首页 > 最新文献

2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing最新文献

英文 中文
A Method for Embedding Secret Key Information in RSA Public Key and Its Application 在RSA公钥中嵌入密钥信息的方法及其应用
Motoki Kitahara, T. Nishide, K. Sakurai
In public key encryption, we need to be able to verify the certificate from a certificate authority to prevent impersonation. In this paper, we propose an encryption system in which we can verify a public key without the certificate. We can realize our encryption system without a impersonation nor a key escrow problem.
在公钥加密中,我们需要能够从证书颁发机构验证证书,以防止冒充。本文提出了一种无需证书即可验证公钥的加密系统。我们可以实现我们的加密系统,没有模拟也没有密钥托管问题。
{"title":"A Method for Embedding Secret Key Information in RSA Public Key and Its Application","authors":"Motoki Kitahara, T. Nishide, K. Sakurai","doi":"10.1109/IMIS.2012.123","DOIUrl":"https://doi.org/10.1109/IMIS.2012.123","url":null,"abstract":"In public key encryption, we need to be able to verify the certificate from a certificate authority to prevent impersonation. In this paper, we propose an encryption system in which we can verify a public key without the certificate. We can realize our encryption system without a impersonation nor a key escrow problem.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"14 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131913414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Delegation-Based Mutual Authentication Scheme for Multi-operator Wireless Mesh Network 基于委托的多运营商无线网状网络相互认证方案
Tianhan Gao, Nan Guo, Kangbin Yim
In order to establish secure access for multi-operator wireless mesh network (WMN), this paper proposes a delegation-based authentication scheme under broker-based hierarchical security architecture and trust model. Mutual authentication is achieved directly between mesh client and access mesh router though ticket which is equipped with identity-based proxy signature. Fast authentication for different roaming scenarios is supported by using HMAC operations on both mesh client side and mesh router side. As a byproduct, key agreement among participants is also implemented to protect the subsequent communications. Security analysis demonstrates that our proposed scheme is resilient to various kinds of attacks.
为了建立多运营商无线网状网络(WMN)的安全访问,在基于代理的分层安全体系结构和信任模型下,提出了一种基于委托的认证方案。通过带有基于身份的代理签名的票据,直接实现了mesh客户端与接入mesh路由器之间的相互认证。通过在mesh客户端和mesh路由器端使用HMAC操作,支持不同漫游场景的快速认证。作为副产品,还实现了参与者之间的密钥协议,以保护后续通信。安全性分析表明,我们提出的方案能够抵御各种攻击。
{"title":"Delegation-Based Mutual Authentication Scheme for Multi-operator Wireless Mesh Network","authors":"Tianhan Gao, Nan Guo, Kangbin Yim","doi":"10.1109/IMIS.2012.194","DOIUrl":"https://doi.org/10.1109/IMIS.2012.194","url":null,"abstract":"In order to establish secure access for multi-operator wireless mesh network (WMN), this paper proposes a delegation-based authentication scheme under broker-based hierarchical security architecture and trust model. Mutual authentication is achieved directly between mesh client and access mesh router though ticket which is equipped with identity-based proxy signature. Fast authentication for different roaming scenarios is supported by using HMAC operations on both mesh client side and mesh router side. As a byproduct, key agreement among participants is also implemented to protect the subsequent communications. Security analysis demonstrates that our proposed scheme is resilient to various kinds of attacks.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133355317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
DAAF: A Device Abstraction and Aggregation Framework for Smart Environments DAAF:智能环境中的设备抽象和聚合框架
A. Paz-Lopez, G. Varela, Victor Sonora, J. Becerra
Largely motivated by the ubiquitous computing vision, computers have been steadily becoming integrated in people's life, expanding the ability of software applications to interact with the environment and the users. This has led to the creation of smart environments that support people in their daily life by exploiting information acquired using sensor networks. These systems are usually populated by multiple non-interoperable technologies that make the development, deployment and reutilization of applications a complex and repetitive task. This paper presents DAAF, a Device Abstraction and Aggregation Framework that provides a common conceptual model of a device network, and a set of tools, which allow a flexible integration of heterogeneous sensor networks, enabling fast development and reconfiguration of smart environment applications.
在无所不在的计算愿景的推动下,计算机已经稳步融入人们的生活,扩展了软件应用程序与环境和用户交互的能力。这导致了智能环境的创建,通过利用传感器网络获取的信息来支持人们的日常生活。这些系统通常由多种不可互操作的技术填充,这使得应用程序的开发、部署和重用成为一项复杂而重复的任务。本文提出了DAAF,一种设备抽象和聚合框架,提供了设备网络的通用概念模型,以及一组工具,允许灵活集成异构传感器网络,实现智能环境应用的快速开发和重新配置。
{"title":"DAAF: A Device Abstraction and Aggregation Framework for Smart Environments","authors":"A. Paz-Lopez, G. Varela, Victor Sonora, J. Becerra","doi":"10.1109/IMIS.2012.116","DOIUrl":"https://doi.org/10.1109/IMIS.2012.116","url":null,"abstract":"Largely motivated by the ubiquitous computing vision, computers have been steadily becoming integrated in people's life, expanding the ability of software applications to interact with the environment and the users. This has led to the creation of smart environments that support people in their daily life by exploiting information acquired using sensor networks. These systems are usually populated by multiple non-interoperable technologies that make the development, deployment and reutilization of applications a complex and repetitive task. This paper presents DAAF, a Device Abstraction and Aggregation Framework that provides a common conceptual model of a device network, and a set of tools, which allow a flexible integration of heterogeneous sensor networks, enabling fast development and reconfiguration of smart environment applications.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131553988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Countermeasures and Tactics for Transitioning against the SSL/TLS Renegotiation Vulnerability 针对SSL/TLS重协商漏洞的过渡对策与策略
Yuji Suga
In November 2009, Marsh Ray, Steve Dispensa and Martin Rex released details of a vulnerability in the SSL and TLS protocols that could allow Man-in-the-Middle attacks to be carried out. SSL and TLS operate between the IP and application layers and ensure application data encryption and data integrity, authenticating the target of communications using X.509 public key certificates. As they are used together with application layer communication protocols such as HTTP, SMTP, and POP, this vulnerability affects a large number of applications and systems. This vulnerability can be attributed to a problem in the SSL and TLS protocol specifications themselves. Fixes have been released for Open SSL and Apache immediately, however most of these involve simply disabling the renegotiation feature that is causing the problem. More thorough measures would require an update to the current specifications and migration to implementations that follow the new specifications. IETF published countermeasures with unprecedented speed as RFC5746, however server-side implementations are not settled. In this paper, we discuss about problems of a transitioning to new specifications including the SSL/TLS renegotiation vulnerability.
2009年11月,Marsh Ray、Steve Dispensa和Martin Rex发布了SSL和TLS协议中一个漏洞的详细信息,该漏洞可能会导致中间人攻击。SSL和TLS在IP层和应用层之间运行,确保应用程序数据加密和数据完整性,使用X.509公钥证书对通信目标进行身份验证。由于它们与HTTP、SMTP和POP等应用层通信协议一起使用,因此该漏洞会影响大量应用程序和系统。此漏洞可归因于SSL和TLS协议规范本身的问题。Open SSL和Apache的修复程序已经立即发布,但是大多数修复程序只涉及禁用导致问题的重新协商功能。更彻底的措施将需要更新当前规范,并迁移到遵循新规范的实现。IETF以前所未有的速度发布了对策,即RFC5746,但服务器端实现尚未解决。在本文中,我们讨论了过渡到新规范的问题,包括SSL/TLS重新协商漏洞。
{"title":"Countermeasures and Tactics for Transitioning against the SSL/TLS Renegotiation Vulnerability","authors":"Yuji Suga","doi":"10.1109/IMIS.2012.138","DOIUrl":"https://doi.org/10.1109/IMIS.2012.138","url":null,"abstract":"In November 2009, Marsh Ray, Steve Dispensa and Martin Rex released details of a vulnerability in the SSL and TLS protocols that could allow Man-in-the-Middle attacks to be carried out. SSL and TLS operate between the IP and application layers and ensure application data encryption and data integrity, authenticating the target of communications using X.509 public key certificates. As they are used together with application layer communication protocols such as HTTP, SMTP, and POP, this vulnerability affects a large number of applications and systems. This vulnerability can be attributed to a problem in the SSL and TLS protocol specifications themselves. Fixes have been released for Open SSL and Apache immediately, however most of these involve simply disabling the renegotiation feature that is causing the problem. More thorough measures would require an update to the current specifications and migration to implementations that follow the new specifications. IETF published countermeasures with unprecedented speed as RFC5746, however server-side implementations are not settled. In this paper, we discuss about problems of a transitioning to new specifications including the SSL/TLS renegotiation vulnerability.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"37 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131789756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Influence of Media Coverage on the Stock Returns and Momentum Profits 媒体报道对股票收益和动量利润的影响
Kuei-Yuan Wang, Chien-Kuo Chen
Media coverage not only provides much firm-specific information to the investor public intuitionally, but also is informative to the stock price. This study tries to examine whether media coverage is an important factor to stock returns on the Taiwan stock market. Our empirical results support this finding on the Taiwan stock market, and find investors can utilize momentum strategies to earn abnormal returns. These findings can provide some meaningful insights to e-business corporate manager, while releasing some news to the public.
媒体报道不仅直观地向投资者公众提供了许多公司特有的信息,而且对股价也有一定的影响。本研究试图检视媒体报导是否为影响台湾股市股票回报的重要因素。本研究在台湾股市的实证结果也支持上述结论,发现投资者可以利用动量策略赚取异常收益。这些发现可以为电子商务企业管理者提供一些有意义的见解,同时也可以向公众发布一些消息。
{"title":"The Influence of Media Coverage on the Stock Returns and Momentum Profits","authors":"Kuei-Yuan Wang, Chien-Kuo Chen","doi":"10.1109/IMIS.2012.151","DOIUrl":"https://doi.org/10.1109/IMIS.2012.151","url":null,"abstract":"Media coverage not only provides much firm-specific information to the investor public intuitionally, but also is informative to the stock price. This study tries to examine whether media coverage is an important factor to stock returns on the Taiwan stock market. Our empirical results support this finding on the Taiwan stock market, and find investors can utilize momentum strategies to earn abnormal returns. These findings can provide some meaningful insights to e-business corporate manager, while releasing some news to the public.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132860285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security of a Public Cloud 公共云的安全性
Irina Astrova, S. G. Grivas, Marc Schaaf, Arne Koschel, Jan Bernhardt, Mark Dennis Kellermeier, Stefan Nitz, Francisco Carriedo Scher, Michael Herr
This paper is about the current state of security in cloud computing. It shows some of the key benefits and the major drawbacks that come around with swapping out services and infrastructure to a public cloud. Based on these benefits and drawbacks, K.O. (knock-out) criteria will be identified, which can be seen as the minimum basis for secure cloud environment. Then a final conclusion about security in cloud computing will be given.
本文是关于云计算安全的现状。它展示了将服务和基础设施交换到公共云的一些关键优点和主要缺点。基于这些优点和缺点,将确定K.O.(淘汰)标准,这可以被视为安全云环境的最低基础。最后对云计算中的安全问题进行了总结。
{"title":"Security of a Public Cloud","authors":"Irina Astrova, S. G. Grivas, Marc Schaaf, Arne Koschel, Jan Bernhardt, Mark Dennis Kellermeier, Stefan Nitz, Francisco Carriedo Scher, Michael Herr","doi":"10.1109/IMIS.2012.78","DOIUrl":"https://doi.org/10.1109/IMIS.2012.78","url":null,"abstract":"This paper is about the current state of security in cloud computing. It shows some of the key benefits and the major drawbacks that come around with swapping out services and infrastructure to a public cloud. Based on these benefits and drawbacks, K.O. (knock-out) criteria will be identified, which can be seen as the minimum basis for secure cloud environment. Then a final conclusion about security in cloud computing will be given.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122229444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Geocast Routing Protocols for VANETs: Survey and Guidelines vanet的地球广播路由协议:调查和指南
S. Allal, S. Boudjit
In Vehicular Ad Hoc Networks VANETs, a multitude of applications need to address not a single vehicle on the road, nor the whole totality of vehicles, but only a community of vehicles which share the same geographic location for the purpose of safety, traffic efficiency, advertising or infotainment. The goal is to transmit data from a unique source node to a set of destination nodes satisfying a set of geographic criteria. Geocast routing protocol in VANETs appear to be the most appropriate routing technique for these applications. In this investigation, we introduce some existing Geocast routing protocols for VANETs and then we provide a classification of these protocols based on the used relay selection technique. We present a comparison of these Geocast routing protocols according to different criteria and finally, we highlight some directions we are considering for our Geocast routing solution for VANETs.
在车辆自组织网络(Vehicular Ad Hoc Networks, vanet)中,大量应用程序需要解决的不是道路上的一辆车,也不是所有车辆,而是为了安全、交通效率、广告或信息娱乐而共享同一地理位置的车辆社区。目标是将数据从唯一的源节点传输到满足一组地理标准的一组目标节点。VANETs中的地播路由协议似乎是最适合这些应用的路由技术。在本研究中,我们介绍了一些现有的用于vanet的地球广播路由协议,然后根据使用的中继选择技术对这些协议进行了分类。我们根据不同的标准对这些Geocast路由协议进行了比较,最后,我们强调了我们正在考虑的VANETs Geocast路由解决方案的一些方向。
{"title":"Geocast Routing Protocols for VANETs: Survey and Guidelines","authors":"S. Allal, S. Boudjit","doi":"10.1109/IMIS.2012.133","DOIUrl":"https://doi.org/10.1109/IMIS.2012.133","url":null,"abstract":"In Vehicular Ad Hoc Networks VANETs, a multitude of applications need to address not a single vehicle on the road, nor the whole totality of vehicles, but only a community of vehicles which share the same geographic location for the purpose of safety, traffic efficiency, advertising or infotainment. The goal is to transmit data from a unique source node to a set of destination nodes satisfying a set of geographic criteria. Geocast routing protocol in VANETs appear to be the most appropriate routing technique for these applications. In this investigation, we introduce some existing Geocast routing protocols for VANETs and then we provide a classification of these protocols based on the used relay selection technique. We present a comparison of these Geocast routing protocols according to different criteria and finally, we highlight some directions we are considering for our Geocast routing solution for VANETs.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115481674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
Similarity Measurement between Objects and Activities for User Intention Modeling 面向用户意图建模的对象与活动相似性度量
Myunggwon Hwang, Sa-kwang Song, Do-Heon Jeong, Hanmin Jung, Jinhyung Kim
User intention modeling is a core part to provide appropriate services in ubiquitous and pervasive computing. And the modeling should be concentrated on preparing user activities according to objects which user approaches or touches. In other works, they just contribute to constructing the modeling under restricted conditions such as places. In order to prepare wide ranging and important factors, this work proposes similarity measurement between objects and activities. Through an evaluation, we show how effective this work is and provide its contributions.
用户意图建模是普适计算和普适计算中提供适当服务的核心部分。建模的重点是根据用户接近或接触的对象来准备用户活动。在其他作品中,它们只是在受限的条件下(如场所)构建模型。为了准备范围广泛和重要的因素,本工作提出了物体和活动之间的相似性测量。通过评估,我们展示了这项工作的有效性,并提供了它的贡献。
{"title":"Similarity Measurement between Objects and Activities for User Intention Modeling","authors":"Myunggwon Hwang, Sa-kwang Song, Do-Heon Jeong, Hanmin Jung, Jinhyung Kim","doi":"10.1109/IMIS.2012.31","DOIUrl":"https://doi.org/10.1109/IMIS.2012.31","url":null,"abstract":"User intention modeling is a core part to provide appropriate services in ubiquitous and pervasive computing. And the modeling should be concentrated on preparing user activities according to objects which user approaches or touches. In other works, they just contribute to constructing the modeling under restricted conditions such as places. In order to prepare wide ranging and important factors, this work proposes similarity measurement between objects and activities. Through an evaluation, we show how effective this work is and provide its contributions.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124370930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Energy-Efficiency and Security Issues in the Cisco Nexus Virtual Distributed Switching 思科Nexus虚拟分布式交换的能源效率和安全问题
Benjamin Peterson, S. Ricciardi, Jordi Nin
Virtualization technologies have brought with them the promise of increased security and energy saving. Such was the case with the Cisco Nexus virtual switching environment. However, possible security issues of this environment have not been evaluated and the achievable energy savings have not been quantified yet. In particular, it was necessary to investigate whether the security vulnerabilities existing in physical switches had persisted into the virtual environment. This paper provides an evaluation of the energy saving and an analysis of the security implications of the Cisco Nexus virtual distributed switching environment.
虚拟化技术带来了提高安全性和节约能源的承诺。这就是Cisco Nexus虚拟交换环境的情况。然而,这种环境可能存在的安全问题尚未得到评估,可实现的节能也尚未得到量化。特别是,有必要调查物理交换机中存在的安全漏洞是否持续存在于虚拟环境中。本文对思科Nexus虚拟分布式交换环境的节能效果进行了评估,并对其安全影响进行了分析。
{"title":"Energy-Efficiency and Security Issues in the Cisco Nexus Virtual Distributed Switching","authors":"Benjamin Peterson, S. Ricciardi, Jordi Nin","doi":"10.1109/IMIS.2012.60","DOIUrl":"https://doi.org/10.1109/IMIS.2012.60","url":null,"abstract":"Virtualization technologies have brought with them the promise of increased security and energy saving. Such was the case with the Cisco Nexus virtual switching environment. However, possible security issues of this environment have not been evaluated and the achievable energy savings have not been quantified yet. In particular, it was necessary to investigate whether the security vulnerabilities existing in physical switches had persisted into the virtual environment. This paper provides an evaluation of the energy saving and an analysis of the security implications of the Cisco Nexus virtual distributed switching environment.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"282 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116082021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Resolving Coordination Challenges in Cooperative Mobile Services 解决合作移动业务中的协调挑战
R. Alcarria, T. Robles, A. Dominguez, E. Cedeño
The Internet of Things enables environments where objects are fully interconnected, allowing the execution of smart services and the consumption of functionalities provided by surrounding Web objects. This loose-coupled object interconnection demands improvements in the control plane for an optimum coordination between distributed services in mobile devices. There are several coordination challenges in these environments, related to the interaction between services, the communication channels establishment across service fragments and the transmission of events at runtime. This paper defines a coordination model and proposes solutions to these challenges by developing a cooperative service execution model for mobile environments, using the publish-subscribe paradigm for communicating control events. Subsequently, we evaluate this model and analyze the improvements of the designed optimization mechanisms over the MQTT protocol and the NS-3 simulator.
物联网支持对象完全互连的环境,允许执行智能服务和使用周围Web对象提供的功能。这种松耦合的对象互连要求在控制平面上进行改进,以实现移动设备中分布式服务之间的最佳协调。在这些环境中存在一些协调挑战,这些挑战与服务之间的交互、跨服务片段建立的通信通道以及运行时事件的传输有关。本文定义了一个协调模型,并通过为移动环境开发一个协作服务执行模型,使用发布-订阅范式来通信控制事件,提出了解决这些挑战的方案。随后,我们对该模型进行了评估,并分析了所设计的优化机制在MQTT协议和NS-3模拟器上的改进。
{"title":"Resolving Coordination Challenges in Cooperative Mobile Services","authors":"R. Alcarria, T. Robles, A. Dominguez, E. Cedeño","doi":"10.1109/IMIS.2012.131","DOIUrl":"https://doi.org/10.1109/IMIS.2012.131","url":null,"abstract":"The Internet of Things enables environments where objects are fully interconnected, allowing the execution of smart services and the consumption of functionalities provided by surrounding Web objects. This loose-coupled object interconnection demands improvements in the control plane for an optimum coordination between distributed services in mobile devices. There are several coordination challenges in these environments, related to the interaction between services, the communication channels establishment across service fragments and the transmission of events at runtime. This paper defines a coordination model and proposes solutions to these challenges by developing a cooperative service execution model for mobile environments, using the publish-subscribe paradigm for communicating control events. Subsequently, we evaluate this model and analyze the improvements of the designed optimization mechanisms over the MQTT protocol and the NS-3 simulator.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123651217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1