wireless

S

ensor networks). GPSR-S is based on GPSR, which is one of the most well-known location-based routing protocols for wireless ad hoc networks. We improve the energy efficiency of GPSR by considering nodes’ energy level and location information. In addition, we modify the address-centric nature of the algorithm into a data-centric one. Simulation results show that GPSR-S performs well in terms of energy efficiency and the number of packets. GPSR-S delivers approximately 10% fewer packets than GPSR, but the lifetime of the network is 10% greater.

Hyuntae Cho, Yunju Baek
Efficient Access of Remote Resources in Embedded Networked Computer Systems

Fixed networks of limited resource heterogeneous computers need to allow applications to access remote devices in order to overcome any local resource deficiencies. Current operating systems would use a file system, network stack and middleware to implement such access but the volume of functionality involved can be a barrier to performance. This paper examines the 2.4 series Linux kernel to show that networked operating systems lack flexibility and performance in this environment. It also presents a low level approach that can reduce the overheads incurred and improve performance when remote devices are accessed.

Paul S. Usher, Neil C. Audsley
Lightweight Ontology-Driven Representations in Pervasive Computing

A clearly specified representation of diverse entities is needed to refer to them in pervasive computing applications. Examples of such entities include physical objects, operations, sensor and actuator resources, or logical locations. We propose a novel way to systematically generate representations of entities for programmable pervasive computing platforms made of tiny embedded nodes. Our original idea is to generate a very lightweight, though semantically-rich, representation from a possibly complex ontological specification. At the platform development phase, a domain ontology is used to describe the target environment. A preprocessing tool produces the ontology-driven, lightweight representation, which comes in two flavors: a human-readable one, to be used for programming, and a binary one, to be used at runtime. Our approach makes it possible to take advantage of all the benefits of ontology-based modeling and, at the same time, to obtain a representation light enough to be embedded in even the tiniest nodes.

Jarosław Domaszewicz, Michał Rój
Object Tracking Using Durative Events

This paper presents a distributed middleware architecture based on a service-oriented approach, to manage high volume sensor events. Event management takes a multi-step operation from event sources to final subscribers, combining information collected by wireless devices into higher-level information or knowledge. An event correlation service provides sophisticated event filtering, aggregation and correlation over time and space in heterogeneous network environments. An experimental prototype in the simulation environment with real world data produced by the Active BAT system is shown.

Eiko Yoneki, Jean Bacon
Design of Integrated Routing System for Mobile Ad Hoc Networks Overlaying Peer-to-Peer Applications

This paper proposes a novel distributed routing system for integration between peer-to-peer (P2P) applications and mobile ad hoc networks (MANETs). This system takes advantage of the “zone” concept to reduce the multicast flooding. Significantly, the system investigates a mechanism to integrate key lookup in the application layer with routing in the link layer. The routing method provides a general-purpose technique that is not limited to any specific P2P applications. This paper presents the design of the routing system and sketches the layered architecture built according to the system functions.

Yan Annie Ding, David Everitt
A Design of Privacy Conscious RFID System Using Customizing Privacy Policy Based Access Control

Recently, research related to RFID technology has progressed vigorously for the ubiquitous world. However, the privacy violation on tags embedded in products has become a major stumbling block. This paper suggests a new architecture for a user-friendly and secure RFID service, which uses customizing privacy policy based access control for collection or gathering of tagged information in an RFID information system. Proposals on feasible security mechanisms for low cost RFID systems and analyses of these mechanisms from both security and privacy points of view are also presented. The proposed architecture of an RFID privacy enhancing middleware system can expend the multi-domain level for various user services. Consequently, the proposed scheme effectively protects against abuse of tag related personal information using a consumer-configured privacy policy.

Byungil Lee, Howon Kim
Efficient Resource Management Scheme of TCP Buffer Tuned Parallel Stream to Optimize System Performance

GridFTP is a high-performance, secure and reliable parallel data transfer protocol, used for transferring widely distributed data. Currently it allows users to configure the number of parallel streams and socket buffer size. However, the tuning procedure for its optimal combinations is a time consuming task. The socket handlers and buffers are important system resources and must therefore be carefully managed. In this paper, an efficient resource management scheme which predicts optimal combinations based on a simple regression equation is proposed. In addition, the equation is verified by comparing measured and predicted values and we apply the equation to an actual experiment on the KOREN. The result demonstrates that the equation predicts excellently with only 8% error boundary. This approach eliminates the time wasted tuning procedure. These results can be utilized directly and widely for the fast decision in typical applications such as GridFTP.

Kun Myon Choi, Eui-Nam Huh, Hyunseung Choo
Multi-level Service Differentiation Scheme for the IEEE 802.15.4 Sensor Networks

In the sensor networks, the data packets transmitted by the different devices in the home networking and the industrial application maintain the different levels of importance. In this paper, we propose two mechanisms for the IEEE 802.15.4 sensor networks to provide the multi-level differentiated services which are required by each and every device. The mathematical model based on the discrete-time Markov chain is presented and is analyzed to measure the performances of the proposed mechanisms. The numerical results show the effect of the variation of the contention window size and the backoff exponent for the service differentiation on the 802.15.4 sensor networks. From the results, we derive that the contention window size is more affective than the backoff exponent on the service differentiation while the backoff exponent is more affective than the contention window size on the average delay of every device. Simulation results are also given to verify the accuracy of the numerical model.

Euijik Kim, Meejoung Kim, Sungkwan Youm, Seokhoon Choi, Chul-Hee Kang
Development of Event Manager and Its Application in Jini Environment

Ubiquitous computing services have to adapt to the context information. These services have to communicate with each other through fixed network or ad-hoc, it is the ubiquitous middleware to be able to help those services. With regard to the adaptation of middleware’s components, context manager and event manager are required. Recently there is a widely used middleware, Jini, but it is distributed without the event manager services. Therefore we implement the event manages which can manage events in Jini environments, and describe ubiquitous computing applications running environment using our event management system. Our event manager is implemented by modifying Javaspaces.

YoungLok Lee, HyungHyo Lee, Seungyong Lee, InSu Kim, BongNam Noh
On Scalability and Mobility Management of Hierarchical Large-Scale Ad Hoc Networks

With the increased interest in the mobile wireless communication, the development of large-scale ad hoc networks has drawn a lot of attention and the scalability of ad hoc networks has been the subject of extensive research. The ad hoc network topology changes frequently and unpredictably, and mobility become extremely challenging in the circumstance. So, the broadcast storm becomes a very serious problem to migrate into such networks for the applications of group communications. The main concept of virtual subnet technology is the capability to group users into broadcast domains, which divides a virtual subnet into logic, instead of physical, segments and reduces the traffic overhead. With this characteristic, we propose an interoperability network model integrating self-organizing ad hoc networks and the Internet/a conventional network with the partition of physical/virtual subnets. Moreover, we describe a protocol to establish the virtual broadcast domains by using the IPv6 addressing concept in ad hoc networks and perform IP-based network communications in a multi-switch backbone. The hierarchical networks, physical/virtual subnets, addressing method and mobility management are described, and some performance issues are evaluated.

Ming-Hui Tsai, Tzu-Chiang Chiang, Yueh-Min Huang
Exploring Small-World-Like Topologies Via SplitProber: Turning Power Laws into an Advantage in Unstructured Overlays

Recent unstructured Peer-to-Peer systems, represented by Gnutella and Freenet, offer an administration-free and fault-tolerant application-level overlay network. While elegant from a theoretical perspective, these systems have some serious disadvantages. First, due to knowing very little about the nature of the network topology, the search algorithms operating on these networks result in fatal scaling problems. Second, these systems rely on application-level routing, which may be inefficient with respect to network delays and bandwidth consumption. In this paper, we propose a novel search algorithm, called

SplitProber

, to explore the small-world-like topologies of these networks efficiently and scalablely, by turning the power-law degree distributions in these networks to an advantage, and by making discriminative use of nodes according to their different roles in the network. As a result, we are able to reconcile the conflict of remedying the mismatch between the overlay topology and its projection on the underlying physical network, while at the same time navigating these networks with a guaranteed high efficiency and using only local knowledge as cues. Our simulation results indicate that the proposed algorithm outperforms several other well-known methods with significant performance gains.

Xinli Huang, Wenju Zhang, Fanyuan Ma, Yin Li
Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE 802.16 System

The IEEE 802.16, broadband fixed wireless access standard, defines four service classes, USG, rtPS, nrtPS and BE on high speed wireless networks. To guarantee the QoS requirement of these classes, the subscriber station and base station require scheduling architecture and algorithm. However, the IEEE 802.16 does not define any scheduling architecture or algorithm, and the most existing scheduling mechanisms only focus on working at the BS. In this paper, we propose two types of scheduling architecture working at the SS. In the one-level scheduler, we use a flow queue and class queue by differentiating flows with their class priority. The two-level scheduler can provide more organized QoS service with complementing the one-level scheduler. Adapting these architectures makes scheduler efficiently control all types of traffic defined in the IEEE 802.16. In the proposed architecture, any scheduling algorithms such as SCFQ and EDF can be applied. We evaluate the proposed scheduling architecture by simulation. The results of the simulation show that our proposed architecture can use the bandwidth efficiently.

Woo-Jae Kim, Joo-Young Baek, Sun-Don Lee, Young-Joo Suh, Yun-Sung Kim, Jin-A Kim
A Survey of Anonymous Peer-to-Peer File-Sharing

This paper provides a survey of searchable, peer-to-peer file-sharing systems that offer the user some form of anonymity. We start this survey by giving a brief description of the most popular methods of providing anonymous communication. These include the Ants protocol, Onion routing, Multicasting, MIXes and UDP address spoofing. We then describe a number of implemented systems based on one, or a combination of, these methods. Finally, we discuss possible attacks on the anonymity of these systems and give examples of particular attacks and defences used by the systems we describe.

Tom Chothia, Konstantinos Chatzikokolakis
A Churn-Resistant Strategy for a Highly Reliable P2P System

This paper proposes a churn-resistant strategy designed on top of a highly reliable P2P overlay network [1], with degree

$2{\it\Delta} +2$

, where

${\it\Delta}$

is the degree of a De Bruijn digraph [2]. We show that when each node in the network periodically retransmits only one KEEPALIVE message to one of its neighbors in the network, any node’s failure can be detected within an optimal timeout. As a major contribution, we demonstrate that even in failure situations the lookup of any available resource is achieved with the lowest possible maintenance overhead

O

(1) along the shortest path of length

D

CMR

=

${\rm log}_{\it\Delta}$

(

N

(

$\it\Delta$

–1)+

${\it\Delta}$

) – 1 with

N

being the maximal number of nodes in the network.

Giscard Wepiwé, Sahin Albayrak
Building a Peer-to-Peer Overlay for Efficient Routing and Low Maintenance

Most of current structured P2P systems exploit Distributed Hash Table (DHT) to archive an administration-free, fault tolerant overlay network and guarantee to deliver a message to its destination within

O

(

logN

) hops. While elegant from a theoretical perspective, those systems face difficulties in a realistic environment. Instead of building P2P overlays from a theoretical perspective, this design tries to construct an overlay from the physical network. By combining different network topology aware techniques, a distinctive overlay structure closely matching the Internet topology is created. The P2P overlay based on this structure is not only highly efficient for routing, but also keeps maintenance overhead very low even under highly dynamic environment.

Honghao Wang, Yimingf Hu
Dynamic Object Assignment in Object-Based Storage Devices

Object-based Storage Devices (OSDs) are the building block of Object-based Storage Systems. Object assignment in OSDs can largely affect the performance of OSDs. A real-time object assignment algorithm is proposed in the paper. The algorithm aims at minimizing the variance of Mean Response Time (MRT) across disks. To address the online problem with

a priori

unknown workload parameters, the algorithm employs an adaptive mechanism to estimate the parameters of workloads. The simulation results show that the algorithm can effectively balance the MRT in the disk I/O sub-systems.

Lingjun Qin, Dan Feng
Dynamic Resource Discovery for Sensor Networks

As sensor networks mature the current generation of sensor networks that are application-specific and exposed only to a limited set of users will give way to heterogeneous sensor networks that are used dynamically by users that need them. The available sensors are likely to be dynamic (e.g., due to mobility) and heterogeneous in terms of their capabilities and software elements. They may provide different types of services and allow different configurability and access. A critical component in realizing such a vision is

dynamic resource discovery

. In this paper, we develop a resource discovery protocol for sensor networks, outline some of the challenges involved, and explore solutions to some of the most important ones. Specifically, we first discuss the problem of what resources to track and at what granularity: in addition to the individual sensor capabilities, some resources and services are associated with sensor networks as a whole, or with regions within the network. We also consider the design of the resource discovery protocol, and the inherent tradeoff between interoperability and energy efficiency.

Sameer Tilak, Kenneth Chiu, Nael B. Abu-Ghazaleh, Tony Fountain
Survey on Location Authentication Protocols and Spatial-Temporal Attestation Services

A survey on location authentication protocols and spatial-temporal attestation services is presented. Several protocols and services with these objectives have been proposed during the last decade, but still there is a lack of understanding of the security properties they should provide and which security mechanisms are appropriate. We first define the goals and threat model of location authentication protocols, next they are described and analyzed against this model. Also, spatial-temporal attestation services are described and classified depending on their goal and kind of issued evidence.

A. I. González-Tablas, K. Kursawe, B. Ramos, A. Ribagorda
Predicate Detection Using Event Streams in Ubiquitous Environments

Advances in clock synchronization techniques for sensor networks as well as wireless ad-hoc networks allow an approximated global time for an increasing number of configurations in ubiquitous and pervasive computing environments. This paper presents an event stream based on-line algorithm that fuses the data reported from the heterogenous processors in the network to detect predicates of interest. The algorithm detects properties that can be specified using predicates under a rich palette of time modalities. The algorithm has low space, time, and message complexities. The main idea used to design the algorithm is that the predicate is decomposed as a collection of predicates between pairs of system devices. The algorithm leverages the

pairwise interaction

between processes so as to incur a low overhead and hence be highly scalable.

Ajay D. Kshemkalyani

The First International Workshop on Security in Ubiquitous Computing Systems (SecUbiq 2005)

Image Watermarking Technique Based on Two-Dimensional Chaotic Stream Encryption

This paper proposes a kind of wavelet domain image digital watermarking technique using two-dimensional chaotic stream encryption and human visual model. A stream encryption algorithm based on two-dimensional Logistic chaotic map is researched and realized for meaningful grayscale watermarking image. The block embedding intensity is calculated and combined with the human visual model, so that the embedding and detection steps of encrypted binary watermark can be adaptively fulfilled in the wavelet coefficients of the host image. The experimental results have shown that this watermarking technique can endure regular digital image processing and have preferable performance.

Hanping Hu, Yongqiang Chen
Identity-Based Universal Designated Verifier Signatures

The notion of Universal Designated Verifier Signatures (UDVS) was introduced in the seminal paper of Steinfeld

et. al.

in [6]. In this paper, we firstly propose a model of identity-based (ID-based) UDVS schemes. We note that there are two methods to achieve an ID-based UDVS scheme. We provide two constructions of ID-based UDVS schemes based on bilinear pairings that use the two methods that we have identified. We provide our security proof based on the random oracle model.

Fangguo Zhang, Willy Susilo, Yi Mu, Xiaofeng Chen
Short Designated Verifier Proxy Signature from Pairings

In a designated verifier proxy signature scheme, the original signer delegates her/his signing capability to the proxy signer in such a way that the latter can sign messages on behalf of the former, but only the designated verifier can believe the validity of these signatures. In this paper, we firstly describe the notion of short designated verifier proxy signature, which we call SDVPS. Then a concrete scheme is presented. We prove that the proposed scheme is unforgeable even to the original signer under the Gap Bilinear Diffie-Hellman assumption and Random Oracle Model.

Xinyi Huang, Yi Mu, Willy Susilo, Futai Zhang
An Embedded Gateway Based on Real-Time Database

Because of the limitation of the traditional gateway in the distributed monitoring system, the access of the protocol translation gateway will increase drastically with the massive usage of Ethernet. By using M/M/1 queuing theories, we present a framework of gateway based on the real-time database. The whole gateway is divided into two parts. One is linked to the monitoring subnet to collect the data with a polling method and deposit them in real-time database of the gateway. The other part is used for accepting the TCP connecting request, accessing the real-time database of the gateway. By analysis of the M/G/1 theory, it can be concluded that this framework can not only update the data more quickly in the distributed observing and controlling subnet, but also reduce the rejection of connections and loss of packet caused by the full queue buffer effectively when the number of TCP links become larger.

Zhiping Jia, Xinxiao Qiao
Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks

The security deployment in mobile ad hoc networks is frequently hampered by resource constraints. The current routing systems of mobile ad hoc networks deploy very weak security techniques in order to copy with the computational overhead and bandwidth consumption. In this paper, we present an ID-based online/offline signature scheme which provides a full scale of security with sound performance. We show that our scheme is secure against existential forgery under adaptive chosen message attacks.

Shidi Xu, Yi Mu, Willy Susilo
Collision Attack on XTR and a Countermeasure with a Fixed Pattern

Recently, XTR is considered as one of good candidates for more energy efficient cryptosystems. Among the family of XTR algorithms, the Improved XTR Single Exponentiation (XTR-ISE) is the most efficient one suitable for ubiquitous computer. Even though the security of such devices against side channel attacks is very dangerous, there are few works on side channel attacks against XTR-ISE. In this paper we propose a new collision attack on XTR-ISE. The analysis complexity of the proposed one is about 2

40

where the key size is 160-bit, which is 55% improvement from the previously best known analysis of Page-Stam. We also propose a novel countermeasure using a fixed pattern which is secure against SPA. In the sense of both efficiency and security the proposed countermeasure is the best one among the previous countermeasures- it is about 30% faster.

Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim, Ho Won Kim, Kyo Il Chung
Security in Persistently Reactive Systems

From the viewpoints of dependable computing and ubiquitous computing, a new type of reactive systems, named

Persistently Reactive Systems

, was proposed. Persistently reactive systems cause some new security issues because of their continuous and persistent running without stopping their services. Based on the recognition that a persistently reactive systems can be constructed following the methodology of soft system buses, this paper defines security issues in persistently reactive systems with security requirements and security functions. To solve the issues, we propose a framework of SSB-connector, such that designers and developers can easily design and develop reliable and secure functional components of a persistently reactive system.

Takumi Endo, Junichi Miura, Koichi Nanashima, Shoichi Morimoto, Yuichi Goto, Jingde Cheng
ID-Based Access Control and Authority Delegations

In ubiquitous computing environments, a user can utilize a certain service in anywhere and anytime using any devices, then authentication and authorization are crucial for security in pervasive computing. In this paper, we propose a new ID-based access control model adequate for ubiquitous computing. We eliminate the use of X.509 certificates of trusted parties for authentication and allow ID-based authority delegations for flexible access control in distributed networks. We implement our proposed model using a bilinear map such as Weil pairing, and we prove the security of the proposed model against chosen-message attack under the random oracle model.

So-Young Park, Sang-Ho Lee
How to Construct Secure Cryptographic Location-Based Services

Recently, ubiquitous computing / networks have been studied actively. These networks provide services depending on real environments of mobile nodes. Especially, we expect location-based services (LBSs), which rely on location of mobile nodes, are anticipated to come into wide use in the future. High-value LBSs require cryptography to ensure security. Here, cryptographic LBSs comprise a key management function (e.g. key sharing with nodes) and a location management function (e.g. location verification of nodes). Cooperation between key and location management functions realizes cryptographic LBSs. However, these functions have mostly been studied individually. This study indicates that cryptographic LBSs are insecure if the cooperation is incomplete, and proposes a method of constructing secure cryptographic LBSs.

Jun Anzai, Tsutomu Matsumoto
A Key Management Scheme for Mobile Ad Hoc Networks Based on Threshold Cryptography for Providing Fast Authentication and Low Signaling Load

Providing secure communications is a crucial task for the success of future ubiquitous mobile communication systems. Using public key infrastructure (PKI) is considered as a good solution to fulfill the task. However, as mobile ad hoc networks (MANET) inherit unique characteristics such as dynamic topology, non-infrastructure architecture, centralized PKI architectures are not suitable for dynamic MANET. The use of distributed PKI models is more appropriate but requires additional modifications to adapt with network changes. In this paper, we introduce a novel key management scheme for MANET, which exploits advantages of threshold cryptography. The major innovative aspect of this scheme is the use of temporal substitute certificate authorities (SCA), which form a PKI model of multi SCA groups. Performance results obtained by computer simulation show that the proposed key management scheme can reduce the latency of authentication, certificate update delay and the signaling load.

Hoang Nam Nguyen, Hiroaki Morino
Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow

For the security technology that has been achieved with software in the computer system and the protection of the intellectual property right of software, software protection technology is necessary. One of those techniques is called obfuscation, which converts program to make analysis difficult while preserving its function. In this paper, we examine the applicability of our program obfuscation scheme to complicate control flow and study the tolerance against program analysis.

Tatsuya Toyofuku, Toshihiro Tabata, Kouichi Sakurai
Authenticated Public Key Distribution Scheme Without Trusted Third Party

Public key authentication is necessary to prevent a valid public key of a user from being compromised by a malicious user. Namely, if it is not provided, an adversary can read all encrypted messages between a sender and a receiver by substituting the public key of the receiver with her public key. In general, a certificate issued from and digitally signed by a publicly trusted certificate authority (CA) guarantees public key authentication under the assumption that all users can get the public key of the CA to verify the validity of certificates,

i.e.

, the signatures of the CA. The assumption is practical and widely used in the real world. However, if the CA is down by a system faults or destroyed by a terror or a war, the assumption can not be preserved. In this paper, we propose a simple and practical scheme for public key authentication without any trusted third party. The scheme basically uses a message authentication code (MAC) taking a short random value as a key to authenticate the exchanged public keys. Our scheme also can be adopted in the environments such as ad-hoc or ubiquitous in which it is hard to settle a publicly trusted authority.

Jae Hyung Koo, Bum Han Kim, Dong Hoon Lee
Cryptanalysis of a Generalized Anonymous Buyer-Seller Watermarking Protocol of IWDW 2004

In this paper, we analyze the security of a generalized anonymous buyer-seller watermarking protocol recently proposed by Choi and Park at IWDW 2004. We prove that it has not met the designers’ intended security criteria by showing that an attacker can actually: (1) discover the unique buyer’s watermark which was chosen by the watermark certificate center (

WCC

), and (2) decrypt the encrypted watermarked digital content without any extra cost. Also, it is surprising to note that when designing their protocol, the designers did not take into consideration the conspiracy attacks.

Bok-Min Goi, Raphael C. -W. Phan, M. U. Siddiqi
Efficient RFID Authentication Protocol for Ubiquitous Computing Environment

Radio Frequency identificiation (RFID) will become an important technology in remotely object identification systems. However, the use of RFID tags may create new threats to the security and privacy of individuals holding RFID tags. These threats bring several problems which are information leakage of a tag, location trace of individuals and impersonation of a tag. Low-cost RFID systems have much restrictions such as the limited computing power, passive power mechanism and low storage space. Therefore, the cost of tag’s computation should be considered as an important factor in low-cost RFID systems. We propose an authentication protocol, OHLCAP which requires only

one

one-way hash function operation and hence is very efficient. Furthermore, our protocol is suitable to ubiquitous computing environment.

Eun Young Choi, Su Mi Lee, Dong Hoon Lee
A New Simple Authenticated Key Agreement and Protected Password Change Protocol

In 2005, Chang et al. proposed a simple authenticated key agreement and protected password change protocol. However, Chang et al.’s schemes are still susceptible to stolen-verifier attack and Denial-of-Service attacks. Accordingly, the current paper demonstrates the vulnerability of Chang et al.’s schemes to two simple attacks and then presents an improved scheme to resolve such problems. In contrast to Chang et al.’s protected password change protocol, the proposed protected password change protocol can securely update user passwords without a complicated process, while also providing greater security.

Eun-Jun Yoon, Kee-Young Yoo
A Method for Deciding Quantization Steps in QIM Watermarking Schemes

In this paper, we propose a method for enlarging quantization steps of a QIM watermarking scheme which determines the perceptual quality and robustness of the watermarked images. In general, increasing the quantization steps leads to good robustness but poor perceptual quality of watermarked images and vice versa. However, if we choose the quantization steps considering the expected quantization results as well as the original images, we can increase both robustness and perceptual quality of the watermarked images.

Yunho Lee, Kwangwoo Lee, Seungjoo Kim, Dongho Won, Hyungkyu Yang
A New DDoS Detection Model Using Multiple SVMs and TRA

Recently, many attack detection methods adopts machine learning algorithm to improve attack detection accuracy and automatically react to the attacks. However, the previous mechanisms based on machine learning have some disadvantages such as high false positive rate and computing overhead. In this paper, we propose a new DDoS detection model based on multiple SVMs (Support Vector Machine) in order to reduce the false positive rate. We employ TRA (Traffic Rate Analysis) to analyze the characteristics of network traffic for DDoS attacks. Experimental results show that the proposed model is a highly useful classifier for detecting DDoS attacks.

Jungtaek Seo, Cheolho Lee, Taeshik Shon, Kyu-Hyung Cho, Jongsub Moon
PPF Model with CTNT to Defend Web Server from DDoS Attack

We present a probabilistic packet filtering (PPF) model to defend the Web server against Distributed Denial-of-Service (DDoS) attacks. To distinguish abnormal traffics from normal ones, we used Concentration Tendency of Network Traffic (CTNT). The CTNT mechanism computes the ratio of a specific type of packets among the total amount of network packet, and detects abnormal traffic if and only if the computed ratio exceeds the ratio in normal situation. If the CTNT mechanism detects DDoS attacks, the proposed model probabilistically filters the packets related to these. The simulation results demonstrate it is useful to early detect DDoS attacks. Furthermore, it is effective to protect the Web servers from DDoS attacks.

Jungtaek Seo, Cheolho Lee, Jungtae Kim, Taeshik Shon, Jongsub Moon
Efficient Key Agreement for Merging Clusters in Ad-Hoc Networking Environments

In this paper, we study a simple scheme that can effectively deal with merging different adjacent clusters in ad-hoc networks. When nodes of each cluster have already agreed on their own group keys and intend to merge themselves for further secure communications, our scheme can be used in an efficient and secure way.

Sooyeon Shin, Taekyoung Kwon
An Effective Method for Location Privacy in Ubiquitous Computing

In ubiquitous computing environment, every service should have the characteristic of context-awareness. Since physical location is important information to grasp a user’s context, the service provider should maintain the location information of the user to provide necessary service. When a malicious user acquires the location information of any other user, it is possible that he/she deduces the context of the user. Although there have been many researches for the problem, previous methods impose complex computation and many subjects requires on the system in order to gain acceptable anonymity. In this paper, we propose an effective method that protects the location privacy in ubiquitous computing environment. This method prohibits the malicious user from hijacking the location information by diffusing the information. It also confuses the attacker with transmitting dummy messages as normal users do.

Gunhee Lee, Wonil Kim, Dong-kyoo Kim
Integrated Support for Location Aware Security Services in Enterprise Wireless Networks

In wireless computing environments limiting network access to authorized users is paramount for the overall security of network. In addition to basic authentication framework, network access is also governed by the context in which it is being used. In this work, we address security issues based on one such context: location. Location sensitivity is increasingly becoming an integral aspect of wireless and pervasive applications. As user moves around in an ubiquitous environment, access rights and other security services provided to her need to be evaluated accordingly. For such purposes we need a security mechanism that controls the authentication and other security services based on location, in addition to basic identity information. In this paper, we present an architecture of location aware security services for enterprise wireless networks. Our implementation is integrated into the RADIUS system, an Authentication, Authorization and Accounting (AAA) framework. Performace evaluation shows that our implementation is efficient for location based security services.

Zhaoyu Liu, Peeyush Sharma, Jian Raymond Li

The 1st International Workshop on RFID and Ubiquitous Sensor Networks (USN 2005)

Session 1: RFID

Optimal Scheduling for Networks of RFID Readers

Devising switching schemes for networks of colliding and correlated RFID readers is a core challenge in the deployment of RFID networks. We derive optimal scheduling schemes for readers in RFID networks in four cases of practical importance. Most other cases can be reduced to a combination of these basic cases.

Vinay Deolalikar, John Recker, Malena Mesarina, Salil Pradhan
PULSE: A MAC Protocol for RFID Networks

The reader collision problem occurs when the signal from one reader interferes with the signal from other readers. Solutions like RTS-CTS are not applicable because a reader may communicate with multiple tags simultaneously. In this paper, we describe Pulse, a distributed protocol to reduce reader collisions. The operation of the Pulse protocol is based on periodic beaconing on a separate control channel by the reader, while it is reading the tags. The protocol functions effectively with fixed as well as mobile RFID readers. We show, using simulation in QualNet, that using Pulse protocol, the throughput (overall read rate) is increased by as high as 98%(with 49 readers) as compared to “Listen Before Talk” (CSMA) and by 337%(with 9 readers) as compared to Colorwave. We also present an analytical model for our protocol in a single hop scenario.

Shailesh M. Birari, Sridhar Iyer
RFIDcover – A Coverage Planning Tool for RFID Networks with Mobile Readers

Radio Frequency Identification (RFID) finds use in numerous applications involving item identification and tracking. In a typical application, RFID tags are attached to the items and are periodically queried by readers. Using a fixed placement of readers to guarantee complete coverage of all tags in a given area at all times increases the deployment costs. Also, most practical applications do not need complete coverage at all times. It is enough to provide complete coverage periodically, say each tag being covered every

τ

seconds. For such applications, using mobile readers to cover the area would be more cost-effective.

Given an area to be covered completely within a period

τ

, determining the number of mobile readers required, their placement and movement pattern, is a difficult problem. We have developed

RFIDcover

, an automated coverage planning tool, that addresses this problem. Given an application scenario and reader specifications,

RFIDcover

determines an optimal number of readers required to guarantee complete coverage within the specified period

τ

. It also generates a layout giving the placement and movement pattern of the readers. The architecture of

RFIDcover

is generic and extendible, making it easy to implement different application scenarios. In this paper, we present

RFIDcover

implementation for a retail inventory tracking application scenario and evaluate its effectiveness.

S. Anusha, Sridhar Iyer
Vibration Powered Battery-Assisted Passive RFID Tag

Real-time supply chain management, theft prevention, and environmental monitoring motivate the need for RFID systems. Battery-assisted RFID tags increase read range and reliability; however, batteries offer only a finite lifetime solution. Hence, an experiment in powering a battery-assisted passive RFID tag using ambient vibration energy was conducted. A piezoelectric power generator was designed at a resonant frequency of 52 Hertz, with potential power output of 500

μ

W. Manipulation of the electric signal from the generator through a power circuit produced 8mW pulses to the tag, resulting in successful communication with the reader. Power needs were compared to an earlier experiment in powering a Mica2Dot “Mote” showing a 88% decrease in necessary power supply and 90% decrease in charge time.

Elaine Lai, Andrew Redfern, Paul Wright
Wireless RFID Networks for Real-Time Customer Relationship Management

A new system for real-time customer relationship management is proposed. The system is based on deploying a network of RFID readers throughout an environment. Information about the presence or lingering of participating customers at different times of day is collected providing valuable marketing information for better service provision. The implementation of the proposed system includes a database management program and an intuitive user interface allowing real-time access to the data acquired by the network.

Philipp Schloter, Hamid Aghajan
Tree-Based Classification Algorithm for Heterogeneous Unique Item ID Schemes

For RFID-based applications, the uniqueness of ID assigned to each RFID tag should be guaranteed. Several research/standard organizations such as EPCglobal, ISO/IEC, Ubiquitous ID Center, and so on, have developed their own Unique Item ID (UII) specifications. The existence of various UII schemes may cause interoperability problems between applications using different UII schemes when those applications are operated on future global Internet network environment. In addition, it is expected that the traffic for UII query will be increased ten-times higher than that for DNS query in the current Internet. In order to overcome these problems, this paper proposes a fast tree-based classification algorithm applicable for various UII schemes, which can make it efficient to construct global directory lookup services for RFID applications with various UII schemes. Since the proposed scheme can be operated on readers, it can not only distribute traffic loads for UII queries, but also global RFID networks.

Yong Hwan Lee, Hee Jung Kim, Byeong-hee Roh, S. W. Yoo, Y. C. Oh
An Efficient Key Pre-distribution Scheme for Secure Distributed Sensor Networks

Wide-spread deployment of sensor networks is emerging and it presents an economical solution to numerous problems. A number of applications are dependent on secure operation of the sensor network, however, and serious consequences are incurred if the network is compromised or disrupted. In the existing key pre-distribution scheme suitable for low power and resource sensor nodes, shared key is not guaranteed to be found and mutual authentication is not allowed. This paper thus proposes a new key pre-distribution scheme guaranteeing that any pair of nodes can find a common secret key between themselves by using the keys assigned by LU decomposition of a symmetric matrix of a pool of keys. Furthermore, it allows node-to-node mutual authentication. Analysis shows that the existing scheme requires a large number of keys in each sensor node to display a comparable performance as the proposed scheme. Therefore, the superiority of the proposed scheme is more substantial when the memory size of the sensor node is small.

Sung Jin Choi, Hee Yong Youn

Session 2: USN

Energy-Driven Adaptive Clustering Hierarchy (EDACH) for Wireless Sensor Networks

Wireless sensor network consists of small battery powered sensors. Therefore, energy consumption is an important issue and several schemes have been proposed to improve the lifetime of the network. In this paper we propose a new approach called energy-driven adaptive clustering hierarchy (EDACH), which evenly distributes the energy dissipation among the sensor nodes to maximize the network lifetime. This is achieved by using proxy node replacing the cluster-head of low battery power and forming more clusters in the region relatively far from the base station. Comparison with the existing schemes such as LEACH (Low-Energy Adaptive Clustering Hierarchy) and PEACH (Proxy-Enabled Adaptive Clustering Hierarchy) reveals that the proposed EDACH approach significantly improves the network lifetime.

Kyung Tae Kim, Hee Yong Youn
A Load-Balancing and Energy-Aware Clustering Algorithm in Wireless Ad-Hoc Networks

Wireless ad-hoc network is a collection of wireless mobile nodes dynamically forming a temporary communication network without the use of any existing infrastructure or centralized administration. It is characterized by both highly dynamic network topology and limited energy. So, the efficiency of MANET depends not only on its control protocol, but also on its topology and energy management. Clustering strategy can improve the performance of flexibility and scalability in the network. With the aid of graph theory, genetic algorithm and simulated annealing hybrid optimization algorithm, this paper proposes a new clustering strategy to perform topology management and energy conservation. Performance comparison is made between the original algorithms and our two new algorithms, namely an improved weighting clustering algorithm and a novel Genetic Annealing based Clustering Algorithm (GACA), in the aspects of average cluster number, topology stability, load-balancing and network lifetime. The experimental results show that our clustering algorithms have a better performance on average.

Wang Jin, Shu Lei, Jinsung Cho, Young-Koo Lee, Sungyoung Lee, Yonil Zhong
Energy-Efficient Cluster Reconfiguration with Fair Cluster Formations in Sensor Networks

In cluster-based schemes such as LEACH, cluster reconfiguration algorithm is one of the most critical issues to achieve longer lifetime of sensor networks. In this paper, we propose a new energy efficient cluster reconfiguration algorithm, called EECRA. EECRA does not require any location or energy information of sensors, and can configure clusters with fair cluster regions such that all the sensors in a sensor network can utilize their energies equally. The performances of EECRA have been compared with LEACH and LEACH-C. We also show that EECRA can be well applied to the environments that sensors are moving.

Hyang-tack Lee, Yong-hyun Jo, Byeong-hee Roh, S. W. Yoo
Virtual Sink Rotation: Low-Energy Scalable Routing Protocol for Ubiquitous Sensor Networks

In this paper we propose a new routing protocol called virtual sink rotation (VSR) routing for large-scale sensor networks. VSR can efficiently handle a large number of sources as well as a large number of sinks with potential mobility. Each sensor node is not required to know the global network topology nor the location awareness. The main ideas underlying the VSR are two folds. First, to alleviate the frequent location updates associated with multiple mobile sinks, the algorithm introduces a

virtual sink

, which acts as a data collection and dissemination center to collect the data from all the sources and forward them to the actual sinks. This virtual sink can easily support multiple sinks as well as the mobility of the sinks. Second, to address the excessive energy consumption among the sensor nodes around a sink, VSR employs

virtual sink rotation

, which distributes the role of the virtual sink over all the participating sensor nodes, thus achieving a uniform energy distribution across the entire sensor field and prolonging the lifetime of the network. Experimentation results confirm that the VSR routing can significantly save energy while it can also reduce both the message delay and the message delivery failures compared to previous schemes.

Lynn Choi, Kwangseok Choi, Jungsun Kim, Byung Joon Park
FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions

Some sensor applications are interested in collecting data from multiple regions. For supporting such applications with multiple target regions, most conventional protocols are based on either a network flooding or multiple unicastig to cover those more than one target region. Either one will result in a lot of redundant packets to transmit by energy scared sensor nodes. To alleviate this problem, we propose a novel geocasting scheme which can make a suitable shared path among multiple target regions. We utilize the theorem of “Fermat Point,” in order to find an optimal junction point branching into each region. By using this shared path, an interest dissemination can be performed very efficiently. Our simulation study shows that the proposed scheme FERMA reduces a lot of network traffic and achieves significant energy saving as the number of target regions increase.

Young-Mi Song, Sung-Hee Lee, Young-Bae Ko
Power-Aware Position Vector Routing for Wireless Sensor Networks

We propose PPVR, a power-aware position vector routing protocol for wireless sensor networks. PPVR is an energy efficient geographical routing protocol that improves existing geographic routing protocols in two ways. First, in the forwarding phase, PPVR reduces the transmission energy by passing packets through a relay node called a power-aware node. Second, PPVR provides an efficient void node avoidance scheme that mitigates the cases forwarding packets to a wrong path so that higher route discovery success rate is achieved. The simulation results shows that the PPVR outperforms existing geographic routing protocols including GPSR and GEAR, in terms of the energy consumption and the successful delivery rate.

Sangsoo Lee, Daeyoung Kim, Sungjin Ahn, Noseong Park
Multicast Routing with Minimum Energy Cost and Minimum Delay in Wireless Sensor Networks

In this paper, we consider the multicast routing with minimum energy cost and minimum delay (MEMD) in wireless sensor networks under the access control scheme of Spatial Time Division Multiple Access (STDMA). We formulate and explore both MEMD multicast and ME multicast, and show that the latter is just the Maximum Leaf Spanning Tree (MLST) problem, which is NP-complete. A 2-approximation algorithm is proposed for the MLST problem through improving a known one. Based on this algorithm, an approximation algorithm is obtained for the MEMD multicast problem. To further improve the delay result, we provide another approximation algorithm for our main problem using a different approach. These algorithms are all near linear in the size of the network graph, and also are shown to have good performance by simulation results.

Zhao Li, Wei Zhang, Hengchang Liu, Baohua Zhao, Yugui Qu
Self Location Estimation Scheme Using ROA in Wireless Sensor Networks

In wireless channel environments, location estimation error is inevitable when we use the ROA(Received signal strength Of Arrival) for location estimation. Because of multi-path fading and shadowing the received signal strength can not be obtained appropriately in wireless channel. Especially in NLOS(Non-Line Of Sight) environments, the location estimation error is increased significantly. Therefore, it is required to consider the wireless channel to reduce the estimation error. In this paper, we propose a new location estimation scheme to work precisely in NLOS environments. Reference nodes more than three are used to broadcast their location information continuously and each sensor node sorts the average received signal strength considering shadowing characteristics. We use the residual weighting algorithm[1] for ROA location estimation to obtain higher accuracy. As a result, we can obtain accurate location estimation only using location estimation scheme without any special device for location awareness.

Yun Kyung Lee, Eui Hyeok Kwon, Jae Sung Lim
Energy-Efficient Target Localization Based on a Prediction Model

In this paper, we propose an energy-efficient target localization scheme (TLS) based on a prediction model that can reveal the most likely zone the target will be in, and also a corresponding two-step communication protocol between base station (BS) and sensors. BS uses a query mechanism to determine which sensors should be used for detailed information according to a limited amount of data received from the sensors. This scheme reduces both energy consumption and communication bandwidth requirement, prolongs the lifetime of the wireless sensor networks. Simulation results indicate that it can achieve a high accuracy while saving a large amount of energy.

Yu Gu, Wei Zhang, HengChang Liu, Baohua Zhao, Yugui Qu
Reducing Congestion in Real-Time Multi-party-tracking Sensor Network Applications

This paper presents a framework for a congestion reduction mechanism in multiple objects tracking applications. The multiple objects tracking application has a real-time characteristic, through which all packets should be delivered in as timely fashion as possible. The proposed framework consists of sink nodes, backbone nodes, mobile nodes and agent nodes. The location information of the mobile node is delivered to the sink node using both localization and routing techniques, which consider the network congestion. The proposed congestion reduction technique avoids network congestion by decreasing the number of transmitting packets based on the idea that network congestion occurs when the total data in transit is greater than the total channel capacity. The decrement is achieved by both merging and attachment operations, which consolidate several small packets into one large packet in intermediate backbone nodes. The mechanism also considers a time-constrained delivery to assure the user’s service request. The simulation is conducted using a TOSSIM simulator, and the result shows that the proposed mechanism improves performance in terms of the successful delivery ratio and the delay time.

Wonwoo Jung, Sujeong Shin, Sukwon Choi, Hojung Cha
Variable-Radii Method Based on Probing Mechanism (VRPM): An Energy Conservation Method for Wireless Active Sensor Networks

Wireless sensor networks, which are composed of advanced MEMS (Micro-Electro-Mechanical-Systems) called sensor nodes, has been broadly researched as ad-hoc networks recently. Since sensor nodes are powered by limited-life batteries and are usually deployed in severe environments, they need to be able to conserve their power consumption as well as guarantee broad coverage and connectivity. In active sensor networks, such as RFID sensing systems, shorter sensing and communication ranges will result in a higher measuring precision and more efficient energy dissipation. In this paper, we propose a novel self-controlling method for sensor nodes to decide the most appropriate sensing radius, communication radius, and an active/sleep schedule simultaneously. The energy-saving effect is proved in our simulation section.

Qi Zhou, Takuya Asaka, Tatsuro Takahashi

The International Workshop on Trusted and Autonomic Ubiquitous and Embedded Systems (TAUES 2005)

Session 1: Autonomic Computing

Automata-Theoretic Performance Analysis Method of Soft Real-Time Systems

Recently, the verification method of schedulability of real-time operating systems using timed automata have been developed. On the other hand, as soft real-time systems such as distributed systems and multimedia systems have been increasing, it is important to design soft real-time systems. Especially, performance analysis methods are important for soft real-time systems. In this paper, we develop the automata-theoretic performance analysis method of soft real-time systems by extending the verification method of schedulability of hard real-time systems using utility functions.

Satoshi Yamane
A Component-based Architecture for an Autonomic Middleware Enabling Mobile Access to Grid Infrastructure

The increasing pervasiveness of wide-area distributed computing resources, like computational Grids, has given rise to applications that have inherent problems of complexity, adaptability, dynamism and heterogeneity etc. The emerging concept of autonomic computing holds the key to the self-management of such a multifarious undertaking and provides a way to further build upon this complexity without incurring additional drawbacks. Furthermore, access to Grid services at present is generally limited to devices having substantial computing, network and memory resources whereas most of mobile devices do not have the sufficient capabilities to be either direct clients or services in the Grid environment. The existing middleware platforms like Globus do not fully address mobility, yet extending the potential of the Grid to a wider audience promises increase in its flexibility and productivity. In this paper, we present a component-based autonomic middleware that can handle the complexity of extending the potential of the Grid to a wider mobile audience, by incorporating the features of context-awareness and self-management. We also address the middleware issues of job delegation to a Grid service, support for disconnected operation/offline processing and secure communication.

Ali Sajjad, Hassan Jameel, Umar Kalim, Young-Koo Lee, Sungyoung Lee
Autonomic Agents for Survivable Security Systems

Autonomic Systems are essentially about creating self-managing systems based on the biological metaphor of the non-conscious acting autonomic nervous system. The Autonomic initiative has been motivated by ever increasing complexity and total cost of ownership of today’s system of systems. Autonomicity also offers inroads in terms of fault-tolerant computing and assisting in creating survivable systems. This paper examines the relevant technologies including Agents for engineering autonomicity and survivability in a secure location biometric system.

Roy Sterritt, Edward Hanna, Patricia O’Hagan
Towards Formal Specification and Generation of Autonomic Policies

Autonomic Computing (AC), self-management based on high level guidance from humans, is increasingly gaining momentum as the way forward in designing reliable systems to hide complexity and conquer IT management costs. Effectively, AC may be viewed as Policy-Based Self-Management. In this paper we look at the motivation for utilizing NASA requirements-based programming technologies for mechanically transforming policies (expressed in restricted natural language, or appropriate graphical notations) into a provably equivalent formal model that can be used as the basis for code generation and other transformations, with the goal of self-generation of provable autonomic policies.

Roy Sterritt, Michael G. Hinchey, James L. Rash, Walt Truszkowski, Christopher A. Rouff, Denis Gracanin

Session 2: Security

Intrusion Detection with CUSUM for TCP-Based DDoS

DDoS(Distributed Denial of Service) is the most troublesome attack nowadays, especially for those people whose operational environment relies on network services and/or the Internet. However

,

attackers often penetrate innocent routers and hosts to make them unwittingly participate in such a large scale attack as zombies or reflectors. In this paper, we propose an Intrusion Detection System (IDS), named CUSUM Intrusion Detection System (CIDS), which invokes CUSUM as its detection algorithm and logically divides Internet into many autonomous network management units (NMUs), each deploys a CIDS to discover attacks and identify what role a client in such an attack acts as.

Fang-Yie Leu, Wei-Jie Yang
A Digital Content Distribution Using a Group-key and Multi-layered Structure Based on Web

Regarding the design of a multimedia digital content distribution system, the important issues are to supply a large amount of multimedia digital content to users and to guarantee the security of digital content. In this study we proposed designing a security technique for each group in a multilayered structure, and on a caching technique, which is based on this security technique, and to improve the user’s response speed. Using these techniques guarantees the security of digital content distribution.

Yun-Ji Na, Il Seok Ko
Access Policy Sheet for Access Control in Fine-Grained XML

We propose an access control scheme for developing authorization rules for XML documents, allowing flexible data granularity and authorization propagation. To simplify the complex access control policies in XML, we introduce a new tool:

Authorization Policy Sheet

(APS). Complex access control rules can be easily described in an APS. The administrator of a system can easily manage the access control of the system. With aid of Data Type Definitions(DTD), the policies given in an APS can be converted into a standard XML code that can be implemented in a normal XML environment.

Jing Wu, Yi Mu, Jennifer Seberry, Chun Ruan

Session 3: Dependable Computing

Monitoring the Health Condition of a Ubiquitous System: Rejuvenation vs. Recovery

Software rejuvenation is a preventive and proactive solution that is particularly useful for counteracting the phenomenon of software aging. In this article, we consider a periodic software rejuvenation model based on the steady-state system availability in discrete operational circumstance. More precisely, we treat a telecommunication billing application as a simple ubiquitous application, and describe its stochastic behavior by applying the discrete renewal reward process. The main objective is the determination of the optimal frequency to rejuvenate the ubiquitous application, maximizing the steady-state system availability. Also, we develop a statistically non-parametric algorithm to estimate the optimal rejuvenation schedule with the discrete total time on test concept.

Kazuki Iwamoto, Tadashi Dohi, Naoto Kaio
A Dependability Management Mechanism for Ubiquitous Computing Systems

Dependability for a ubiquitous computing system must be guaranteed for each single component of a system and for the whole system, which—designed to fulfill a certain task—might be more than just a sum of its components. Ubiquitous computing systems must enable the testing not only each of software components separately but also of the whole system. In this paper, we propose a management mechanism for applying software rejuvenation technology into a ubiquitous computing system. It adopts the automatic monitoring scheme, the automatic analysis scheme, the autonomic plan and the execution scheme to suggest the optimal configuration alternative of a ubiquitous computing system. We validate the autonomic fault management scheme based on a workload model derived from the system log analysis.

Changyeol Choi, Sungsoo Kim
Reassignment Scheme of an RFID Tag’s Key for Owner Transfer

A Radio-Frequency-Identification (RFID) tag is a small and cheap device which is combined in IC chip and an antenna for radio communications. The RFID tag is used for management of goods and used as a substitute for a bar code. However, RFID system may infringe on a consumer’s privacy because it has a strong tracing ability. In this paper, we propose a key change scheme which can prevent previous owner from reading the RFID tag after changing its owner. By using our scheme, previous owner cannot read and trace ID information on the RFID tag. Moreover it is possible to combine other privacy protection scheme with our scheme because our scheme uses only symmetric key cryptography.

Junichiro Saito, Kenji Imamoto, Kouichi Sakurai

The International Workshop on Trusted and Autonomic Ubiquitous and Embedded Systems (TAUES 2005)

Erratum to: Autonomic Agents for Survivable Security Systems
Roy Sterritt, Edward Hanna, Patricia O’Hagan
Backmatter
Metadaten
Titel
Embedded and Ubiquitous Computing – EUC 2005 Workshops
herausgegeben von
Tomoya Enokido
Lu Yan
Bin Xiao
Daeyoung Kim
Yuanshun Dai
Laurence T. Yang
Copyright-Jahr
2005
Verlag
Springer Berlin Heidelberg
Electronic ISBN
978-3-540-32296-2
Print ISBN
978-3-540-30803-4
DOI
https://doi.org/10.1007/11596042

Neuer Inhalt