Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784980
Takeshi Umezawa, K. Nakauchi, Ved P. Kafle, M. Inoue, T. Matsunaka, T. Warabino, Y. Kishi
In spite of recent advances of personal communication devices and access network technology, users are still facing the issues such as high device maintenance costs, complication of inter-device cooperation, illegal access to devices, and leakage of personal information. Consequently, it is difficult for users to securely construct a network with local as well as remote personal devices. We propose a User-driven Service Creation Platform (USCP), which enables users to construct a secure private network in a simple and intuitive way, making the most of the authentication mechanism in cellular networks. USCP separates signaling and data paths in a flat structure of a virtual network topology. In this paper, we describe the basic design of USCP.
尽管近年来个人通信设备和接入网技术不断进步,但用户仍然面临着设备维护成本高、设备间合作复杂、非法访问设备、个人信息泄露等问题。因此,用户很难安全地使用本地和远程个人设备构建网络。我们提出了一个用户驱动的服务创建平台(User-driven Service Creation Platform, USCP),使用户能够以简单直观的方式构建安全的专用网,充分利用蜂窝网络中的认证机制。USCP在虚拟网络拓扑的平面结构中分离信令和数据路径。本文描述了USCP的基本设计。
{"title":"Basic Design of a User-Driven Service Creation Platform Assisted by Cellular Systems","authors":"Takeshi Umezawa, K. Nakauchi, Ved P. Kafle, M. Inoue, T. Matsunaka, T. Warabino, Y. Kishi","doi":"10.1109/CCNC.2009.4784980","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784980","url":null,"abstract":"In spite of recent advances of personal communication devices and access network technology, users are still facing the issues such as high device maintenance costs, complication of inter-device cooperation, illegal access to devices, and leakage of personal information. Consequently, it is difficult for users to securely construct a network with local as well as remote personal devices. We propose a User-driven Service Creation Platform (USCP), which enables users to construct a secure private network in a simple and intuitive way, making the most of the authentication mechanism in cellular networks. USCP separates signaling and data paths in a flat structure of a virtual network topology. In this paper, we describe the basic design of USCP.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131773360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784864
S. Gurumurthy, A. Ganz
We propose a middleware called BuddyShare to automatically form an overlay group of nearby friends' mobile phones to collaboratively download data by sharing mobile internet. This system is hypothetical in nature and only work on certain assumptions such as: 1) frequent availability of friends' phone nearby, 2) Sufficient social trust among physically close users to share internet and 3) sufficient social networking information available in phones. In order to validate these hypotheses, we collected human centric dataset of cellular phone users of university environment to study the user behavior. In this paper, we present certain social and proximity behaviors of these users that validate these hypotheses and show the practical feasibility of a BuddyShare system. We also study the usefulness of BuddyShare by virtually leveraging it on this user network, which concludes around three times scaling in download rate on average.
{"title":"Analyzing Human Centric Data for Sharing Mobile Internet with Social Buddies","authors":"S. Gurumurthy, A. Ganz","doi":"10.1109/CCNC.2009.4784864","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784864","url":null,"abstract":"We propose a middleware called BuddyShare to automatically form an overlay group of nearby friends' mobile phones to collaboratively download data by sharing mobile internet. This system is hypothetical in nature and only work on certain assumptions such as: 1) frequent availability of friends' phone nearby, 2) Sufficient social trust among physically close users to share internet and 3) sufficient social networking information available in phones. In order to validate these hypotheses, we collected human centric dataset of cellular phone users of university environment to study the user behavior. In this paper, we present certain social and proximity behaviors of these users that validate these hypotheses and show the practical feasibility of a BuddyShare system. We also study the usefulness of BuddyShare by virtually leveraging it on this user network, which concludes around three times scaling in download rate on average.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132339556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784931
J. Buford, Xiaotao Wu, Saratchand Kanuri, R. Bajpai, V. Krishnaswamy
Location privacy management is an important requirement for location based services. Here we describe the design and implementation of location privacy enforcement mechanisms based on the IETF Geopriv specifications as part a location-based services platform that we previously developed. Our design involves a new and more efficient session-based access validation mechanism. In addition, we evaluate the expressiveness of Geopriv rules for describing a variety of privacy rules. We find a number of limitations and propose some methods for extending the rule notation for addressing these limitations. We conclude with an overview of our prototype implementation.
{"title":"Location Privacy Enforcement in a Location-Based Services Platform","authors":"J. Buford, Xiaotao Wu, Saratchand Kanuri, R. Bajpai, V. Krishnaswamy","doi":"10.1109/CCNC.2009.4784931","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784931","url":null,"abstract":"Location privacy management is an important requirement for location based services. Here we describe the design and implementation of location privacy enforcement mechanisms based on the IETF Geopriv specifications as part a location-based services platform that we previously developed. Our design involves a new and more efficient session-based access validation mechanism. In addition, we evaluate the expressiveness of Geopriv rules for describing a variety of privacy rules. We find a number of limitations and propose some methods for extending the rule notation for addressing these limitations. We conclude with an overview of our prototype implementation.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"31 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113993370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4785016
Li Zhao
Supporting both live and on-demand video in a P2P streaming system is an emerging requirement and a technical trend. This demo showcases an experimental but practical P2P streaming system named GridMedia+, which combines live video streaming and on-demand video streaming in a single P2P engine, and also provides a uniform user interface for both PC users and TV users.
{"title":"GridMedia+: A P2P Streaming System for Live and On-Demand Video","authors":"Li Zhao","doi":"10.1109/CCNC.2009.4785016","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4785016","url":null,"abstract":"Supporting both live and on-demand video in a P2P streaming system is an emerging requirement and a technical trend. This demo showcases an experimental but practical P2P streaming system named GridMedia+, which combines live video streaming and on-demand video streaming in a single P2P engine, and also provides a uniform user interface for both PC users and TV users.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114377975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784922
G. Heiser
Virtualization, well established in enterprise computing, is finding its way into embedded systems. However, the use cases differ dramatically between the domains, and this results in significant differences in the requirements on the virtual-machine technology. This paper examines a number of typical virtualization use cases from the CE domain, and the resulting requirements imposed on the hypervisor. We find that enterprise-style hypervisors are ill-matched to the requirements of the embedded domain, which are characterised by low-overhead communication, real-time capability, small memory footprint, small trusted computing base, and fine-grained control over security. We present the OKL4 hypervisor, a member of the L4 microkernel family, designed for embedded-systems use. We outline OKL4's relevant properties with an emphasis on its security mechanisms, and compare its performance to a version of Xen that has recently been promoted for CE use. We conclude that OKL4 is superior to enterprise-style hypervisors for use in CE devices.
{"title":"Hypervisors for Consumer Electronics","authors":"G. Heiser","doi":"10.1109/CCNC.2009.4784922","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784922","url":null,"abstract":"Virtualization, well established in enterprise computing, is finding its way into embedded systems. However, the use cases differ dramatically between the domains, and this results in significant differences in the requirements on the virtual-machine technology. \u0000 \u0000This paper examines a number of typical virtualization use cases from the CE domain, and the resulting requirements imposed on the hypervisor. We find that enterprise-style hypervisors are ill-matched to the requirements of the embedded domain, which are characterised by low-overhead communication, real-time capability, small memory footprint, small trusted computing base, and fine-grained control over security. We present the OKL4 hypervisor, a member of the L4 microkernel family, designed for embedded-systems use. We outline OKL4's relevant properties with an emphasis on its security mechanisms, and compare its performance to a version of Xen that has recently been promoted for CE use. We conclude that OKL4 is superior to enterprise-style hypervisors for use in CE devices.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116969714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4785011
Baek-Gyu Kim, Tae-Hyon Kim, Soon-Ju Kang, Jae Shin Lee, Jin Ho Shon, Sang Chul Go
We introduce a ubiquitous sensor network system, called U-FIPI, to monitor the early symptom of fire and intruder in indoor environment. Especially, this system adapts a novel approach to provide bidirectional location-awareness service between various mobile nodes and U-FIPI fixture nodes making it suitable for total service as a new concept of building management system.
{"title":"U-FIPI: Ubiquitous Sensor Network Service Infra Supporting Bidirectional Location-Awareness between Mobile Nodes and Fixture Nodes","authors":"Baek-Gyu Kim, Tae-Hyon Kim, Soon-Ju Kang, Jae Shin Lee, Jin Ho Shon, Sang Chul Go","doi":"10.1109/CCNC.2009.4785011","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4785011","url":null,"abstract":"We introduce a ubiquitous sensor network system, called U-FIPI, to monitor the early symptom of fire and intruder in indoor environment. Especially, this system adapts a novel approach to provide bidirectional location-awareness service between various mobile nodes and U-FIPI fixture nodes making it suitable for total service as a new concept of building management system.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"242 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115018816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784811
Seung-Ik Lee, Y. Ko, Dongman Lee, S. Hyun
In this paper, we propose QoS-constrained peer selection and nondisruptive rate adaptation schemes with considering shared bottleneck problem to provide a stable peer-to-peer live video streaming service during vertical handoff. In the proposed scheme, a QoS-constrained peer is selected by estimating bandwidth with active probing, and a reception rate converges to a stable state without any QoS degradation with help of multi-path handoff. The shared bottleneck problem is addressed by adjusting the estimated bandwidth and yielding the redundant bandwidth usage.
{"title":"A Nondisruptive Adaptation Scheme for Peer-to-Peer Live Video Streaming during Vertical Handoff","authors":"Seung-Ik Lee, Y. Ko, Dongman Lee, S. Hyun","doi":"10.1109/CCNC.2009.4784811","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784811","url":null,"abstract":"In this paper, we propose QoS-constrained peer selection and nondisruptive rate adaptation schemes with considering shared bottleneck problem to provide a stable peer-to-peer live video streaming service during vertical handoff. In the proposed scheme, a QoS-constrained peer is selected by estimating bandwidth with active probing, and a reception rate converges to a stable state without any QoS degradation with help of multi-path handoff. The shared bottleneck problem is addressed by adjusting the estimated bandwidth and yielding the redundant bandwidth usage.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115260065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784831
Zhu Liu, B. Wei, H. H. Yu
IPTV, enabled by aggregating new technologies in computing, networking, and storage, provides a new information access and entertainment platform in the world of digital evolution. From this perspective where information and entertainment are part of each other, we write this paper to address the issues of IPTV towards seamless infotainment. We focus our discussions to explore such IPTV potentials from three aspects: information access and distribution, improving quality of entertainment, and enabling seamless infotainment. In addition, relevant topics such as IPTV standards and future directions are also discussed.
{"title":"IPTV, Towards Seamless Infotainment","authors":"Zhu Liu, B. Wei, H. H. Yu","doi":"10.1109/CCNC.2009.4784831","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784831","url":null,"abstract":"IPTV, enabled by aggregating new technologies in computing, networking, and storage, provides a new information access and entertainment platform in the world of digital evolution. From this perspective where information and entertainment are part of each other, we write this paper to address the issues of IPTV towards seamless infotainment. We focus our discussions to explore such IPTV potentials from three aspects: information access and distribution, improving quality of entertainment, and enabling seamless infotainment. In addition, relevant topics such as IPTV standards and future directions are also discussed.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":" 27","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113952227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784964
Kenji Saito, K. Miyazawa
To build dependable and sustainable systems requires many iterative trials and stepwise improvements. Rapid programming methods and languages have been studied in the field of peer-to-peer overlay network for this reason. This paper proposes a method for quick programming using Overlay GHC[1] language, an extension of Guarded Horn Clauses[2] for overlay network programming. The method involves a technique called RGP (Remote Goal Placement) instead of RPC over an environment that is viewed as a distributed reduction machine.
{"title":"Rapid P2P Overlay Network Programming on a Distributed Reduction Machine","authors":"Kenji Saito, K. Miyazawa","doi":"10.1109/CCNC.2009.4784964","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784964","url":null,"abstract":"To build dependable and sustainable systems requires many iterative trials and stepwise improvements. Rapid programming methods and languages have been studied in the field of peer-to-peer overlay network for this reason. \u0000 \u0000This paper proposes a method for quick programming using Overlay GHC[1] language, an extension of Guarded Horn Clauses[2] for overlay network programming. The method involves a technique called RGP (Remote Goal Placement) instead of RPC over an environment that is viewed as a distributed reduction machine.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125686888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784943
M. Verma, Dijiang Huang
In this paper, we propose a novel scheme to achieve secure, and efficient vehicular communication. In particular, SegCom provides two mechanisms to perform successive authentication of the vehicle with the road-side infrastructure units to expedite authentication for Vehicle-to-Infrastructure (V2I) communication. Furthermore, to enhance the efficiency of Vehicle-to-Vehicle (V2V) communication, SeGCom permits the vehicles to form group, which are also used for performing multi-hop V2V communication without any assistance from a trusted authority. Comparison with other existing schemes in the literature has been performed to show the efficiency and applicability of our scheme.
{"title":"SeGCom: Secure Group Communication in VANETs","authors":"M. Verma, Dijiang Huang","doi":"10.1109/CCNC.2009.4784943","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784943","url":null,"abstract":"In this paper, we propose a novel scheme to achieve secure, and efficient vehicular communication. In particular, SegCom provides two mechanisms to perform successive authentication of the vehicle with the road-side infrastructure units to expedite authentication for Vehicle-to-Infrastructure (V2I) communication. Furthermore, to enhance the efficiency of Vehicle-to-Vehicle (V2V) communication, SeGCom permits the vehicles to form group, which are also used for performing multi-hop V2V communication without any assistance from a trusted authority. Comparison with other existing schemes in the literature has been performed to show the efficiency and applicability of our scheme.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129794020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}