首页 > 最新文献

2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)最新文献

英文 中文
PEMAR: A pervasive middleware for activity recognition with smart phones PEMAR:用于智能手机活动识别的普及中间件
Prakash Vaka, Feichen Shen, Mayanka Chandrashekar, Yugyung Lee
The growing affordability of smart phones and mobile devices has only added to this trend by encouraging prolonged durations of inactivity. In this paper, we present a middleware, called the Pervasive Middleware for Activity Recognition (PEMAR) that aims to increase the level of physical activity by creating a middleware for active games on mobile devices. For the PEMAR application, we present a human centered and adaptive approach that recognizes and learns human activities continuously by employing an activity library. The activity models in the library will be annotated with patterns of human activities and their contexts for general usage of activity models. This will be beneficial to many pervasive applications in terms of the availability of the accurate activity models as well as the reduction of burden for gesture training. The PEMAR middleware is composed of the following: (1) semantic models for human activity, (2) activity analysis, (3) activity recognition, (4) adaptation of motion models, and (5) motion based game applications. We evaluate the proposed PEMAR model in terms of its recognition accuracy and performance. In addition, we demonstrate the usage of the middleware through interactive activity gaming applications.
智能手机和移动设备的价格越来越便宜,这只会加剧这一趋势,鼓励人们长时间不活动。在本文中,我们提出了一种中间件,称为活动识别的普遍中间件(PEMAR),旨在通过为移动设备上的活动游戏创建中间件来提高物理活动水平。对于PEMAR应用程序,我们提出了一种以人为中心的自适应方法,该方法通过使用活动库来连续识别和学习人类活动。库中的活动模型将使用人类活动的模式及其上下文进行注释,以用于活动模型的一般使用。这将有利于许多广泛应用的准确的活动模型的可用性以及减少手势训练的负担。PEMAR中间件由以下几个部分组成:(1)人类活动的语义模型,(2)活动分析,(3)活动识别,(4)运动模型的适应,(5)基于运动的游戏应用。我们从识别精度和性能方面对所提出的PEMAR模型进行了评估。此外,我们还通过交互式活动游戏应用程序演示了中间件的使用。
{"title":"PEMAR: A pervasive middleware for activity recognition with smart phones","authors":"Prakash Vaka, Feichen Shen, Mayanka Chandrashekar, Yugyung Lee","doi":"10.1109/PERCOMW.2015.7134073","DOIUrl":"https://doi.org/10.1109/PERCOMW.2015.7134073","url":null,"abstract":"The growing affordability of smart phones and mobile devices has only added to this trend by encouraging prolonged durations of inactivity. In this paper, we present a middleware, called the Pervasive Middleware for Activity Recognition (PEMAR) that aims to increase the level of physical activity by creating a middleware for active games on mobile devices. For the PEMAR application, we present a human centered and adaptive approach that recognizes and learns human activities continuously by employing an activity library. The activity models in the library will be annotated with patterns of human activities and their contexts for general usage of activity models. This will be beneficial to many pervasive applications in terms of the availability of the accurate activity models as well as the reduction of burden for gesture training. The PEMAR middleware is composed of the following: (1) semantic models for human activity, (2) activity analysis, (3) activity recognition, (4) adaptation of motion models, and (5) motion based game applications. We evaluate the proposed PEMAR model in terms of its recognition accuracy and performance. In addition, we demonstrate the usage of the middleware through interactive activity gaming applications.","PeriodicalId":180959,"journal":{"name":"2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123793314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A design of contract-oriented sensor application platform 面向契约的传感器应用平台设计
Takuma Oide, Toru Abe, T. Suganuma
As miniaturized and high functional sensor devices like smartphones have spread, we can utilize large amounts of sensing data gathered from these devices. Participatory sensing is one of modern sensor-based application models in which users provide their sensing data including their personal data as well as get services. Current models, however, have limitations on flexible data flow based on provider's policy because it is difficult for providers to know how to be used their personal data when they upload data to clouds. In this paper, we propose a sensor-based application model without using clouds and discuss its advantages and drawbacks. We also simply design basic data flow protocols to negotiate conditions between providers and consumers and show their feasibility.
随着智能手机等小型化和高功能传感器设备的普及,我们可以利用从这些设备收集的大量传感数据。参与式传感是一种基于传感器的现代应用模式,用户提供包括个人数据在内的传感数据并获得服务。然而,目前的模型在基于提供商策略的灵活数据流方面存在局限性,因为提供商在将数据上传到云时很难知道如何使用其个人数据。本文提出了一种不使用云的基于传感器的应用模型,并讨论了其优缺点。我们还简单地设计基本的数据流协议来协商提供者和消费者之间的条件,并显示其可行性。
{"title":"A design of contract-oriented sensor application platform","authors":"Takuma Oide, Toru Abe, T. Suganuma","doi":"10.1109/PERCOMW.2015.7134014","DOIUrl":"https://doi.org/10.1109/PERCOMW.2015.7134014","url":null,"abstract":"As miniaturized and high functional sensor devices like smartphones have spread, we can utilize large amounts of sensing data gathered from these devices. Participatory sensing is one of modern sensor-based application models in which users provide their sensing data including their personal data as well as get services. Current models, however, have limitations on flexible data flow based on provider's policy because it is difficult for providers to know how to be used their personal data when they upload data to clouds. In this paper, we propose a sensor-based application model without using clouds and discuss its advantages and drawbacks. We also simply design basic data flow protocols to negotiate conditions between providers and consumers and show their feasibility.","PeriodicalId":180959,"journal":{"name":"2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130275706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Extending the lifetime of wireless sensor networks from the perspective of sensor scheduling and wireless communication 从传感器调度和无线通信的角度延长无线传感器网络的寿命
Qian Zhao
Wireless sensor networks (WSNs) are becoming increasingly common in a wide variety of settings. Since most sensor nodes are powered by batteries, energy efficiency is critical. In this paper, we investigate problems that cause short battery life in WSNs from two perspectives. First, from the perspective of the execution forms of sensors in a sensor node, we note that simultaneous sensor activation generates high peak power consumption. Therefore, battery voltage drops quickly, and sensors stop working even though some useful charge remains in the battery. Second, from the perspective of wireless communication, communication distances must be considered in minimizing energy consumption. Moreover, the energy hole problem, which is known to cause non-uniform energy drains in many communication topologies, results in premature termination of entire networks. The goal of this paper, therefore, is to describe novel approaches for separately solving the aforementioned problems in order to extend the lifetime of WSNs.
无线传感器网络(wsn)在各种环境中变得越来越普遍。由于大多数传感器节点由电池供电,因此能源效率至关重要。本文从两个方面研究了导致无线传感器网络电池寿命短的问题。首先,从传感器节点中传感器的执行形式来看,我们注意到同时激活传感器会产生很高的峰值功耗。因此,电池电压迅速下降,即使电池中仍有一些有用的电荷,传感器也停止工作。其次,从无线通信的角度来看,在最小化能耗的前提下必须考虑通信距离。此外,在许多通信拓扑结构中,能量空洞问题会导致不均匀的能量消耗,从而导致整个网络的过早终止。因此,本文的目标是描述单独解决上述问题的新方法,以延长无线传感器网络的生命周期。
{"title":"Extending the lifetime of wireless sensor networks from the perspective of sensor scheduling and wireless communication","authors":"Qian Zhao","doi":"10.1109/PERCOMW.2015.7134033","DOIUrl":"https://doi.org/10.1109/PERCOMW.2015.7134033","url":null,"abstract":"Wireless sensor networks (WSNs) are becoming increasingly common in a wide variety of settings. Since most sensor nodes are powered by batteries, energy efficiency is critical. In this paper, we investigate problems that cause short battery life in WSNs from two perspectives. First, from the perspective of the execution forms of sensors in a sensor node, we note that simultaneous sensor activation generates high peak power consumption. Therefore, battery voltage drops quickly, and sensors stop working even though some useful charge remains in the battery. Second, from the perspective of wireless communication, communication distances must be considered in minimizing energy consumption. Moreover, the energy hole problem, which is known to cause non-uniform energy drains in many communication topologies, results in premature termination of entire networks. The goal of this paper, therefore, is to describe novel approaches for separately solving the aforementioned problems in order to extend the lifetime of WSNs.","PeriodicalId":180959,"journal":{"name":"2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127776049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Demo abstract: Reproducible deployment of pervasive applications 演示摘要:普及应用程序的可重复部署
O. Günalp, C. Escoffier, P. Lalanda
Pervasive systems present stringent requirements that make software deployment especially challenging. The unknown and fluctuating environment in which pervasive applications are executed discards traditional approaches. As a result, there is an increasing need for a reproducible and dynamic deployment process. In last years, we developed several industrial pervasive platforms and applications. Based on these experiences we propose Rondo, a tool suite for deploying pervasive applications. Rondo includes a domain-specific language for declaratively describing applications, a deployment manager that can dynamically apply these descriptions and development tools for helping the description of applications. In this paper we present this tool suite and a set of deployment scenarios in which we validated our approach, including a web framework and a home automation platform.
普及系统提出了严格的要求,使得软件部署特别具有挑战性。执行普及应用程序的未知和波动的环境抛弃了传统的方法。因此,对可再现的动态部署流程的需求越来越大。在过去的几年中,我们开发了几个工业普适平台和应用程序。基于这些经验,我们提出了Rondo,一个用于部署普及应用程序的工具套件。Rondo包括用于声明性描述应用程序的特定于领域的语言、可以动态应用这些描述的部署管理器和用于帮助描述应用程序的开发工具。在本文中,我们展示了这个工具套件和一组部署场景,其中我们验证了我们的方法,包括一个web框架和一个家庭自动化平台。
{"title":"Demo abstract: Reproducible deployment of pervasive applications","authors":"O. Günalp, C. Escoffier, P. Lalanda","doi":"10.1109/PERCOMW.2015.7134025","DOIUrl":"https://doi.org/10.1109/PERCOMW.2015.7134025","url":null,"abstract":"Pervasive systems present stringent requirements that make software deployment especially challenging. The unknown and fluctuating environment in which pervasive applications are executed discards traditional approaches. As a result, there is an increasing need for a reproducible and dynamic deployment process. In last years, we developed several industrial pervasive platforms and applications. Based on these experiences we propose Rondo, a tool suite for deploying pervasive applications. Rondo includes a domain-specific language for declaratively describing applications, a deployment manager that can dynamically apply these descriptions and development tools for helping the description of applications. In this paper we present this tool suite and a set of deployment scenarios in which we validated our approach, including a web framework and a home automation platform.","PeriodicalId":180959,"journal":{"name":"2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128981087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demo abstract: Teaching pervasing computing with an integrated environment 演示摘要:集成环境下的普及计算教学
P. Lalanda, J. Mccann, Catherine Hamon
In this paper, we present a novel learning environment that allows students to develop, execute, and test pervasive applications. This Java-based environment includes an execution platform built on top of Apache Felix OSGi and iPOJO, an Eclipse-based integrated environment, and a smart home simulator. Currently the environment challenges students to build five pervasive applications during the course. This system has been successfully tested by students enrolled in specially designed Masters courses.
在本文中,我们提出了一个新的学习环境,允许学生开发、执行和测试普及应用程序。这个基于java的环境包括一个构建在Apache Felix OSGi和iPOJO之上的执行平台、一个基于eclipse的集成环境和一个智能家居模拟器。目前的环境要求学生在课程中构建五个普及的应用程序。该系统已经在专门设计的硕士课程的学生中成功地进行了测试。
{"title":"Demo abstract: Teaching pervasing computing with an integrated environment","authors":"P. Lalanda, J. Mccann, Catherine Hamon","doi":"10.1109/PERCOMW.2015.7134023","DOIUrl":"https://doi.org/10.1109/PERCOMW.2015.7134023","url":null,"abstract":"In this paper, we present a novel learning environment that allows students to develop, execute, and test pervasive applications. This Java-based environment includes an execution platform built on top of Apache Felix OSGi and iPOJO, an Eclipse-based integrated environment, and a smart home simulator. Currently the environment challenges students to build five pervasive applications during the course. This system has been successfully tested by students enrolled in specially designed Masters courses.","PeriodicalId":180959,"journal":{"name":"2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127909305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preserving QoI in participatory sensing by tackling location-spoofing through mobile WiFi hotspots 通过移动WiFi热点解决位置欺骗,保持参与式感知的qi
Francesco Restuccia, A. Saracino, Sajal K. Das, F. Martinelli
The Quality of Information (QoI) in Participatory Sensing (PS) systems largely depends on the location accuracy of participating users. However, users could easily provide false information through Location Spoofing Attacks (LSA). Existing PS systems are not able to efficiently validate the position of users in large-scale outdoor environments, thus being prone to reduced QoI. In this paper we present an efficient scheme to secure PS systems from LSAs. In particular, the user location is verified with the help of mobile WiFi hot spots (MHSs), which are users activating WiFi interface on their smart phones and waiting connections from nearby users, and thereby validating their position inside the sensing area. A reputation-based algorithm is proposed to rule out sensing reports of location-spoofing users, thereby increasing the reliability of the PS system. The effectiveness of our scheme is analyzed by real-world experiments and simulation study.
参与式传感系统的信息质量在很大程度上取决于参与用户的定位精度。但是,用户很容易通过位置欺骗攻击(Location Spoofing Attacks, LSA)提供虚假信息。现有的PS系统无法在大规模的户外环境中有效地验证用户的位置,从而容易导致qi降低。本文提出了一种有效的保护PS系统免受lsa攻击的方案。特别是通过移动WiFi热点(mhs)来验证用户的位置。移动WiFi热点是指用户在智能手机上激活WiFi接口,等待附近用户的连接,从而验证自己在传感区域内的位置。提出了一种基于信誉的算法来排除位置欺骗用户的感知报告,从而提高了PS系统的可靠性。通过实际实验和仿真研究,分析了该方案的有效性。
{"title":"Preserving QoI in participatory sensing by tackling location-spoofing through mobile WiFi hotspots","authors":"Francesco Restuccia, A. Saracino, Sajal K. Das, F. Martinelli","doi":"10.1109/PERCOMW.2015.7133998","DOIUrl":"https://doi.org/10.1109/PERCOMW.2015.7133998","url":null,"abstract":"The Quality of Information (QoI) in Participatory Sensing (PS) systems largely depends on the location accuracy of participating users. However, users could easily provide false information through Location Spoofing Attacks (LSA). Existing PS systems are not able to efficiently validate the position of users in large-scale outdoor environments, thus being prone to reduced QoI. In this paper we present an efficient scheme to secure PS systems from LSAs. In particular, the user location is verified with the help of mobile WiFi hot spots (MHSs), which are users activating WiFi interface on their smart phones and waiting connections from nearby users, and thereby validating their position inside the sensing area. A reputation-based algorithm is proposed to rule out sensing reports of location-spoofing users, thereby increasing the reliability of the PS system. The effectiveness of our scheme is analyzed by real-world experiments and simulation study.","PeriodicalId":180959,"journal":{"name":"2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121482210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Knowledge-assisted location-adaptive technique for indoor-outdoor detection in e-learning 电子学习中室内外检测的知识辅助位置自适应技术
Sviatoslav Edelev, Sunaina Nelamane Prasad, Hemanth Karnal, D. Hogrefe
The era of pervasive and ubiquitous computing has brought the learning far beyond the traditional classrooms to distant and mobile e-learning. Being easily accessible through time and place, e-learning systems rushed into masses and quickly appeared under the criticism as being uni-directional and fitting various learners under “one size”. In order to differentiate learners' needs and to apply the most suitable educational approach to the particular learner, researchers have introduced the Learner's context - a set of preferences defined by the learner's personal characteristics, technical capabilities of the user device, and the environment where learning takes place. Concerning the physical learning environment, the basic requirement is to distinguish between indoors and outdoors (IO). Existing approaches for IO-detection either apply pre-defined hard-coded thresholds to the sensing parameters or use machine-learning techniques. While the latter demonstrates a more adaptive approach for IO-detection over the former, decisions based on training data are not accurate once the environment is significantly changed, which is highly relevant for the modern learner with increased mobility. In this paper, we propose a novel knowledge-assisted location-adaptive technique for IO-detection in e-learning scenarios. The technique leverages data collected from various ambient sensors such as light, temperature, humidity, and noise and compares them with characteristics that the e-learning environment has at this point in time and in the current physical location being inside or outside. Here, we model the e-learning environment based on the empirical observations of the natural learning process augmented by the knowledge about current weather and environmental conditions collected from the weather web-service. The proposed approach is easily adaptable to the changing conditions in time and place with no need for the training phase. This work can be the first step towards robust location-adaptable IO-detection algorithms.
普适和无处不在的计算时代使学习远远超出了传统的教室,成为远程和移动的电子学习。由于可以跨越时间和地点,电子学习系统迅速普及,并迅速出现在“单向”和“一个尺寸”下适合各种学习者的批评之下。为了区分学习者的需求,并对特定的学习者应用最合适的教育方法,研究人员引入了学习者语境——一组由学习者的个人特征、用户设备的技术能力和学习发生的环境定义的偏好。关于物理学习环境,基本要求是区分室内和室外(IO)。现有的io检测方法要么对传感参数应用预定义的硬编码阈值,要么使用机器学习技术。虽然后者在io检测方面比前者更具适应性,但一旦环境发生重大变化,基于训练数据的决策就不准确了,这与流动性增强的现代学习者高度相关。在本文中,我们提出了一种新的知识辅助位置自适应技术,用于在线学习场景中的io检测。该技术利用从各种环境传感器(如光、温度、湿度和噪音)收集的数据,并将它们与电子学习环境在此时点以及当前物理位置(室内或室外)的特征进行比较。在这里,我们基于对自然学习过程的经验观察,并通过从天气网络服务收集的有关当前天气和环境条件的知识来增强对电子学习环境的建模。所提出的方法不需要训练阶段,很容易适应时间和地点的变化。这项工作可以成为鲁棒位置自适应io检测算法的第一步。
{"title":"Knowledge-assisted location-adaptive technique for indoor-outdoor detection in e-learning","authors":"Sviatoslav Edelev, Sunaina Nelamane Prasad, Hemanth Karnal, D. Hogrefe","doi":"10.1109/PERCOMW.2015.7133985","DOIUrl":"https://doi.org/10.1109/PERCOMW.2015.7133985","url":null,"abstract":"The era of pervasive and ubiquitous computing has brought the learning far beyond the traditional classrooms to distant and mobile e-learning. Being easily accessible through time and place, e-learning systems rushed into masses and quickly appeared under the criticism as being uni-directional and fitting various learners under “one size”. In order to differentiate learners' needs and to apply the most suitable educational approach to the particular learner, researchers have introduced the Learner's context - a set of preferences defined by the learner's personal characteristics, technical capabilities of the user device, and the environment where learning takes place. Concerning the physical learning environment, the basic requirement is to distinguish between indoors and outdoors (IO). Existing approaches for IO-detection either apply pre-defined hard-coded thresholds to the sensing parameters or use machine-learning techniques. While the latter demonstrates a more adaptive approach for IO-detection over the former, decisions based on training data are not accurate once the environment is significantly changed, which is highly relevant for the modern learner with increased mobility. In this paper, we propose a novel knowledge-assisted location-adaptive technique for IO-detection in e-learning scenarios. The technique leverages data collected from various ambient sensors such as light, temperature, humidity, and noise and compares them with characteristics that the e-learning environment has at this point in time and in the current physical location being inside or outside. Here, we model the e-learning environment based on the empirical observations of the natural learning process augmented by the knowledge about current weather and environmental conditions collected from the weather web-service. The proposed approach is easily adaptable to the changing conditions in time and place with no need for the training phase. This work can be the first step towards robust location-adaptable IO-detection algorithms.","PeriodicalId":180959,"journal":{"name":"2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123081065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Managing your privacy in mobile applications with MockingBird 使用MockingBird管理您在移动应用程序中的隐私
Alan Ferrari, D. Puccinelli, S. Giordano
Mocking is a standard technique in software testing; its main goal is to mimic the real object behavior in a controllable way. Recently, mocking techniques have been used in mobile environments to increase the user privacy and their goal is to allow users to select the kind of information they want to pass to the application (if real or randomly generated). This work presents MockingBird, a novel solution to mocking that uses recorded context-traces instead of randomly generated data, which is easily detected by applications. We also propose a flexible methodology to mock an Android application that does not require any changes at the operating system level and at the virtual machine level. MockingBird is a very promising solution; we are currently testing its performance and increasing its functionality.
模拟是软件测试中的一种标准技术;它的主要目标是以可控的方式模拟真实物体的行为。最近,嘲弄技术已经在移动环境中使用,以增加用户隐私,其目标是允许用户选择他们想要传递给应用程序的信息类型(如果是真实的或随机生成的)。这项工作提出了MockingBird,一个新颖的模拟解决方案,使用记录的上下文跟踪而不是随机生成的数据,这很容易被应用程序检测到。我们还提出了一种灵活的方法来模拟不需要在操作系统级别和虚拟机级别进行任何更改的Android应用程序。《知更鸟》是一个非常有前途的解决方案;我们目前正在测试其性能并增加其功能。
{"title":"Managing your privacy in mobile applications with MockingBird","authors":"Alan Ferrari, D. Puccinelli, S. Giordano","doi":"10.1109/PERCOMW.2015.7134049","DOIUrl":"https://doi.org/10.1109/PERCOMW.2015.7134049","url":null,"abstract":"Mocking is a standard technique in software testing; its main goal is to mimic the real object behavior in a controllable way. Recently, mocking techniques have been used in mobile environments to increase the user privacy and their goal is to allow users to select the kind of information they want to pass to the application (if real or randomly generated). This work presents MockingBird, a novel solution to mocking that uses recorded context-traces instead of randomly generated data, which is easily detected by applications. We also propose a flexible methodology to mock an Android application that does not require any changes at the operating system level and at the virtual machine level. MockingBird is a very promising solution; we are currently testing its performance and increasing its functionality.","PeriodicalId":180959,"journal":{"name":"2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130743123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Demo abstract: A proximity-based aerial survivor locator based on connectionless broadcast 摘要:一种基于无连接广播的基于邻近度的空中幸存者定位器
A. Miyamoto, Daniel J. Dubois, Yosuke Bando, Konosuke Watanabe, V. Bove
Under a situation where network infrastructures are interrupted by a devastating natural disaster, few communication channels left for survivors to request help are proximity-based communications on their mobile devices, for example Bluetooth and Wi-Fi direct. Since these technologies have a limited transmission range, rescue teams need to travel over a disaster area and physically come close to survivors to detect signals emitted from their devices. In this paper we demonstrate how to combine connectionless broadcast capabilities of existing mobile/wearable devices on the market, together with the high-mobility and proximity-based connectivity of drones (e.g., quadcopters), to help rescue teams discover signals from survivors.
在网络基础设施被毁灭性自然灾害中断的情况下,幸存者请求帮助的通信渠道很少是基于移动设备的近距离通信,例如蓝牙和Wi-Fi直接。由于这些技术的传输范围有限,救援队需要穿越灾区,亲自接近幸存者,以探测设备发出的信号。在本文中,我们演示了如何结合市场上现有移动/可穿戴设备的无连接广播功能,以及无人机(如四轴飞行器)的高机动性和基于距离的连接,以帮助救援队发现幸存者的信号。
{"title":"Demo abstract: A proximity-based aerial survivor locator based on connectionless broadcast","authors":"A. Miyamoto, Daniel J. Dubois, Yosuke Bando, Konosuke Watanabe, V. Bove","doi":"10.1109/PERCOMW.2015.7134016","DOIUrl":"https://doi.org/10.1109/PERCOMW.2015.7134016","url":null,"abstract":"Under a situation where network infrastructures are interrupted by a devastating natural disaster, few communication channels left for survivors to request help are proximity-based communications on their mobile devices, for example Bluetooth and Wi-Fi direct. Since these technologies have a limited transmission range, rescue teams need to travel over a disaster area and physically come close to survivors to detect signals emitted from their devices. In this paper we demonstrate how to combine connectionless broadcast capabilities of existing mobile/wearable devices on the market, together with the high-mobility and proximity-based connectivity of drones (e.g., quadcopters), to help rescue teams discover signals from survivors.","PeriodicalId":180959,"journal":{"name":"2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130979717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards emergency networks security with per-flow queue rate management 基于单流队列速率管理的应急网络安全研究
M. Casoni, Carlo Augusto Grazia, Martin Klapež, Natale Patriciello
When statistical multiplexing is used to provide connectivity to a number of client hosts through a high-delay link, the original TCP as well as TCP variants born to improve performance on those links often provide poor performance and sub-optimal QoS properties. To guarantee intra-protocol fairness, inter-protocol friendliness, low queues utilization and optimal throughput in mission-critical scenarios, Congestion Control Middleware Layer (C2ML) has been proposed as a tool for centralized and collaborative resource management. However, C2ML offers only very limited security guarantees. Because emergencies may be natural or man-provoked, in the latter case there may be interest to cut out legitimate users from the communication networks that support disaster recovery operations. In this paper we present Queue Rate Management (QRM), an Active Queue Management scheme able to provide protection from Resource Exhaustion Attacks in scenarios where access to the shared link is controlled by C2ML; the proposed algorithm checks whether a node is exceeding its allowed rate, and consequently decides whether to keep or drop packets coming from that node. We mathematically prove that with QRM the gateway queue size can never exceed the Bandwidth-Delay Product of the channel. Furthermore, we use the ns-3 simulator to compare QRM with CoDel and RED, showing how QRM provides better performance in terms of both throughput and QoS guarantees when employed with C2ML.
当使用统计多路复用通过高延迟链路向许多客户机主机提供连接时,原始TCP以及为提高这些链路上的性能而产生的TCP变体通常会提供较差的性能和次优的QoS属性。为了在关键任务场景下保证协议内公平、协议间友好、低队列利用率和最佳吞吐量,拥塞控制中间件层(C2ML)被提出作为集中和协作的资源管理工具。然而,C2ML只提供非常有限的安全保证。由于紧急情况可能是自然发生的,也可能是人为造成的,在后一种情况下,可能有意将合法用户排除在支持灾难恢复行动的通信网络之外。在本文中,我们提出了队列速率管理(Queue Rate Management, QRM),一种主动队列管理方案,能够在共享链路访问由C2ML控制的情况下提供对资源耗尽攻击的保护;提出的算法检查节点是否超过其允许的速率,从而决定是否保留或丢弃来自该节点的数据包。从数学上证明了在QRM下网关队列的大小永远不会超过信道的带宽-延迟积。此外,我们使用ns-3模拟器将QRM与CoDel和RED进行比较,显示了当与C2ML一起使用时,QRM如何在吞吐量和QoS保证方面提供更好的性能。
{"title":"Towards emergency networks security with per-flow queue rate management","authors":"M. Casoni, Carlo Augusto Grazia, Martin Klapež, Natale Patriciello","doi":"10.1109/PERCOMW.2015.7134087","DOIUrl":"https://doi.org/10.1109/PERCOMW.2015.7134087","url":null,"abstract":"When statistical multiplexing is used to provide connectivity to a number of client hosts through a high-delay link, the original TCP as well as TCP variants born to improve performance on those links often provide poor performance and sub-optimal QoS properties. To guarantee intra-protocol fairness, inter-protocol friendliness, low queues utilization and optimal throughput in mission-critical scenarios, Congestion Control Middleware Layer (C2ML) has been proposed as a tool for centralized and collaborative resource management. However, C2ML offers only very limited security guarantees. Because emergencies may be natural or man-provoked, in the latter case there may be interest to cut out legitimate users from the communication networks that support disaster recovery operations. In this paper we present Queue Rate Management (QRM), an Active Queue Management scheme able to provide protection from Resource Exhaustion Attacks in scenarios where access to the shared link is controlled by C2ML; the proposed algorithm checks whether a node is exceeding its allowed rate, and consequently decides whether to keep or drop packets coming from that node. We mathematically prove that with QRM the gateway queue size can never exceed the Bandwidth-Delay Product of the channel. Furthermore, we use the ns-3 simulator to compare QRM with CoDel and RED, showing how QRM provides better performance in terms of both throughput and QoS guarantees when employed with C2ML.","PeriodicalId":180959,"journal":{"name":"2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131108925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1