首页 > 最新文献

2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing最新文献

英文 中文
When Ambient Intelligence Meets Internet Protocol Stack: User Layer Design 当环境智能遇到互联网协议栈:用户层设计
Yu Lu, M. Motani, L. Wong
Recently there has been increasing interest in building networks with Ambient Intelligence (AmI), which incorporates the user-centricity and context awareness. However, both the Internet TCP/IP protocol stack and the seven-layer OSI reference model are not suitable for AmI networks, because they do not specifically take the end-user requirements into consideration in their architecture design. Under the client-server architecture, we propose to explicitly take the end-user into account by defining a new layer called User Layer above the traditional application layer. The User Layer empowers the end-users to influence network performance based on their interaction activities with the networks. We adopt the Model Human Processor (MHP) approach for building the User Model. After that we present an exemplary User Layer implementation to illustrate how the User Layer interacts with the underlying protocol stack and improves end-user's satisfaction with network performance.
最近,人们对建立具有环境智能(AmI)的网络越来越感兴趣,它结合了以用户为中心和上下文感知。然而,Internet TCP/IP协议栈和七层OSI参考模型都不适合AmI网络,因为它们在体系结构设计中没有专门考虑终端用户的需求。在客户机-服务器体系结构下,我们建议通过在传统应用层之上定义一个称为用户层的新层来显式地考虑最终用户。用户层使最终用户能够根据他们与网络的交互活动来影响网络性能。我们采用模型人处理器(MHP)方法来构建用户模型。之后,我们将提供一个示例性的用户层实现,以说明用户层如何与底层协议堆栈交互,并提高最终用户对网络性能的满意度。
{"title":"When Ambient Intelligence Meets Internet Protocol Stack: User Layer Design","authors":"Yu Lu, M. Motani, L. Wong","doi":"10.1109/EUC.2010.66","DOIUrl":"https://doi.org/10.1109/EUC.2010.66","url":null,"abstract":"Recently there has been increasing interest in building networks with Ambient Intelligence (AmI), which incorporates the user-centricity and context awareness. However, both the Internet TCP/IP protocol stack and the seven-layer OSI reference model are not suitable for AmI networks, because they do not specifically take the end-user requirements into consideration in their architecture design. Under the client-server architecture, we propose to explicitly take the end-user into account by defining a new layer called User Layer above the traditional application layer. The User Layer empowers the end-users to influence network performance based on their interaction activities with the networks. We adopt the Model Human Processor (MHP) approach for building the User Model. After that we present an exemplary User Layer implementation to illustrate how the User Layer interacts with the underlying protocol stack and improves end-user's satisfaction with network performance.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127172057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Partitioning Detection and Connectivity Restoration Algorithm for Wireless Sensor and Actor Networks 无线传感器与行动者网络的分区检测与连通性恢复算法
M. Imran, M. Younis, A. Said, H. Hasbullah
Recently, Wireless Sensor and Actor Networks have been receiving a growing attention from the research community because of their suitability for critical applications. Maintaining inter-actor connectivity becomes extremely crucial in such situations where actors have to quickly plan optimal coordinated response to detected events. Failure of critical actor partitions the inter-actor network into disjoint segments, and thus hinders the network operation. Autonomous detection and rapid recovery procedures are highly desirable in such case. This paper presents PCR, a novel distributed partitioning detection and connectivity restoration algorithm. PCR proactively identifies critical actors based on local topological information and designate appropriate backup nodes (preferably non-critical) to handle their failure. A backup actor detects the failure and initiates a recovery process that may involve coordinated multi-actor relocation. The purpose is to avoid procrastination, localize the scope of recovery process and minimize the movement overhead. Simulation results validate the performance of PCR that outperforms contemporary schemes found in literature.
最近,无线传感器和Actor网络因其适用于关键应用而受到研究界越来越多的关注。在参与者必须快速规划对检测到的事件的最佳协调响应的情况下,维护参与者之间的连接变得极其重要。关键行动者的失效将行动者间网络划分为不相交的段,从而阻碍了网络的运行。在这种情况下,自主检测和快速恢复程序是非常可取的。本文提出了一种新的分布式分区检测和连通性恢复算法PCR。PCR基于局部拓扑信息主动识别关键参与者,并指定适当的备份节点(最好是非关键节点)来处理他们的故障。备份参与者检测故障并启动可能涉及协调的多参与者重新定位的恢复过程。这样做的目的是避免拖延,使恢复过程的范围局部化,使运动开销最小化。仿真结果验证了PCR的性能优于文献中发现的当代方案。
{"title":"Partitioning Detection and Connectivity Restoration Algorithm for Wireless Sensor and Actor Networks","authors":"M. Imran, M. Younis, A. Said, H. Hasbullah","doi":"10.1109/EUC.2010.37","DOIUrl":"https://doi.org/10.1109/EUC.2010.37","url":null,"abstract":"Recently, Wireless Sensor and Actor Networks have been receiving a growing attention from the research community because of their suitability for critical applications. Maintaining inter-actor connectivity becomes extremely crucial in such situations where actors have to quickly plan optimal coordinated response to detected events. Failure of critical actor partitions the inter-actor network into disjoint segments, and thus hinders the network operation. Autonomous detection and rapid recovery procedures are highly desirable in such case. This paper presents PCR, a novel distributed partitioning detection and connectivity restoration algorithm. PCR proactively identifies critical actors based on local topological information and designate appropriate backup nodes (preferably non-critical) to handle their failure. A backup actor detects the failure and initiates a recovery process that may involve coordinated multi-actor relocation. The purpose is to avoid procrastination, localize the scope of recovery process and minimize the movement overhead. Simulation results validate the performance of PCR that outperforms contemporary schemes found in literature.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116825446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Defending Malicious Collision Attacks in Wireless Sensor Networks 无线传感器网络中的恶意碰撞攻击防御
Phillip Reindl, K. Nygard, Xiaojiang Du
Security is an important issue for sensor networks deployed in hostile environments, such as military battlefields. The low cost requirement precludes the use of tamper resistant hardware on tiny sensor nodes. Hence, sensor nodes deployed in open areas can be compromised and used to carry out various attacks on the network. In this paper, we consider the collision attack that can be easily launched by a compromised (or hostile) node: a compromised node does not follow the medium access control protocol and cause collisions with neighbor transmissions by sending a short noise packet. This attack does not consume much energy of the attacker but can cause a lot of disruptions to the network operation. Due to the wireless broadcast nature, it is not trivial to identify the attacker. In this paper, we propose a distributed scheme that is based on low-cost hardware and can effectively identify the source of a collision attack. Our scheme is based on analyzing physical-layer Received Signal Strength Index (RSSI) readings. We show that correct identification of an adversarial node can be achieved with greater than 85% accuracy. We further present a technique that degrades gracefully as the background noise increases.
对于部署在敌对环境(如军事战场)中的传感器网络来说,安全性是一个重要问题。低成本要求排除了在微小传感器节点上使用防篡改硬件。因此,部署在开放区域的传感器节点可能被攻破,并被用来对网络进行各种攻击。本文考虑了被攻破(或敌对)节点容易发起的碰撞攻击:被攻破的节点不遵循介质访问控制协议,通过发送短噪声包与邻居传输发生碰撞。这种攻击不会消耗攻击者太多的能量,但会对网络运行造成很大的破坏。由于无线广播的特性,识别攻击者并非易事。在本文中,我们提出了一种基于低成本硬件的分布式方案,可以有效地识别碰撞攻击源。我们的方案是基于分析物理层接收信号强度指数(RSSI)读数。我们表明,对抗性节点的正确识别可以达到大于85%的准确率。我们进一步提出了一种随着背景噪声的增加而优雅地退化的技术。
{"title":"Defending Malicious Collision Attacks in Wireless Sensor Networks","authors":"Phillip Reindl, K. Nygard, Xiaojiang Du","doi":"10.1109/EUC.2010.121","DOIUrl":"https://doi.org/10.1109/EUC.2010.121","url":null,"abstract":"Security is an important issue for sensor networks deployed in hostile environments, such as military battlefields. The low cost requirement precludes the use of tamper resistant hardware on tiny sensor nodes. Hence, sensor nodes deployed in open areas can be compromised and used to carry out various attacks on the network. In this paper, we consider the collision attack that can be easily launched by a compromised (or hostile) node: a compromised node does not follow the medium access control protocol and cause collisions with neighbor transmissions by sending a short noise packet. This attack does not consume much energy of the attacker but can cause a lot of disruptions to the network operation. Due to the wireless broadcast nature, it is not trivial to identify the attacker. In this paper, we propose a distributed scheme that is based on low-cost hardware and can effectively identify the source of a collision attack. Our scheme is based on analyzing physical-layer Received Signal Strength Index (RSSI) readings. We show that correct identification of an adversarial node can be achieved with greater than 85% accuracy. We further present a technique that degrades gracefully as the background noise increases.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116825521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Interference Minimization in Wireless Networks 无线网络中的干扰最小化
H. Aslanyan, J. Rolim
Interference minimization problem in wireless sensor and ad-hoc networks are considered. That is to assign a transmission radius to each node of a network, to make it connected and at the same time to minimize the maximum number of overlapping transmission ranges on each node of a network. Additional means of topology control besides the connectivity is blocking the long line connections at the receiver level. We propose a polynomial time approximation algorithm which finds a connected network with at most $O((optln{n})^{2})$ interference where $opt$ is the minimal interference of the given network of $n$ nodes. The lower bound for this problem, where a general distance function is considered, has been proven to be $O(ln{n})$. The algorithm is known which finds a network where the maximum interference is bounded by $O(sqrt{n})$.
研究了无线传感器网络和自组织网络中的干扰最小化问题。即为网络的每个节点分配一个传输半径,使其连通,同时使网络中每个节点上重叠传输范围的最大数量最小化。除了连接之外,拓扑控制的另一种方法是在接收器级别阻塞长线连接。我们提出了一个多项式时间近似算法,该算法找到一个最多$O((optln{n})^{2})$干扰的连接网络,其中$opt$是给定网络中$n$节点的最小干扰。在考虑一般距离函数的情况下,这个问题的下界已被证明为$O(ln{n})$。已知的算法是找到一个最大干扰以$O(sqrt{n})$为界的网络。
{"title":"Interference Minimization in Wireless Networks","authors":"H. Aslanyan, J. Rolim","doi":"10.1109/EUC.2010.73","DOIUrl":"https://doi.org/10.1109/EUC.2010.73","url":null,"abstract":"Interference minimization problem in wireless sensor and ad-hoc networks are considered. That is to assign a transmission radius to each node of a network, to make it connected and at the same time to minimize the maximum number of overlapping transmission ranges on each node of a network. Additional means of topology control besides the connectivity is blocking the long line connections at the receiver level. We propose a polynomial time approximation algorithm which finds a connected network with at most $O((optln{n})^{2})$ interference where $opt$ is the minimal interference of the given network of $n$ nodes. The lower bound for this problem, where a general distance function is considered, has been proven to be $O(ln{n})$. The algorithm is known which finds a network where the maximum interference is bounded by $O(sqrt{n})$.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123935422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Real-time Enhancement for Xen Hypervisor Xen Hypervisor的实时增强
Peijie Yu, Mingyuan Xia, Qian Lin, Min Zhu, Shang Gao, Zhengwei Qi, Kai Chen, Haibing Guan
System virtualization, which provides good isolation, is now widely used in server consolidation. Meanwhile, one of the hot topics in this field is to extend virtualization for embedded systems. However, current popular virtualization platforms do not support real-time operating systems such as embedded Linux well because the platform is not real-time ware, which will bring low-performance I/O and high scheduling latency. The goal of this paper is to optimize the Xen virtualization platform to be real-time operating system friendly. We improve two aspects of the Xen virtualization platform. First, we improve the xen scheduler to manage the scheduling latency and response time of the real-time operating system. Second, we import multiple real-time operating systems balancing method. Our experiment demonstrates that our enhancement to the Xen virtualization platform support real-time operating system well and the improvement to the real-time performance is about 20%.
系统虚拟化提供了良好的隔离,现在广泛用于服务器整合。同时,如何将虚拟化扩展到嵌入式系统也是当前虚拟化领域的热点之一。然而,目前流行的虚拟化平台由于不是实时软件,对嵌入式Linux等实时操作系统的支持并不好,这会带来低性能I/O和高调度延迟。本文的目标是优化Xen虚拟化平台,使其对实时操作系统友好。我们改进了Xen虚拟化平台的两个方面。首先,我们改进了xen调度器来管理实时操作系统的调度延迟和响应时间。其次,引入多个实时操作系统的平衡方法。实验表明,我们对Xen虚拟化平台的改进能够很好地支持实时操作系统,实时性提高了20%左右。
{"title":"Real-time Enhancement for Xen Hypervisor","authors":"Peijie Yu, Mingyuan Xia, Qian Lin, Min Zhu, Shang Gao, Zhengwei Qi, Kai Chen, Haibing Guan","doi":"10.1109/EUC.2010.14","DOIUrl":"https://doi.org/10.1109/EUC.2010.14","url":null,"abstract":"System virtualization, which provides good isolation, is now widely used in server consolidation. Meanwhile, one of the hot topics in this field is to extend virtualization for embedded systems. However, current popular virtualization platforms do not support real-time operating systems such as embedded Linux well because the platform is not real-time ware, which will bring low-performance I/O and high scheduling latency. The goal of this paper is to optimize the Xen virtualization platform to be real-time operating system friendly. We improve two aspects of the Xen virtualization platform. First, we improve the xen scheduler to manage the scheduling latency and response time of the real-time operating system. Second, we import multiple real-time operating systems balancing method. Our experiment demonstrates that our enhancement to the Xen virtualization platform support real-time operating system well and the improvement to the real-time performance is about 20%.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126570060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
A Dynamic Trust Establishment and Management Framework for Wireless Sensor Networks 无线传感器网络动态信任建立与管理框架
Junqi Zhang, R. Shankaran, M. Orgun, V. Varadharajan, A. Sattar
In this paper, we present a trust establishment and management framework for hierarchical wireless sensor networks. The wireless sensor network architecture we consider consists of a collection of sensor nodes, cluster heads and a base station arranged hierarchically. The framework encompasses schemes for establishing and managing trust between these different entities. We demonstrate that the proposed framework helps to minimize the memory, computation and communication overheads involved in trust management in wireless sensor networks. Our framework takes into account direct and indirect (group) trust in trust evaluation as well as the energy associated with sensor nodes in service selection. It also considers the dynamic aspect of trust by introducing a trust varying function which could be adjusted to give greater weight to the most recently obtained trust values in the trust calculation. The architecture also has the ability to deal with the inter-cluster movement of sensor nodes using a combination of certificate based trust and behaviour based trust.
本文提出了一种分层无线传感器网络的信任建立与管理框架。我们考虑的无线传感器网络架构由传感器节点、簇头和分层排列的基站的集合组成。该框架包含用于在这些不同实体之间建立和管理信任的方案。我们证明了所提出的框架有助于最小化无线传感器网络中信任管理所涉及的内存,计算和通信开销。我们的框架在信任评估中考虑了直接和间接(群体)信任,在服务选择中考虑了与传感器节点相关的能量。它还考虑了信任的动态方面,引入了一个信任变化函数,该函数可以调整为在信任计算中赋予最近获得的信任值更大的权重。该体系结构还能够使用基于证书的信任和基于行为的信任的组合来处理传感器节点的集群间移动。
{"title":"A Dynamic Trust Establishment and Management Framework for Wireless Sensor Networks","authors":"Junqi Zhang, R. Shankaran, M. Orgun, V. Varadharajan, A. Sattar","doi":"10.1109/EUC.2010.80","DOIUrl":"https://doi.org/10.1109/EUC.2010.80","url":null,"abstract":"In this paper, we present a trust establishment and management framework for hierarchical wireless sensor networks. The wireless sensor network architecture we consider consists of a collection of sensor nodes, cluster heads and a base station arranged hierarchically. The framework encompasses schemes for establishing and managing trust between these different entities. We demonstrate that the proposed framework helps to minimize the memory, computation and communication overheads involved in trust management in wireless sensor networks. Our framework takes into account direct and indirect (group) trust in trust evaluation as well as the energy associated with sensor nodes in service selection. It also considers the dynamic aspect of trust by introducing a trust varying function which could be adjusted to give greater weight to the most recently obtained trust values in the trust calculation. The architecture also has the ability to deal with the inter-cluster movement of sensor nodes using a combination of certificate based trust and behaviour based trust.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115813532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
A Method for Dimensioning Micro-Scale Solar Energy Harvesting Systems Based on Energy Level Simulations 基于能级模拟的微尺度太阳能收集系统尺寸确定方法
S. Bader, Torsten Schölzel, B. Oelmann
Solar energy harvesting gains more and more attention in the field of wireless sensor networks. In situations, where these sensor systems are deployed outdoors, powering sensor nodes by solar energy becomes a suitable alternative to the traditional way of battery power supplies. Since solar energy, opposed to batteries, can be considered as an inexhaustible energy source, scavenging this source allows longer system lifetimes and brings wireless sensor networks closer to be an autonomous system with perpetual lifetime. Despite the possibility of designing and constructing these harvesting system, dimensioning becomes a crucial task to fit implemented components to application and load system demands. In this paper we present a way of dimensioning solar harvesting systems based on simulation. Method and implementation of component and system models are described on the basis of an example architecture that has been used in prior work. Furthermore we evaluate the model in comparison to deployment of the same architecture and show the suitability of using the simulation as a support to optimize choices for system parameters.
太阳能采集在无线传感器网络领域越来越受到重视。在这些传感器系统部署在户外的情况下,通过太阳能为传感器节点供电成为传统电池供电方式的合适替代方案。由于与电池相反,太阳能可以被认为是一种取之不尽的能源,因此清除这种能源可以延长系统寿命,并使无线传感器网络更接近于具有永久寿命的自主系统。尽管设计和构建这些收集系统是可能的,但尺寸确定成为使实现组件适应应用和负载系统需求的关键任务。本文提出了一种基于仿真的太阳能收集系统尺寸确定方法。基于之前工作中使用的示例体系结构,描述了组件和系统模型的方法和实现。此外,我们将该模型与相同架构的部署进行了比较,并展示了使用仿真作为优化系统参数选择的支持的适用性。
{"title":"A Method for Dimensioning Micro-Scale Solar Energy Harvesting Systems Based on Energy Level Simulations","authors":"S. Bader, Torsten Schölzel, B. Oelmann","doi":"10.1109/EUC.2010.62","DOIUrl":"https://doi.org/10.1109/EUC.2010.62","url":null,"abstract":"Solar energy harvesting gains more and more attention in the field of wireless sensor networks. In situations, where these sensor systems are deployed outdoors, powering sensor nodes by solar energy becomes a suitable alternative to the traditional way of battery power supplies. Since solar energy, opposed to batteries, can be considered as an inexhaustible energy source, scavenging this source allows longer system lifetimes and brings wireless sensor networks closer to be an autonomous system with perpetual lifetime. Despite the possibility of designing and constructing these harvesting system, dimensioning becomes a crucial task to fit implemented components to application and load system demands. In this paper we present a way of dimensioning solar harvesting systems based on simulation. Method and implementation of component and system models are described on the basis of an example architecture that has been used in prior work. Furthermore we evaluate the model in comparison to deployment of the same architecture and show the suitability of using the simulation as a support to optimize choices for system parameters.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132002988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
OST: A Transaction Based Online Social Trust Model for Social Network and File Sharing Security 基于交易的社交网络和文件共享安全的在线社会信任模型
Ming Li, A. Bonti, Wanlei Zhou
The continuous growth of the users pool of Social Networking web sites such as Face book and My Space, and their incessant augmentation of services and capabilities will in the future, meet and compare in contrast with today's Content distribution Networks (CDN) and Peer-to-Peer File sharing applications such as Kazaa and Bit Torrent, but how can these two main streams applications, that already encounter their own security problems cope with the combined issues, trust for Social Networks, content and index poisoning in CDN? We will address the problems of Social Trust and File Sharing with an overlay level of trust model based on social activity and transactions, this can be an answer to enable users to increase the reliability of their online social life and also enhance the content distribution and create a better file sharing example. The aim of this research is to lower the risk of malicious activity on a given Social Network by applying a correlated trust model, to guarantee the validity of someone's identity, privacy and trustfulness in sharing content.
facebook和My Space等社交网站的用户池不断增长,其服务和功能的不断增强,将在未来与今天的内容分发网络(CDN)和点对点文件共享应用程序(Kazaa和Bit Torrent)形成对比,但这两种主流应用程序,已经遇到了自己的安全问题,如何应对社会网络的信任,CDN的内容和索引中毒?我们将通过基于社交活动和交易的覆盖级信任模型来解决社会信任和文件共享的问题,这可以帮助用户提高其在线社交生活的可靠性,也可以增强内容分发,创造更好的文件共享示例。本研究的目的是通过应用相关信任模型来降低给定社交网络上恶意活动的风险,以保证某人身份的有效性,隐私和共享内容的可信度。
{"title":"OST: A Transaction Based Online Social Trust Model for Social Network and File Sharing Security","authors":"Ming Li, A. Bonti, Wanlei Zhou","doi":"10.1109/EUC.2010.128","DOIUrl":"https://doi.org/10.1109/EUC.2010.128","url":null,"abstract":"The continuous growth of the users pool of Social Networking web sites such as Face book and My Space, and their incessant augmentation of services and capabilities will in the future, meet and compare in contrast with today's Content distribution Networks (CDN) and Peer-to-Peer File sharing applications such as Kazaa and Bit Torrent, but how can these two main streams applications, that already encounter their own security problems cope with the combined issues, trust for Social Networks, content and index poisoning in CDN? We will address the problems of Social Trust and File Sharing with an overlay level of trust model based on social activity and transactions, this can be an answer to enable users to increase the reliability of their online social life and also enhance the content distribution and create a better file sharing example. The aim of this research is to lower the risk of malicious activity on a given Social Network by applying a correlated trust model, to guarantee the validity of someone's identity, privacy and trustfulness in sharing content.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131162482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
IOT Gateway: BridgingWireless Sensor Networks into Internet of Things 物联网网关:将无线传感器网络连接到物联网
Qian Zhu, Ruicong Wang, Qi Chen, Yan Liu, Weijun Qin
With the development of sensor, wireless mobile communication, embedded system and cloud computing, the technologies of Internet of Things have been widely used in logistics, Smart Meter, public security, intelligent building and so on. Because of its huge market prospects, Internet of Things has been paid close attention by several governments all over the world, which is regarded as the third wave of information technology after Internet and mobile communication network. Bridging between wireless sensor networks with traditional communication networks or Internet, IOT Gateway plays an important role in IOT applications, which facilitates the seamless integration of wireless sensor networks and mobile communication networks or Internet, and the management and control with wireless sensor networks. In this paper, we proposed an IOT Gateway system based on Zigbee and GPRS protocols according to the typical IOT application scenarios and requirements from telecom operators, presented the data transmission between wireless sensor networks and mobile communication networks, protocol conversion of different sensor network protocols, and control functionalities for sensor networks, and finally gave an implementation of prototyping system and system validation.
随着传感器、无线移动通信、嵌入式系统、云计算等技术的发展,物联网技术已广泛应用于物流、智能电表、公安、智能建筑等领域。物联网由于其巨大的市场前景,受到了世界各国政府的高度重视,被视为继互联网和移动通信网络之后的第三次信息技术浪潮。物联网网关是无线传感器网络与传统通信网络或互联网之间的桥梁,在物联网应用中发挥着重要作用,它促进了无线传感器网络与移动通信网络或互联网的无缝集成,以及无线传感器网络的管理和控制。本文根据典型的物联网应用场景和电信运营商的需求,提出了一种基于Zigbee和GPRS协议的物联网网关系统,介绍了无线传感器网络与移动通信网络之间的数据传输、不同传感器网络协议的协议转换以及传感器网络的控制功能,最后给出了原型系统的实现和系统验证。
{"title":"IOT Gateway: BridgingWireless Sensor Networks into Internet of Things","authors":"Qian Zhu, Ruicong Wang, Qi Chen, Yan Liu, Weijun Qin","doi":"10.1109/EUC.2010.58","DOIUrl":"https://doi.org/10.1109/EUC.2010.58","url":null,"abstract":"With the development of sensor, wireless mobile communication, embedded system and cloud computing, the technologies of Internet of Things have been widely used in logistics, Smart Meter, public security, intelligent building and so on. Because of its huge market prospects, Internet of Things has been paid close attention by several governments all over the world, which is regarded as the third wave of information technology after Internet and mobile communication network. Bridging between wireless sensor networks with traditional communication networks or Internet, IOT Gateway plays an important role in IOT applications, which facilitates the seamless integration of wireless sensor networks and mobile communication networks or Internet, and the management and control with wireless sensor networks. In this paper, we proposed an IOT Gateway system based on Zigbee and GPRS protocols according to the typical IOT application scenarios and requirements from telecom operators, presented the data transmission between wireless sensor networks and mobile communication networks, protocol conversion of different sensor network protocols, and control functionalities for sensor networks, and finally gave an implementation of prototyping system and system validation.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130936102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 445
Handling Mobility on a QoS-Aware Service-based Framework for Mobile Systems 基于qos感知服务的移动系统框架的移动性处理
Joel Gonçalves, L. Ferreira, L. M. Pinho, Guilherme D. Silva
Mobile applications are becoming increasingly more complex and making heavier demands on local system resources. Moreover, mobile systems are nowadays more open, allowing users to add more and more applications, including third-party developed ones. In this perspective, it is increasingly expected that users will want to execute in their devices applications which supersede currently available resources. It is therefore important to provide frameworks which allow applications to benefit from resources available on other nodes, capable of migrating some or all of its services to other nodes, depending on the user needs. These requirements are even more stringent when users want to execute Quality of Service (QoS) aware applications, such as voice or video. The required resources to guarantee the QoS levels demanded by an application can vary with time, and consequently, applications should be able to reconfigure themselves. This paper proposes a QoS-aware service-based framework able to support distributed, migration-capable, QoS-enabled applications on top of the Android Operating system.
移动应用变得越来越复杂,对本地系统资源的要求越来越高。此外,现在的移动系统更加开放,允许用户添加越来越多的应用程序,包括第三方开发的应用程序。从这个角度来看,越来越多的用户希望在他们的设备中执行取代当前可用资源的应用程序。因此,重要的是提供框架,允许应用程序从其他节点上可用的资源中受益,能够根据用户需求将部分或全部服务迁移到其他节点。当用户想要执行感知服务质量(QoS)的应用程序(如语音或视频)时,这些要求甚至更加严格。保证应用程序所需的QoS级别所需的资源可能随时间而变化,因此,应用程序应该能够重新配置自己。本文提出了一个基于服务的qos感知框架,该框架能够在Android操作系统之上支持分布式、可迁移、支持qos的应用程序。
{"title":"Handling Mobility on a QoS-Aware Service-based Framework for Mobile Systems","authors":"Joel Gonçalves, L. Ferreira, L. M. Pinho, Guilherme D. Silva","doi":"10.1109/EUC.2010.24","DOIUrl":"https://doi.org/10.1109/EUC.2010.24","url":null,"abstract":"Mobile applications are becoming increasingly more complex and making heavier demands on local system resources. Moreover, mobile systems are nowadays more open, allowing users to add more and more applications, including third-party developed ones. In this perspective, it is increasingly expected that users will want to execute in their devices applications which supersede currently available resources. It is therefore important to provide frameworks which allow applications to benefit from resources available on other nodes, capable of migrating some or all of its services to other nodes, depending on the user needs. These requirements are even more stringent when users want to execute Quality of Service (QoS) aware applications, such as voice or video. The required resources to guarantee the QoS levels demanded by an application can vary with time, and consequently, applications should be able to reconfigure themselves. This paper proposes a QoS-aware service-based framework able to support distributed, migration-capable, QoS-enabled applications on top of the Android Operating system.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133421603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1