The new generation of devices connected to Internet are moving towards billion of small and smart objects, so-called Smart Things. These Smart Things are destined to manage the security of our houses, watch our health, and optimize the energy consumption of our cities. They bring a new set of opportunities, but they also present high challenges regarding scalability, management, bootstrapping, identity verification and authentication. For that reason, this work is focused on addressing the security requirements for Smart Things providing an optimized family of primes for Elliptic Curve Cryptography(ECC), denominated Shifting Primes. ECC on Smart Things needs special optimizations for the cryptographic primitives that requires a precise study of the instruction set and the number of cycles for those instructions. The modular multiplication is the basic operation, critical for highly constrained microprocessors, in terms of which ECC is built. It is optimized and also analyzed the interaction between partial results in the chain of modular multiplications needed for ECC. This optimizations have been carried out over the MSP430, which is a widely extended microprocessor for Smart Things. MSP430 is featured by not offering hardware multiplier. For that reason, we have defined a special kind of prime numbers, the Shifting Primes. They are featured by offering a very fast multiplication algorithm for ECC through addition and shifting operations for the multiplications. It is presented the full faster multiplication algorithm for Shifting Primes. These results are presenting a lowest time and number of operations for the multiplication in ECC than the existing solutions. Finally, note that the presented primes can be applied also to other similar architectures with fast shifting operation on registers.
{"title":"Shifting Primes: Optimizing Elliptic Curve Cryptography for Smart Things","authors":"Leandro Marín, A. Jara, A. Gómez-Skarmeta","doi":"10.1109/IMIS.2012.199","DOIUrl":"https://doi.org/10.1109/IMIS.2012.199","url":null,"abstract":"The new generation of devices connected to Internet are moving towards billion of small and smart objects, so-called Smart Things. These Smart Things are destined to manage the security of our houses, watch our health, and optimize the energy consumption of our cities. They bring a new set of opportunities, but they also present high challenges regarding scalability, management, bootstrapping, identity verification and authentication. For that reason, this work is focused on addressing the security requirements for Smart Things providing an optimized family of primes for Elliptic Curve Cryptography(ECC), denominated Shifting Primes. ECC on Smart Things needs special optimizations for the cryptographic primitives that requires a precise study of the instruction set and the number of cycles for those instructions. The modular multiplication is the basic operation, critical for highly constrained microprocessors, in terms of which ECC is built. It is optimized and also analyzed the interaction between partial results in the chain of modular multiplications needed for ECC. This optimizations have been carried out over the MSP430, which is a widely extended microprocessor for Smart Things. MSP430 is featured by not offering hardware multiplier. For that reason, we have defined a special kind of prime numbers, the Shifting Primes. They are featured by offering a very fast multiplication algorithm for ECC through addition and shifting operations for the multiplications. It is presented the full faster multiplication algorithm for Shifting Primes. These results are presenting a lowest time and number of operations for the multiplication in ECC than the existing solutions. Finally, note that the presented primes can be applied also to other similar architectures with fast shifting operation on registers.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130716613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yue Kang, Xingjun Zhang, Nan Wu, Weiguo Wu, Xiaoshe Dong
In this article, for the Linux operating system environment, with the characteristics of ambiguity and uncertainty for the occurrence probability of system failures, fuzzy theory is introduced into the fault tree analysis. The occurrence probability of basic events in the conventional fault tree is made fuzzy by introducing the concept of fuzzy sets. Using the upstream method for solving the minimum cut sets and transferring the different fuzzy numbers into triangular fuzzy numbers, the method is validated with the CPU error detection. This way provides a theoretical basis and implementation for system reliability evaluation, fault diagnosis and maintenance decisions.
{"title":"Fuzzy Fault Tree Based Fault Detection","authors":"Yue Kang, Xingjun Zhang, Nan Wu, Weiguo Wu, Xiaoshe Dong","doi":"10.1109/IMIS.2012.187","DOIUrl":"https://doi.org/10.1109/IMIS.2012.187","url":null,"abstract":"In this article, for the Linux operating system environment, with the characteristics of ambiguity and uncertainty for the occurrence probability of system failures, fuzzy theory is introduced into the fault tree analysis. The occurrence probability of basic events in the conventional fault tree is made fuzzy by introducing the concept of fuzzy sets. Using the upstream method for solving the minimum cut sets and transferring the different fuzzy numbers into triangular fuzzy numbers, the method is validated with the CPU error detection. This way provides a theoretical basis and implementation for system reliability evaluation, fault diagnosis and maintenance decisions.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130807955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we propose an energy-efficient and secure channel group key establishment and rekeying management scheme for mobile IPTV service. Compared with traditional IPTV service, mobile IPTV is much more vulnerable to various attacks, and membership management is more complicated because of the user mobility. Our scheme provides a group key management mechanism that supports authentication between eNB and the mobile devices for security enhancement and efficiently rekeys the group key when membership changes. Our proposal can cope with the security vulnerability of mobile IPTV for reliable group communication and guarantees secure group key rekeying in addition to decreasing the storage and communication overhead.
{"title":"Group Key Management for Secure Mobile IPTV Service","authors":"Inshil Doh, Jiyoung Lim, M. Chung","doi":"10.1109/IMIS.2012.115","DOIUrl":"https://doi.org/10.1109/IMIS.2012.115","url":null,"abstract":"In this paper, we propose an energy-efficient and secure channel group key establishment and rekeying management scheme for mobile IPTV service. Compared with traditional IPTV service, mobile IPTV is much more vulnerable to various attacks, and membership management is more complicated because of the user mobility. Our scheme provides a group key management mechanism that supports authentication between eNB and the mobile devices for security enhancement and efficiently rekeys the group key when membership changes. Our proposal can cope with the security vulnerability of mobile IPTV for reliable group communication and guarantees secure group key rekeying in addition to decreasing the storage and communication overhead.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134210336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sung-Hwa Lim, Jungsup Oh, Byoung-Hoon Lee, Mye M. Sohn
It is highly desired to minimize power consumption, because battery power is one of the most critical resources for mobile devices. Significant energy of a mobile device battery is expended by the activated wireless interface embedded while it is not only in transmit/receive mode but also in idle mode. Therefore, it is energy efficient to turn the wireless interface off or in doze mode while it is not used. However, required energy and time for turning the wireless interface are not negligible. Most of recent works have been trying to enhance the hardware architecture or network/MAC protocols. In this paper, we present an energy efficient policy that turns on the wireless interface only when predefined threshold is exceeded and transmits all awaited data. We propose two kinds of threshold - deadline and sending data queue size. For the practical evaluation, we conduct not only simulations but also experimental measurements by implementing on a real test bed.
{"title":"Threshold-Based Energy-Efficient Data Transmission Policy for Mobile Devices","authors":"Sung-Hwa Lim, Jungsup Oh, Byoung-Hoon Lee, Mye M. Sohn","doi":"10.1109/IMIS.2012.43","DOIUrl":"https://doi.org/10.1109/IMIS.2012.43","url":null,"abstract":"It is highly desired to minimize power consumption, because battery power is one of the most critical resources for mobile devices. Significant energy of a mobile device battery is expended by the activated wireless interface embedded while it is not only in transmit/receive mode but also in idle mode. Therefore, it is energy efficient to turn the wireless interface off or in doze mode while it is not used. However, required energy and time for turning the wireless interface are not negligible. Most of recent works have been trying to enhance the hardware architecture or network/MAC protocols. In this paper, we present an energy efficient policy that turns on the wireless interface only when predefined threshold is exceeded and transmits all awaited data. We propose two kinds of threshold - deadline and sending data queue size. For the practical evaluation, we conduct not only simulations but also experimental measurements by implementing on a real test bed.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132697179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Internet of Things (IoT) is presenting an enormous growing, in numbers, it is estimated that over 50 billion of devices will be connected to Internet by 2020. Therefore, it presents a high scalability requirement to manage every resource connected to the network. Therefore, It is required a high capability for autonomous registration and discovery of resources and services. In addition, it should be dynamically adapted with the inclusion of new devices in the network and changes of the existing ones. Nowadays, the most extended discovery architecture for the Internet is the Domain Name Systems (DNS), which is offering through the extensions multicast DNS (mDNS) and DNS Service Directory (DNS-SD) the query and discovery of services by type and properties. It has been already carried out some initial works on mDNS and DNS-SD for the discovery of things. Thereby, it can satisfy the discovery of resources from the IoT point of view, and discovery of services, i.e. Web Services such as CoAP from the Web of Things point of view. But, it has not been yet analyzed the impact of DNS for Smart Objects, since it cannot be directly applied, because these protocols are designed for host-based requirements, where they are not taking into account the design issues and constraints from the Smart Objects. For that reason, this paper analyzes the requirements and design issues to apply these discovery techniques in Smart Objects, carries out an overview of the satisfaction of them in the initial solutions for IoT, in order to finally offer an evaluation of different ways to apply mDNS and DNS-SD for Smart Objects, concluding with a set of recommendations and lessons learned to build a lightweight implementation of mDNS and DNS-SD for resource discovery and directory.
{"title":"Light-Weight Multicast DNS and DNS-SD (lmDNS-SD): IPv6-Based Resource and Service Discovery for the Web of Things","authors":"A. Jara, P. Martinez-Julia, A. Gómez-Skarmeta","doi":"10.1109/IMIS.2012.200","DOIUrl":"https://doi.org/10.1109/IMIS.2012.200","url":null,"abstract":"Internet of Things (IoT) is presenting an enormous growing, in numbers, it is estimated that over 50 billion of devices will be connected to Internet by 2020. Therefore, it presents a high scalability requirement to manage every resource connected to the network. Therefore, It is required a high capability for autonomous registration and discovery of resources and services. In addition, it should be dynamically adapted with the inclusion of new devices in the network and changes of the existing ones. Nowadays, the most extended discovery architecture for the Internet is the Domain Name Systems (DNS), which is offering through the extensions multicast DNS (mDNS) and DNS Service Directory (DNS-SD) the query and discovery of services by type and properties. It has been already carried out some initial works on mDNS and DNS-SD for the discovery of things. Thereby, it can satisfy the discovery of resources from the IoT point of view, and discovery of services, i.e. Web Services such as CoAP from the Web of Things point of view. But, it has not been yet analyzed the impact of DNS for Smart Objects, since it cannot be directly applied, because these protocols are designed for host-based requirements, where they are not taking into account the design issues and constraints from the Smart Objects. For that reason, this paper analyzes the requirements and design issues to apply these discovery techniques in Smart Objects, carries out an overview of the satisfaction of them in the initial solutions for IoT, in order to finally offer an evaluation of different ways to apply mDNS and DNS-SD for Smart Objects, concluding with a set of recommendations and lessons learned to build a lightweight implementation of mDNS and DNS-SD for resource discovery and directory.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132740237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yan Wen, Jinjing Zhao, Gang Zhao, Hua Chen, Dongxia Wang
In response to a continually advancing threat incurred by untrusted codes from Internet, various virtualization-based technologies have been proposed. Such technologies utilize a software layer, a virtual machine monitor or hyper visor, to achieve the highest privilege in a computer system. Generally, they construct isolated execution environments to run the untrusted code while shielding the other parts of the system from the potential security issues. In this paper, we survey a number of virtualization-based technologies with the goal of finding an appropriate candidate to serve as an untrusted code execution solution on PC platforms. Contenders are reviewed with a number of desirable properties, especially security, transparency portability and performance.
{"title":"A Survey of Virtualization Technologies Focusing on Untrusted Code Execution","authors":"Yan Wen, Jinjing Zhao, Gang Zhao, Hua Chen, Dongxia Wang","doi":"10.1109/IMIS.2012.92","DOIUrl":"https://doi.org/10.1109/IMIS.2012.92","url":null,"abstract":"In response to a continually advancing threat incurred by untrusted codes from Internet, various virtualization-based technologies have been proposed. Such technologies utilize a software layer, a virtual machine monitor or hyper visor, to achieve the highest privilege in a computer system. Generally, they construct isolated execution environments to run the untrusted code while shielding the other parts of the system from the potential security issues. In this paper, we survey a number of virtualization-based technologies with the goal of finding an appropriate candidate to serve as an untrusted code execution solution on PC platforms. Contenders are reviewed with a number of desirable properties, especially security, transparency portability and performance.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129456923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jheng-Sian Li, Yung-Cheng Yao, Chun-Hung Chen, J. Wen
In this paper, a method to improve the accuracy of the time of arrival position location (TOA-PL) solution in multistatic radar systems is proposed. In the conventional TOA-PL technique, the least square (LS) method is applied to estimate target location. However, the performance of the method is significantly degraded under wrong measured data (called as the great error) at the receiver. Hence, the accuracy of location estimation needs to be improved. In this paper, a scheme is proposed to eliminate the effect of the great error. The performance of the location estimation is evaluated based on the root mean square error (RMSE). The results show that the performance with the proposed scheme is better than that with the conventional scheme.
{"title":"A Method to Improve the Accuracy of the TOA Position Location Solution in Multistatic Radar Systems","authors":"Jheng-Sian Li, Yung-Cheng Yao, Chun-Hung Chen, J. Wen","doi":"10.1109/IMIS.2012.36","DOIUrl":"https://doi.org/10.1109/IMIS.2012.36","url":null,"abstract":"In this paper, a method to improve the accuracy of the time of arrival position location (TOA-PL) solution in multistatic radar systems is proposed. In the conventional TOA-PL technique, the least square (LS) method is applied to estimate target location. However, the performance of the method is significantly degraded under wrong measured data (called as the great error) at the receiver. Hence, the accuracy of location estimation needs to be improved. In this paper, a scheme is proposed to eliminate the effect of the great error. The performance of the location estimation is evaluated based on the root mean square error (RMSE). The results show that the performance with the proposed scheme is better than that with the conventional scheme.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116369241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Juan Lopez-de-Armentia, Diego Casado Mansilla, D. López-de-Ipiña
This paper provides an overview of how Internet connected objects can lead to a social change towards energy efficiency in areas where people inhabit (cities, buildings or homes). For this aim it is proposed the use of social networks, like Twitter, as an interaction and communication channel between smart objects and human beings. The presented work demonstrates, by means of an experiment, how an augmented everyday object, i.e. a capsule-based coffee machine, may help to reduce the unnecessary consumed energy in electric appliances. The paper opens the discussion of the promising potential of combining people and future smart everyday objects teaming up to promote a more sustainable behaviour on the planet's behalf.
{"title":"Fighting against Vampire Appliances through Eco-Aware Things","authors":"Juan Lopez-de-Armentia, Diego Casado Mansilla, D. López-de-Ipiña","doi":"10.1109/IMIS.2012.112","DOIUrl":"https://doi.org/10.1109/IMIS.2012.112","url":null,"abstract":"This paper provides an overview of how Internet connected objects can lead to a social change towards energy efficiency in areas where people inhabit (cities, buildings or homes). For this aim it is proposed the use of social networks, like Twitter, as an interaction and communication channel between smart objects and human beings. The presented work demonstrates, by means of an experiment, how an augmented everyday object, i.e. a capsule-based coffee machine, may help to reduce the unnecessary consumed energy in electric appliances. The paper opens the discussion of the promising potential of combining people and future smart everyday objects teaming up to promote a more sustainable behaviour on the planet's behalf.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132106935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
It is a fact that mobile devices have emerged as the core interaction platforms for Human-to-Machine communication. Mixed Reality has reached mobile devices indeed. However, there are still issues regarding its consumption beyond stand-alone applications, such as Layar and Wikitude. This article states the benefits of consuming and integrating Mixed Reality with mobile services through our tailored Service Description Language. Finally, it describes our Mixed Reality-aware architecture for mobile environments and its validation.
{"title":"Mixed Reality-Aware Service Architecture for Mobile Environments","authors":"A. Dominguez, T. Robles, R. Alcarria, E. Cedeño","doi":"10.1109/IMIS.2012.124","DOIUrl":"https://doi.org/10.1109/IMIS.2012.124","url":null,"abstract":"It is a fact that mobile devices have emerged as the core interaction platforms for Human-to-Machine communication. Mixed Reality has reached mobile devices indeed. However, there are still issues regarding its consumption beyond stand-alone applications, such as Layar and Wikitude. This article states the benefits of consuming and integrating Mixed Reality with mobile services through our tailored Service Description Language. Finally, it describes our Mixed Reality-aware architecture for mobile environments and its validation.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132277932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We propose a high-level framework that extends the notion of opportunistic mesh networking to include opportunistic access to and sharing of other device resources such as nonvolatile data storage and computation. While work has been done on providing opportunistic access to each of these resources (network access, data storage, and computation, that is) individually, this paper is an attempt to bring all three resource-sharing applications under the same umbrella. This framework uses an existing "web of trust" protocol that does not require a full public-key infrastructure (PKI) and adds reputation mechanisms to handle interactions between both explicitly-trusted and untrusted peers. Once devices have initiated a connection, they mutually authenticate one another and negotiate the terms of a resource-sharing agreement overran encrypted tunnel. This agreement may involve a payment of electronic currency or a request for credit in exchange for a particular resource, or the resource may be provided at no cost. Each device's local policy dictates how interactions with others should proceed.
{"title":"Extending Mesh Networks to Opportunistic Resource Sharing","authors":"J. Hansen","doi":"10.1109/IMIS.2012.100","DOIUrl":"https://doi.org/10.1109/IMIS.2012.100","url":null,"abstract":"We propose a high-level framework that extends the notion of opportunistic mesh networking to include opportunistic access to and sharing of other device resources such as nonvolatile data storage and computation. While work has been done on providing opportunistic access to each of these resources (network access, data storage, and computation, that is) individually, this paper is an attempt to bring all three resource-sharing applications under the same umbrella. This framework uses an existing \"web of trust\" protocol that does not require a full public-key infrastructure (PKI) and adds reputation mechanisms to handle interactions between both explicitly-trusted and untrusted peers. Once devices have initiated a connection, they mutually authenticate one another and negotiate the terms of a resource-sharing agreement overran encrypted tunnel. This agreement may involve a payment of electronic currency or a request for credit in exchange for a particular resource, or the resource may be provided at no cost. Each device's local policy dictates how interactions with others should proceed.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133776459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}