Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784877
Sebastian Sumpf, J. Brakensiek
Mobile device manufacturers are facing the challenge, to maintain device drivers across an increasing number of product variants. Isolation of device drivers into a separate domain using virtualization technology offers a way out of the resulting porting dilemma. This paper explains the architecture concept based on the L4/Fiasco microkernel, using an exemplary block device. The paper specifically details challenges and solutions with respect to enabling DMA access and ensuring access protection in the virtualized environment. Benchmark results are given to show the performance impact of the chosen architecture.
{"title":"Device Driver Isolation within Virtualized Embedded Platforms","authors":"Sebastian Sumpf, J. Brakensiek","doi":"10.1109/CCNC.2009.4784877","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784877","url":null,"abstract":"Mobile device manufacturers are facing the challenge, to maintain device drivers across an increasing number of product variants. Isolation of device drivers into a separate domain using virtualization technology offers a way out of the resulting porting dilemma. This paper explains the architecture concept based on the L4/Fiasco microkernel, using an exemplary block device. The paper specifically details challenges and solutions with respect to enabling DMA access and ensuring access protection in the virtualized environment. Benchmark results are given to show the performance impact of the chosen architecture.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127567821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784895
P. S. Prasad, P. Agrawal, K. Sivalingam
In this paper, we study the effects of mobility on network parameters in hierarchical ad hoc networks. Several mobility models have been designed and studied to mimic the behavior of real world mobility in networks. They have been successful in modeling the movement of mobile nodes in simulations. However, in this work, we show that several mobility models fall short of extending the same result to hierarchical networks. Most mobility models can only predict the movement of nodes in a single cell or cluster. When mobile nodes start moving into adjacent clusters, the time required for handoff and other protocol overhead issues alter the throughput. This leads to drastic drop in throughput and increased latency in packet delivery. Also, commonly used routing protocols do not adequately support handling high mobility and frequent route discovery issues. We evaluate the performances of various routing protocols and mobility models in a highly mobile hierarchical ad hoc network using NS2 simulation.
{"title":"Effects of Mobility in Hierarchical Mobile Ad Hoc Networks","authors":"P. S. Prasad, P. Agrawal, K. Sivalingam","doi":"10.1109/CCNC.2009.4784895","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784895","url":null,"abstract":"In this paper, we study the effects of mobility on network parameters in hierarchical ad hoc networks. Several mobility models have been designed and studied to mimic the behavior of real world mobility in networks. They have been successful in modeling the movement of mobile nodes in simulations. However, in this work, we show that several mobility models fall short of extending the same result to hierarchical networks. Most mobility models can only predict the movement of nodes in a single cell or cluster. When mobile nodes start moving into adjacent clusters, the time required for handoff and other protocol overhead issues alter the throughput. This leads to drastic drop in throughput and increased latency in packet delivery. Also, commonly used routing protocols do not adequately support handling high mobility and frequent route discovery issues. We evaluate the performances of various routing protocols and mobility models in a highly mobile hierarchical ad hoc network using NS2 simulation.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127757304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784994
Deok-Gyu Lee, J. Han, Doosoon Park, Imyeong Lee
The intelligent pervasive network environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. As a number of pervasive network services are available and smart environment is expanding into ubiquitous computing environment, we need to protect intelligent pervasive environment system from illegal accesses and a variety of threats. Intelligent pervasive environment is exposed to various cyber attacks of Internet, involves hacking, malicious codes, worms, viruses, DoS attacks, and eavesdropping since it is connected to Internet. So in this paper, we propose authentication in a intelligent pervasive environment security for guaranteeing reliability and availability including authentication, authorization system. We proposed S/Key based authentication, scheme for secure remote access in intelligent pervasive environments. Furthermore, we describes smart environment authentication which is the basic and essential element in the pervasive network security. And our device authentication concept can offer pervasive network service users convenience and security.
{"title":"Intelligent Pervasive Network Authentication: S/Key Based Device Authentication","authors":"Deok-Gyu Lee, J. Han, Doosoon Park, Imyeong Lee","doi":"10.1109/CCNC.2009.4784994","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784994","url":null,"abstract":"The intelligent pervasive network environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. As a number of pervasive network services are available and smart environment is expanding into ubiquitous computing environment, we need to protect intelligent pervasive environment system from illegal accesses and a variety of threats. Intelligent pervasive environment is exposed to various cyber attacks of Internet, involves hacking, malicious codes, worms, viruses, DoS attacks, and eavesdropping since it is connected to Internet. So in this paper, we propose authentication in a intelligent pervasive environment security for guaranteeing reliability and availability including authentication, authorization system. We proposed S/Key based authentication, scheme for secure remote access in intelligent pervasive environments. Furthermore, we describes smart environment authentication which is the basic and essential element in the pervasive network security. And our device authentication concept can offer pervasive network service users convenience and security.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128062784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784942
Lei Sun, Li Zhao, Xin Tong, W. Carey
This paper surveys the legal and regulatory environment surrounding copyright protection technologies, focusing on China in particular. The paper begins with a discussion of some of the interactions between law and technology in copyright protection, which has led to the creation of international treaties to protect the technologies that protect copyrights. A comparison of the various national responses to these conventions is presented, followed by a discussion of the structure and development of the relatively advanced Chinese system for copyright protection technology. The last section outlines some of the unique challenges that have arisen in China for copyright protection technologies and the businesses that depend upon them.
{"title":"The Legal Environment for Copyright Protection and Trust Management in China","authors":"Lei Sun, Li Zhao, Xin Tong, W. Carey","doi":"10.1109/CCNC.2009.4784942","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784942","url":null,"abstract":"This paper surveys the legal and regulatory environment surrounding copyright protection technologies, focusing on China in particular. The paper begins with a discussion of some of the interactions between law and technology in copyright protection, which has led to the creation of international treaties to protect the technologies that protect copyrights. A comparison of the various national responses to these conventions is presented, followed by a discussion of the structure and development of the relatively advanced Chinese system for copyright protection technology. The last section outlines some of the unique challenges that have arisen in China for copyright protection technologies and the businesses that depend upon them.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128131117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784727
T. Janevski
Today 3G mobile systems are on the ground providing IP connectivity for real-time and non-real-time services. On the other side, there are many wireless technologies that have proven to be important, with the most important ones being 802.11 Wireless Local Area Networks (WLAN) and 802.16 Wireless Metropolitan Area Networks (WMAN), as well as ad-hoc Wireless Personal Area Network (WPAN) and wireless networks for digital TV and radio broadcast. Then, the concepts of 4G is already much discussed and it is almost certain that 4G will include several standards under a common umbrella, similarly to 3G, but with IEEE 802.xx wireless mobile networks included from the beginning. The main contribution of this paper is definition of 5G (Fifth Generation) mobile network concept, which is seen as user-centric concept instead of operator-centric as in 3G or service-centric concept as seen for 4G. In the proposed concept the mobile user is on the top of all. The 5G terminals will have software defined radios and modulation scheme as well as new error-control schemes can be downloaded from the Internet on the run. The development is seen towards the user terminals as a focus of the 5G mobile networks. The terminals will have access to different wireless technologies at the same time and the terminal should be able to combine different flows from different technologies. Each network will be responsible for handling user-mobility, while the terminal will make the final choice among different wireless/mobile access network providers for a given service. The paper also proposes intelligent Internet phone concept where the mobile phone can choose the best connections by selected constraints and dynamically change them during a single end-to-end connection. The proposal in this paper is fundamental shift in the mobile networking philosophy compared to existing 3G and near-soon 4G mobile technologies, and this concept is called here - the 5G.
{"title":"5G Mobile Phone Concept","authors":"T. Janevski","doi":"10.1109/CCNC.2009.4784727","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784727","url":null,"abstract":"Today 3G mobile systems are on the ground providing IP connectivity for real-time and non-real-time services. On the other side, there are many wireless technologies that have proven to be important, with the most important ones being 802.11 Wireless Local Area Networks (WLAN) and 802.16 Wireless Metropolitan Area Networks (WMAN), as well as ad-hoc Wireless Personal Area Network (WPAN) and wireless networks for digital TV and radio broadcast. Then, the concepts of 4G is already much discussed and it is almost certain that 4G will include several standards under a common umbrella, similarly to 3G, but with IEEE 802.xx wireless mobile networks included from the beginning. The main contribution of this paper is definition of 5G (Fifth Generation) mobile network concept, which is seen as user-centric concept instead of operator-centric as in 3G or service-centric concept as seen for 4G. In the proposed concept the mobile user is on the top of all. The 5G terminals will have software defined radios and modulation scheme as well as new error-control schemes can be downloaded from the Internet on the run. The development is seen towards the user terminals as a focus of the 5G mobile networks. The terminals will have access to different wireless technologies at the same time and the terminal should be able to combine different flows from different technologies. Each network will be responsible for handling user-mobility, while the terminal will make the final choice among different wireless/mobile access network providers for a given service. The paper also proposes intelligent Internet phone concept where the mobile phone can choose the best connections by selected constraints and dynamically change them during a single end-to-end connection. The proposal in this paper is fundamental shift in the mobile networking philosophy compared to existing 3G and near-soon 4G mobile technologies, and this concept is called here - the 5G.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132821280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784794
Seung Mo Cho, D. Im, H. Song
Speech recognition is an important application which requires large amount of computation and data. We parallelized speech recognition on ARM11-mpcore, one of the mobile multi-core processors. We achieved 1.92 times speed-up using four cores. We argue that this is sufficiently close to the theoretical best regarding Amdahl's law. We also evaluated it on Intel Core2Quad to derive requirements for future mobile multi-core platforms.
{"title":"Parallelization and analysis of speech recognition on mobile multi-core processor","authors":"Seung Mo Cho, D. Im, H. Song","doi":"10.1109/CCNC.2009.4784794","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784794","url":null,"abstract":"Speech recognition is an important application which requires large amount of computation and data. We parallelized speech recognition on ARM11-mpcore, one of the mobile multi-core processors. We achieved 1.92 times speed-up using four cores. We argue that this is sufficiently close to the theoretical best regarding Amdahl's law. We also evaluated it on Intel Core2Quad to derive requirements for future mobile multi-core platforms.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132823911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784992
Jihoon Cho
We give a definition for a tag identification scheme which uses refresh techniques. We also define a notion of privacy for such a scheme, which accurately reflects real-world threats and tag capabilities. Universal re-encryption, as a refresh technique, has been proposed as an approach to enhance privacy in a pervasive computing environment. However, it permits a hidden adversarial communication channel in a tag identification scheme. Insubvertible encryption was subsequently introduced to address this limitation. We show how the security properties of these two encryption techniques can be used to help enhance privacy in a refresh-based tag identification scheme, and discuss their limitations. We also suggest the practical use of refresh approaches in RFID applications.
{"title":"On Refresh-Based Tag Identification Schemes","authors":"Jihoon Cho","doi":"10.1109/CCNC.2009.4784992","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784992","url":null,"abstract":"We give a definition for a tag identification scheme which uses refresh techniques. We also define a notion of privacy for such a scheme, which accurately reflects real-world threats and tag capabilities. Universal re-encryption, as a refresh technique, has been proposed as an approach to enhance privacy in a pervasive computing environment. However, it permits a hidden adversarial communication channel in a tag identification scheme. Insubvertible encryption was subsequently introduced to address this limitation. We show how the security properties of these two encryption techniques can be used to help enhance privacy in a refresh-based tag identification scheme, and discuss their limitations. We also suggest the practical use of refresh approaches in RFID applications.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133341329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this demonstration, a prototype of live teaching system on overlay service network is presented. The system evolves the following novel characteristics: (1) Firstly, an infrastructure-based overlay multicast structure is introduced, providing multi-channel live media delivery with service differentiation on shared overlay service network. (2) Secondly, the system can support two-way interactive media as well as one-way live media at the same time. The enabling technology is a dynamic user interaction adjustment based on pre-reserved resources in the top layers of the tree. In the demonstration, diversified real-time services will be presented, including audio, video, instant message delivery for multi-channel live teaching scenario, and flexible interactive communication for group discussion.
{"title":"RealClass: An Interactive-Enable Multi-Channel Live Teaching System on Overlay Service Network","authors":"Weizhan Zhang, Q. Zheng, Yanze Lian, Xingzhuo Liu, Jixin Hou","doi":"10.1109/CCNC.2009.4784999","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784999","url":null,"abstract":"In this demonstration, a prototype of live teaching system on overlay service network is presented. The system evolves the following novel characteristics: (1) Firstly, an infrastructure-based overlay multicast structure is introduced, providing multi-channel live media delivery with service differentiation on shared overlay service network. (2) Secondly, the system can support two-way interactive media as well as one-way live media at the same time. The enabling technology is a dynamic user interaction adjustment based on pre-reserved resources in the top layers of the tree. In the demonstration, diversified real-time services will be presented, including audio, video, instant message delivery for multi-channel live teaching scenario, and flexible interactive communication for group discussion.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133445600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784910
Andrew Frankel, Muthucumaru Maheswaran
Social interaction is already a proven component of informal identification: humans are naturally skilled at recognizing other people and are unlikely to be duped by impersonation. Based on this premise, a fourth-factor, someone-you-know, has already been proposed as an emergency authentication method. This paper explores leveraging a user's preexisting social actions as a primary authentication tool, one that operates transparently and automatically without explicit user guidance. Specifically, we describe the feasibility of capturing a user's local social context using short range wireless devices and evaluate the uniqueness of that context in comparison to that of possible aggressors.
{"title":"Feasibility of a Socially Aware Authentication Scheme","authors":"Andrew Frankel, Muthucumaru Maheswaran","doi":"10.1109/CCNC.2009.4784910","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784910","url":null,"abstract":"Social interaction is already a proven component of informal identification: humans are naturally skilled at recognizing other people and are unlikely to be duped by impersonation. Based on this premise, a fourth-factor, someone-you-know, has already been proposed as an emergency authentication method. This paper explores leveraging a user's preexisting social actions as a primary authentication tool, one that operates transparently and automatically without explicit user guidance. Specifically, we describe the feasibility of capturing a user's local social context using short range wireless devices and evaluate the uniqueness of that context in comparison to that of possible aggressors.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133648787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784998
P. Urien
This demonstration shows a WEB application offering multimedia contents, whose access is fully controlled by a smart card according to an innovative context, named TLS-Tandem. Credentials required by the WEB site, and used by the smart card (certificates, private keys), are distributed via AJAX facilities.
{"title":"TLS-Tandem: A Smart Card for WEB Applications","authors":"P. Urien","doi":"10.1109/CCNC.2009.4784998","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784998","url":null,"abstract":"This demonstration shows a WEB application offering multimedia contents, whose access is fully controlled by a smart card according to an innovative context, named TLS-Tandem. Credentials required by the WEB site, and used by the smart card (certificates, private keys), are distributed via AJAX facilities.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134027356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}