Pub Date : 2014-11-03DOI: 10.1109/CCNC.2014.6940520
S. Ferretti, S. Mirri, Catia Prandi, P. Salomoni
The pervasive presence of devices exploited to use and deliver entertainment text-based content can make reading easier to get but more difficult to enjoy, in particular for people with reading-related disabilities. The main solutions that allow overcoming some of the difficulties experienced by users with specific and special needs are based on content adaptation and user profiling. This paper presents a system that aims to improve content legibility by exploiting experiential transcoding techniques. The system we propose tracks users' behaviors so as to provide a tailored adaptation of textual content, in order to fit the needs of a specific user on the several different devices she/he actually uses.
{"title":"User centered and context dependent personalization through experiential transcoding","authors":"S. Ferretti, S. Mirri, Catia Prandi, P. Salomoni","doi":"10.1109/CCNC.2014.6940520","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6940520","url":null,"abstract":"The pervasive presence of devices exploited to use and deliver entertainment text-based content can make reading easier to get but more difficult to enjoy, in particular for people with reading-related disabilities. The main solutions that allow overcoming some of the difficulties experienced by users with specific and special needs are based on content adaptation and user profiling. This paper presents a system that aims to improve content legibility by exploiting experiential transcoding techniques. The system we propose tracks users' behaviors so as to provide a tailored adaptation of textual content, in order to fit the needs of a specific user on the several different devices she/he actually uses.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123615029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-03DOI: 10.1109/CCNC.2014.6940525
Jinhong Yang, Hyo-Jin Park, Yongrok Kim, J. Choi
This paper demonstrates hosting IoT gadgets on the wireless AP(Access Point) at home. For this, the process and profile of the IoT gadgets need to be virtualized into JavaScriptbased objects. Then, to execute and control the instances of the virtualized IoT objects on the wireless AP, a novel instance management method is required. The demonstration shows the IoT gadget registration, monitoring, and control on the wireless AP. In addition, generating mash-up instances by connecting multiple gadgets and controlling them together is performed.
{"title":"IoT gadget control on wireless AP at home","authors":"Jinhong Yang, Hyo-Jin Park, Yongrok Kim, J. Choi","doi":"10.1109/CCNC.2014.6940525","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6940525","url":null,"abstract":"This paper demonstrates hosting IoT gadgets on the wireless AP(Access Point) at home. For this, the process and profile of the IoT gadgets need to be virtualized into JavaScriptbased objects. Then, to execute and control the instances of the virtualized IoT objects on the wireless AP, a novel instance management method is required. The demonstration shows the IoT gadget registration, monitoring, and control on the wireless AP. In addition, generating mash-up instances by connecting multiple gadgets and controlling them together is performed.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120980541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-03DOI: 10.1109/CCNC.2014.6940496
A. Facoetti, S. Franceschini, O. Gaggi, G. Galiazzo, S. Gori, C. Palazzi, M. Ruffino
Dyslexia is a learning disability affecting the ability to process written and sometimes even spoken language. It affects educational opportunities of about 10% of children, regardless of their intelligence. One of the main challenges is to be able to identify Dyslexia in preschoolers. To this aim we have developed a set of serious games that are the core of this demo. Our games have been created with a multiplatform approach so as to generate, in a single effort, game versions for mobile platforms and the Web. They have also been designed to be adequately challenging and fun for their target users, as well as effective.
{"title":"Multiplatform games for Dyslexia identification in preschoolers","authors":"A. Facoetti, S. Franceschini, O. Gaggi, G. Galiazzo, S. Gori, C. Palazzi, M. Ruffino","doi":"10.1109/CCNC.2014.6940496","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6940496","url":null,"abstract":"Dyslexia is a learning disability affecting the ability to process written and sometimes even spoken language. It affects educational opportunities of about 10% of children, regardless of their intelligence. One of the main challenges is to be able to identify Dyslexia in preschoolers. To this aim we have developed a set of serious games that are the core of this demo. Our games have been created with a multiplatform approach so as to generate, in a single effort, game versions for mobile platforms and the Web. They have also been designed to be adequately challenging and fun for their target users, as well as effective.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122348457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-03DOI: 10.1109/CCNC.2014.6940506
P. Spachos, Liang Song, D. Hatzinakos
In this demonstration proposal we use a prototype of a Wireless Sensor Network (WSN) to monitor and locate gas leaks of a complex indoor environment. Specifically, a mobile node is moving inside a building to monitor any leakage of carbon dioxide (CO2), supporting and displaying the level and the location of the leakage. Throughout the demonstration, the technological advantages of cognitive networking along with multihop routing are explored.
{"title":"Gas leak detection and localization system through Wireless Sensor Networks","authors":"P. Spachos, Liang Song, D. Hatzinakos","doi":"10.1109/CCNC.2014.6940506","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6940506","url":null,"abstract":"In this demonstration proposal we use a prototype of a Wireless Sensor Network (WSN) to monitor and locate gas leaks of a complex indoor environment. Specifically, a mobile node is moving inside a building to monitor any leakage of carbon dioxide (CO2), supporting and displaying the level and the location of the leakage. Throughout the demonstration, the technological advantages of cognitive networking along with multihop routing are explored.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121751094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-03DOI: 10.1109/CCNC.2014.6940501
Ik-Hyun Youn, Sangil Choi, Richelle Le May, Douglas Bertelsen, Jong-Hoon Youn
Biometric authentication mechanisms are excellent alternatives to often inconvenient interaction authentication methods such as PIN numbers in mobile devices. This research introduces the new concept of using gait signature metrics for biometric authentication. This procedure verifies each subject using only acceleration. We first use a single wireless sensor device to collect data on subjects' gait patterns. By dividing each gait cycle into an Acceleration Phase and a Deceleration Phase, we derive seven periodic and characteristic gait signature metrics. Gait signature metrics can be classified as acceleration metrics, deceleration metrics, and ratio metric. Acceleration metrics represent a degree of dynamic activity when heel-strike actions and mid-stance actions occur, whereas deceleration metrics measure a degree of dynamic activity when mid-stance actions and successive heel-strike of other foot. The last metric, ratio metric, present the relationship between the acceleration metrics and the deceleration metrics. Using the gait signature metrics, we succeeded in differentiating each subject with 100% accuracy.
{"title":"New gait metrics for biometric authentication using a 3-axis acceleration","authors":"Ik-Hyun Youn, Sangil Choi, Richelle Le May, Douglas Bertelsen, Jong-Hoon Youn","doi":"10.1109/CCNC.2014.6940501","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6940501","url":null,"abstract":"Biometric authentication mechanisms are excellent alternatives to often inconvenient interaction authentication methods such as PIN numbers in mobile devices. This research introduces the new concept of using gait signature metrics for biometric authentication. This procedure verifies each subject using only acceleration. We first use a single wireless sensor device to collect data on subjects' gait patterns. By dividing each gait cycle into an Acceleration Phase and a Deceleration Phase, we derive seven periodic and characteristic gait signature metrics. Gait signature metrics can be classified as acceleration metrics, deceleration metrics, and ratio metric. Acceleration metrics represent a degree of dynamic activity when heel-strike actions and mid-stance actions occur, whereas deceleration metrics measure a degree of dynamic activity when mid-stance actions and successive heel-strike of other foot. The last metric, ratio metric, present the relationship between the acceleration metrics and the deceleration metrics. Using the gait signature metrics, we succeeded in differentiating each subject with 100% accuracy.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114295045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-03DOI: 10.1109/CCNC.2014.7056330
Debessay Fesehaye, Jun Wei
We present a scalable NDN-based conferencing architecture for conference control and management. Conference control functions are divided into individual service modules and are loaded into different control servers. Control servers are added into the control cluster as the number of parcitipants increases. Participants are allowed to register and receive variety of conference control services from any control servers within the cluster. Participant registration and access records are maintained locally by specific control servers. This work presents essential building blocks using (1) light-weighted metadata for effective participant record management, (2) distributed and self-organized storage and replication of participant records, (3) efficient, secure and distributed conference access mechanisms, and (4) dynamic and effective control server discovery. This system enables quick and efficient cluster access by supporting seamless participant mobility and automatic server load balancing. The control cluster is self-organized and self-healing and able to scale to large size of participants. It can also be extended to host multiple conferences. Using CCNx toolkits, we have demonstrated how SNC can automatically (seamlessly) select the closest (small delay) server avoiding congested (under-attack) and far away servers. Using simulation experiments, we have also shown the effectiveness of interest response suppression mechanisms which SNC can employ.
{"title":"SNC: Scalable NDN-based conferencing architecture","authors":"Debessay Fesehaye, Jun Wei","doi":"10.1109/CCNC.2014.7056330","DOIUrl":"https://doi.org/10.1109/CCNC.2014.7056330","url":null,"abstract":"We present a scalable NDN-based conferencing architecture for conference control and management. Conference control functions are divided into individual service modules and are loaded into different control servers. Control servers are added into the control cluster as the number of parcitipants increases. Participants are allowed to register and receive variety of conference control services from any control servers within the cluster. Participant registration and access records are maintained locally by specific control servers. This work presents essential building blocks using (1) light-weighted metadata for effective participant record management, (2) distributed and self-organized storage and replication of participant records, (3) efficient, secure and distributed conference access mechanisms, and (4) dynamic and effective control server discovery. This system enables quick and efficient cluster access by supporting seamless participant mobility and automatic server load balancing. The control cluster is self-organized and self-healing and able to scale to large size of participants. It can also be extended to host multiple conferences. Using CCNx toolkits, we have demonstrated how SNC can automatically (seamlessly) select the closest (small delay) server avoiding congested (under-attack) and far away servers. Using simulation experiments, we have also shown the effectiveness of interest response suppression mechanisms which SNC can employ.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127542536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-03DOI: 10.1109/CCNC.2014.6940528
Christopher A. Wood, E. Uzun
Content-centric networking (CCN) project, a flavor of information-centric networking (ICN), decouples data from its source by shifting the emphasis from hosts and interfaces to information. As a result, content becomes directly accessible and routable within the network. In this data-centric paradigm, techniques for maintaining content confidentiality and privacy typically rely on cryptographic techniques similar to those used in modern digital rights management (DRM) applications, which often require multiple consumer-to-producer (end-to-end) messages to be transmitted to establish identities, acquire licenses, and access encrypted content. In this paper, we present a secure content distribution architecture for CCN that is based on proxy re-encryption. Our design provides strong end-to-end content security and reduces the number of protocol messages required for user authentication and key retrieval. Unlike widely-deployed solutions, our solution is also capable of utilizing the opportunistic in-network caches in CCN. We also experimentally compare two proxy re-encryption schemes that can be used to implement the architecture, and describe the proof of concept application we developed over CCNx.
{"title":"Flexible end-to-end content security in CCN","authors":"Christopher A. Wood, E. Uzun","doi":"10.1109/CCNC.2014.6940528","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6940528","url":null,"abstract":"Content-centric networking (CCN) project, a flavor of information-centric networking (ICN), decouples data from its source by shifting the emphasis from hosts and interfaces to information. As a result, content becomes directly accessible and routable within the network. In this data-centric paradigm, techniques for maintaining content confidentiality and privacy typically rely on cryptographic techniques similar to those used in modern digital rights management (DRM) applications, which often require multiple consumer-to-producer (end-to-end) messages to be transmitted to establish identities, acquire licenses, and access encrypted content. In this paper, we present a secure content distribution architecture for CCN that is based on proxy re-encryption. Our design provides strong end-to-end content security and reduces the number of protocol messages required for user authentication and key retrieval. Unlike widely-deployed solutions, our solution is also capable of utilizing the opportunistic in-network caches in CCN. We also experimentally compare two proxy re-encryption schemes that can be used to implement the architecture, and describe the proof of concept application we developed over CCNx.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133057738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-03DOI: 10.1109/CCNC.2014.6940513
T. Sumi, T. Ishiguro, S. Kiyomoto, Yutaka Miyake, Toru Kobayashi, T. Takagi
Web Workers is a specification that defines an API which allows Web application developers to use background workers running scripts in parallel. Web Workers is used with JavaScript and is platform-independent. Hence, Web applications written in JavaScript can be used for a wide variety of purposes. There are many Web applications and some of them, for instance Internet election campaign and real-time broadcasting, need secure communications. We can include digital signatures with such Web applications to guarantee their security of communications. In this demonstration proposal, we assess the performance of parallel implementations of public key cryptosystems on several Web browsers (Internet Explorer, Google Chrome, Opera, and Firefox). With our implementation, it is possible to verify a message in 1.03 milliseconds on a Windows PC and 5.49 milliseconds on an Android tablet (Nexus 7). We also propose cryptography applications for Web browsers.
Web Workers是一种规范,它定义了一个API,允许Web应用程序开发人员使用并行运行脚本的后台worker。Web Workers与JavaScript一起使用,并且是独立于平台的。因此,用JavaScript编写的Web应用程序可以用于各种各样的目的。有许多Web应用程序,其中一些应用程序(例如Internet竞选和实时广播)需要安全通信。我们可以在这样的Web应用程序中包含数字签名,以保证其通信的安全性。在这个演示提案中,我们评估了几种Web浏览器(Internet Explorer、Google Chrome、Opera和Firefox)上公钥密码系统并行实现的性能。通过我们的实现,在Windows PC上验证消息的时间为1.03毫秒,在Android平板电脑(Nexus 7)上验证消息的时间为5.49毫秒。我们还为Web浏览器提出了加密应用程序。
{"title":"Parallel implementation of public key cryptosystems using Web workers","authors":"T. Sumi, T. Ishiguro, S. Kiyomoto, Yutaka Miyake, Toru Kobayashi, T. Takagi","doi":"10.1109/CCNC.2014.6940513","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6940513","url":null,"abstract":"Web Workers is a specification that defines an API which allows Web application developers to use background workers running scripts in parallel. Web Workers is used with JavaScript and is platform-independent. Hence, Web applications written in JavaScript can be used for a wide variety of purposes. There are many Web applications and some of them, for instance Internet election campaign and real-time broadcasting, need secure communications. We can include digital signatures with such Web applications to guarantee their security of communications. In this demonstration proposal, we assess the performance of parallel implementations of public key cryptosystems on several Web browsers (Internet Explorer, Google Chrome, Opera, and Firefox). With our implementation, it is possible to verify a message in 1.03 milliseconds on a Windows PC and 5.49 milliseconds on an Android tablet (Nexus 7). We also propose cryptography applications for Web browsers.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131098635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-03DOI: 10.1109/CCNC.2014.6940505
H. D. Mustafa, S. Vijayan, S. Katta, S. Sagar, S. Merchant, U. Desai
This paper proposes a symbiotic and distributed communication paradigm for heterogeneous networks. The green and adaptive approach entails the simultaneous use of multiple communication interfaces, enabling efficient resource utilization. The judiciously designed architecture allows multiple users to access multiple mediums concomitantly, for both uplink and downlink, via virtualized communication ports and Internet Protocol (IP) schematic. Principal theoretic feasibility of the hypothesis is established by the linear increase in communication ca-pacity, with minimal energy requirement. Promising simulation and experimental results of a static scenario are shown, User Equipment's (UEs) connecting to multiple Communication Mediums (CMs).
{"title":"Green symbiotic heterogeneous networks","authors":"H. D. Mustafa, S. Vijayan, S. Katta, S. Sagar, S. Merchant, U. Desai","doi":"10.1109/CCNC.2014.6940505","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6940505","url":null,"abstract":"This paper proposes a symbiotic and distributed communication paradigm for heterogeneous networks. The green and adaptive approach entails the simultaneous use of multiple communication interfaces, enabling efficient resource utilization. The judiciously designed architecture allows multiple users to access multiple mediums concomitantly, for both uplink and downlink, via virtualized communication ports and Internet Protocol (IP) schematic. Principal theoretic feasibility of the hypothesis is established by the linear increase in communication ca-pacity, with minimal energy requirement. Promising simulation and experimental results of a static scenario are shown, User Equipment's (UEs) connecting to multiple Communication Mediums (CMs).","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131593192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}