首页 > 最新文献

2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing最新文献

英文 中文
Shifting Primes: Optimizing Elliptic Curve Cryptography for Smart Things 移位素数:优化智能事物的椭圆曲线密码
Leandro Marín, A. Jara, A. Gómez-Skarmeta
The new generation of devices connected to Internet are moving towards billion of small and smart objects, so-called Smart Things. These Smart Things are destined to manage the security of our houses, watch our health, and optimize the energy consumption of our cities. They bring a new set of opportunities, but they also present high challenges regarding scalability, management, bootstrapping, identity verification and authentication. For that reason, this work is focused on addressing the security requirements for Smart Things providing an optimized family of primes for Elliptic Curve Cryptography(ECC), denominated Shifting Primes. ECC on Smart Things needs special optimizations for the cryptographic primitives that requires a precise study of the instruction set and the number of cycles for those instructions. The modular multiplication is the basic operation, critical for highly constrained microprocessors, in terms of which ECC is built. It is optimized and also analyzed the interaction between partial results in the chain of modular multiplications needed for ECC. This optimizations have been carried out over the MSP430, which is a widely extended microprocessor for Smart Things. MSP430 is featured by not offering hardware multiplier. For that reason, we have defined a special kind of prime numbers, the Shifting Primes. They are featured by offering a very fast multiplication algorithm for ECC through addition and shifting operations for the multiplications. It is presented the full faster multiplication algorithm for Shifting Primes. These results are presenting a lowest time and number of operations for the multiplication in ECC than the existing solutions. Finally, note that the presented primes can be applied also to other similar architectures with fast shifting operation on registers.
连接到互联网的新一代设备正朝着数十亿小而智能的对象发展,即所谓的智能事物。这些智能设备注定要管理我们的房屋安全,监视我们的健康,并优化我们城市的能源消耗。它们带来了一系列新的机遇,但也提出了关于可扩展性、管理、引导、身份验证和身份验证的高度挑战。出于这个原因,这项工作的重点是解决智能事物的安全需求,为椭圆曲线加密(ECC)提供了一个优化的素数族,称为移位素数。Smart Things上的ECC需要对加密原语进行特殊优化,这需要对指令集和这些指令的周期数量进行精确的研究。模块化乘法是基本操作,对于高度受限的微处理器至关重要,ECC是根据其构建的。对该算法进行了优化,并分析了ECC所需的模乘链中部分结果之间的相互作用。这种优化是在MSP430上进行的,MSP430是一种广泛扩展的智能事物微处理器。MSP430的特点是不提供硬件乘法器。因此,我们定义了一种特殊的素数,即移位素数。它们的特点是通过乘法的加法和移位操作为ECC提供了非常快速的乘法算法。给出了移动素数的全快速乘法算法。这些结果表明,与现有的解决方案相比,ECC中的乘法运算时间和操作次数最少。最后,请注意,所介绍的素数也可以应用于寄存器上具有快速移位操作的其他类似体系结构。
{"title":"Shifting Primes: Optimizing Elliptic Curve Cryptography for Smart Things","authors":"Leandro Marín, A. Jara, A. Gómez-Skarmeta","doi":"10.1109/IMIS.2012.199","DOIUrl":"https://doi.org/10.1109/IMIS.2012.199","url":null,"abstract":"The new generation of devices connected to Internet are moving towards billion of small and smart objects, so-called Smart Things. These Smart Things are destined to manage the security of our houses, watch our health, and optimize the energy consumption of our cities. They bring a new set of opportunities, but they also present high challenges regarding scalability, management, bootstrapping, identity verification and authentication. For that reason, this work is focused on addressing the security requirements for Smart Things providing an optimized family of primes for Elliptic Curve Cryptography(ECC), denominated Shifting Primes. ECC on Smart Things needs special optimizations for the cryptographic primitives that requires a precise study of the instruction set and the number of cycles for those instructions. The modular multiplication is the basic operation, critical for highly constrained microprocessors, in terms of which ECC is built. It is optimized and also analyzed the interaction between partial results in the chain of modular multiplications needed for ECC. This optimizations have been carried out over the MSP430, which is a widely extended microprocessor for Smart Things. MSP430 is featured by not offering hardware multiplier. For that reason, we have defined a special kind of prime numbers, the Shifting Primes. They are featured by offering a very fast multiplication algorithm for ECC through addition and shifting operations for the multiplications. It is presented the full faster multiplication algorithm for Shifting Primes. These results are presenting a lowest time and number of operations for the multiplication in ECC than the existing solutions. Finally, note that the presented primes can be applied also to other similar architectures with fast shifting operation on registers.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130716613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Fuzzy Fault Tree Based Fault Detection 基于模糊故障树的故障检测
Yue Kang, Xingjun Zhang, Nan Wu, Weiguo Wu, Xiaoshe Dong
In this article, for the Linux operating system environment, with the characteristics of ambiguity and uncertainty for the occurrence probability of system failures, fuzzy theory is introduced into the fault tree analysis. The occurrence probability of basic events in the conventional fault tree is made fuzzy by introducing the concept of fuzzy sets. Using the upstream method for solving the minimum cut sets and transferring the different fuzzy numbers into triangular fuzzy numbers, the method is validated with the CPU error detection. This way provides a theoretical basis and implementation for system reliability evaluation, fault diagnosis and maintenance decisions.
本文针对Linux操作系统环境中系统故障发生概率具有模糊性和不确定性的特点,将模糊理论引入到故障树分析中。通过引入模糊集的概念,使常规故障树中基本事件的发生概率变得模糊。利用上游法求解最小割集,将不同模糊数转化为三角模糊数,并通过CPU错误检测对该方法进行了验证。该方法为系统可靠性评估、故障诊断和维护决策提供了理论依据和实现方法。
{"title":"Fuzzy Fault Tree Based Fault Detection","authors":"Yue Kang, Xingjun Zhang, Nan Wu, Weiguo Wu, Xiaoshe Dong","doi":"10.1109/IMIS.2012.187","DOIUrl":"https://doi.org/10.1109/IMIS.2012.187","url":null,"abstract":"In this article, for the Linux operating system environment, with the characteristics of ambiguity and uncertainty for the occurrence probability of system failures, fuzzy theory is introduced into the fault tree analysis. The occurrence probability of basic events in the conventional fault tree is made fuzzy by introducing the concept of fuzzy sets. Using the upstream method for solving the minimum cut sets and transferring the different fuzzy numbers into triangular fuzzy numbers, the method is validated with the CPU error detection. This way provides a theoretical basis and implementation for system reliability evaluation, fault diagnosis and maintenance decisions.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130807955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Group Key Management for Secure Mobile IPTV Service 安全移动IPTV业务的组密钥管理
Inshil Doh, Jiyoung Lim, M. Chung
In this paper, we propose an energy-efficient and secure channel group key establishment and rekeying management scheme for mobile IPTV service. Compared with traditional IPTV service, mobile IPTV is much more vulnerable to various attacks, and membership management is more complicated because of the user mobility. Our scheme provides a group key management mechanism that supports authentication between eNB and the mobile devices for security enhancement and efficiently rekeys the group key when membership changes. Our proposal can cope with the security vulnerability of mobile IPTV for reliable group communication and guarantees secure group key rekeying in addition to decreasing the storage and communication overhead.
本文提出了一种节能、安全的移动IPTV信道组密钥建立和重钥管理方案。与传统的IPTV业务相比,移动IPTV更容易受到各种攻击,而且由于用户的移动性,会员管理也更加复杂。我们的方案提供了一种组密钥管理机制,支持eNB和移动设备之间的身份验证,以增强安全性,并在成员变更时有效地重新颁发组密钥。该方案可以解决移动IPTV的安全漏洞,实现可靠的组通信,在减少存储和通信开销的同时保证组密钥的安全密钥更新。
{"title":"Group Key Management for Secure Mobile IPTV Service","authors":"Inshil Doh, Jiyoung Lim, M. Chung","doi":"10.1109/IMIS.2012.115","DOIUrl":"https://doi.org/10.1109/IMIS.2012.115","url":null,"abstract":"In this paper, we propose an energy-efficient and secure channel group key establishment and rekeying management scheme for mobile IPTV service. Compared with traditional IPTV service, mobile IPTV is much more vulnerable to various attacks, and membership management is more complicated because of the user mobility. Our scheme provides a group key management mechanism that supports authentication between eNB and the mobile devices for security enhancement and efficiently rekeys the group key when membership changes. Our proposal can cope with the security vulnerability of mobile IPTV for reliable group communication and guarantees secure group key rekeying in addition to decreasing the storage and communication overhead.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134210336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Threshold-Based Energy-Efficient Data Transmission Policy for Mobile Devices 基于阈值的移动设备节能数据传输策略
Sung-Hwa Lim, Jungsup Oh, Byoung-Hoon Lee, Mye M. Sohn
It is highly desired to minimize power consumption, because battery power is one of the most critical resources for mobile devices. Significant energy of a mobile device battery is expended by the activated wireless interface embedded while it is not only in transmit/receive mode but also in idle mode. Therefore, it is energy efficient to turn the wireless interface off or in doze mode while it is not used. However, required energy and time for turning the wireless interface are not negligible. Most of recent works have been trying to enhance the hardware architecture or network/MAC protocols. In this paper, we present an energy efficient policy that turns on the wireless interface only when predefined threshold is exceeded and transmits all awaited data. We propose two kinds of threshold - deadline and sending data queue size. For the practical evaluation, we conduct not only simulations but also experimental measurements by implementing on a real test bed.
我们非常希望最小化功耗,因为电池电量是移动设备最关键的资源之一。所述嵌入的激活无线接口不仅处于发送/接收模式,而且处于空闲模式时,消耗了移动设备电池的大量能量。因此,在不使用无线接口时,将其关闭或处于休眠模式是节能的。然而,转动无线接口所需的能量和时间是不可忽略的。最近的大部分工作都是试图增强硬件架构或网络/MAC协议。在本文中,我们提出了一种节能策略,该策略仅在超过预定义阈值时才打开无线接口并传输所有等待的数据。我们提出了两种阈值——截止日期和发送数据队列大小。为了进行实际评估,我们不仅进行了仿真,还在实际测试台上进行了实验测量。
{"title":"Threshold-Based Energy-Efficient Data Transmission Policy for Mobile Devices","authors":"Sung-Hwa Lim, Jungsup Oh, Byoung-Hoon Lee, Mye M. Sohn","doi":"10.1109/IMIS.2012.43","DOIUrl":"https://doi.org/10.1109/IMIS.2012.43","url":null,"abstract":"It is highly desired to minimize power consumption, because battery power is one of the most critical resources for mobile devices. Significant energy of a mobile device battery is expended by the activated wireless interface embedded while it is not only in transmit/receive mode but also in idle mode. Therefore, it is energy efficient to turn the wireless interface off or in doze mode while it is not used. However, required energy and time for turning the wireless interface are not negligible. Most of recent works have been trying to enhance the hardware architecture or network/MAC protocols. In this paper, we present an energy efficient policy that turns on the wireless interface only when predefined threshold is exceeded and transmits all awaited data. We propose two kinds of threshold - deadline and sending data queue size. For the practical evaluation, we conduct not only simulations but also experimental measurements by implementing on a real test bed.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132697179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Light-Weight Multicast DNS and DNS-SD (lmDNS-SD): IPv6-Based Resource and Service Discovery for the Web of Things 轻量级组播DNS和DNS- sd (lmdn - sd):基于ipv6的物联网资源和服务发现
A. Jara, P. Martinez-Julia, A. Gómez-Skarmeta
Internet of Things (IoT) is presenting an enormous growing, in numbers, it is estimated that over 50 billion of devices will be connected to Internet by 2020. Therefore, it presents a high scalability requirement to manage every resource connected to the network. Therefore, It is required a high capability for autonomous registration and discovery of resources and services. In addition, it should be dynamically adapted with the inclusion of new devices in the network and changes of the existing ones. Nowadays, the most extended discovery architecture for the Internet is the Domain Name Systems (DNS), which is offering through the extensions multicast DNS (mDNS) and DNS Service Directory (DNS-SD) the query and discovery of services by type and properties. It has been already carried out some initial works on mDNS and DNS-SD for the discovery of things. Thereby, it can satisfy the discovery of resources from the IoT point of view, and discovery of services, i.e. Web Services such as CoAP from the Web of Things point of view. But, it has not been yet analyzed the impact of DNS for Smart Objects, since it cannot be directly applied, because these protocols are designed for host-based requirements, where they are not taking into account the design issues and constraints from the Smart Objects. For that reason, this paper analyzes the requirements and design issues to apply these discovery techniques in Smart Objects, carries out an overview of the satisfaction of them in the initial solutions for IoT, in order to finally offer an evaluation of different ways to apply mDNS and DNS-SD for Smart Objects, concluding with a set of recommendations and lessons learned to build a lightweight implementation of mDNS and DNS-SD for resource discovery and directory.
物联网(IoT)正在呈现巨大的增长,据估计,到2020年,将有超过500亿台设备连接到互联网。因此,它对连接到网络上的每一个资源都提出了很高的可扩展性要求。因此,对资源和服务的自主注册和发现能力提出了很高的要求。此外,它还应随着网络中新设备的加入和现有设备的变化而动态适应。目前,Internet上扩展最多的发现体系结构是域名系统(DNS),它通过扩展组播DNS (mDNS)和DNS服务目录(DNS- sd)提供按类型和属性查询和发现服务的功能。它已经在mDNS和DNS-SD上进行了一些初步的工作,用于发现事物。因此,它可以满足从物联网的角度发现资源,从物联网的角度发现服务,即CoAP等Web服务。但是,还没有分析DNS对智能对象的影响,因为它不能直接应用,因为这些协议是为基于主机的需求而设计的,它们没有考虑到智能对象的设计问题和约束。因此,本文分析了在智能对象中应用这些发现技术的需求和设计问题,概述了它们在物联网初始解决方案中的满意度,最后对智能对象中应用mDNS和DNS-SD的不同方式进行了评估,最后提出了一套建议和经验教训,以构建用于资源发现和目录的mDNS和DNS-SD的轻量级实现。
{"title":"Light-Weight Multicast DNS and DNS-SD (lmDNS-SD): IPv6-Based Resource and Service Discovery for the Web of Things","authors":"A. Jara, P. Martinez-Julia, A. Gómez-Skarmeta","doi":"10.1109/IMIS.2012.200","DOIUrl":"https://doi.org/10.1109/IMIS.2012.200","url":null,"abstract":"Internet of Things (IoT) is presenting an enormous growing, in numbers, it is estimated that over 50 billion of devices will be connected to Internet by 2020. Therefore, it presents a high scalability requirement to manage every resource connected to the network. Therefore, It is required a high capability for autonomous registration and discovery of resources and services. In addition, it should be dynamically adapted with the inclusion of new devices in the network and changes of the existing ones. Nowadays, the most extended discovery architecture for the Internet is the Domain Name Systems (DNS), which is offering through the extensions multicast DNS (mDNS) and DNS Service Directory (DNS-SD) the query and discovery of services by type and properties. It has been already carried out some initial works on mDNS and DNS-SD for the discovery of things. Thereby, it can satisfy the discovery of resources from the IoT point of view, and discovery of services, i.e. Web Services such as CoAP from the Web of Things point of view. But, it has not been yet analyzed the impact of DNS for Smart Objects, since it cannot be directly applied, because these protocols are designed for host-based requirements, where they are not taking into account the design issues and constraints from the Smart Objects. For that reason, this paper analyzes the requirements and design issues to apply these discovery techniques in Smart Objects, carries out an overview of the satisfaction of them in the initial solutions for IoT, in order to finally offer an evaluation of different ways to apply mDNS and DNS-SD for Smart Objects, concluding with a set of recommendations and lessons learned to build a lightweight implementation of mDNS and DNS-SD for resource discovery and directory.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132740237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
A Survey of Virtualization Technologies Focusing on Untrusted Code Execution 关注于不可信代码执行的虚拟化技术综述
Yan Wen, Jinjing Zhao, Gang Zhao, Hua Chen, Dongxia Wang
In response to a continually advancing threat incurred by untrusted codes from Internet, various virtualization-based technologies have been proposed. Such technologies utilize a software layer, a virtual machine monitor or hyper visor, to achieve the highest privilege in a computer system. Generally, they construct isolated execution environments to run the untrusted code while shielding the other parts of the system from the potential security issues. In this paper, we survey a number of virtualization-based technologies with the goal of finding an appropriate candidate to serve as an untrusted code execution solution on PC platforms. Contenders are reviewed with a number of desirable properties, especially security, transparency portability and performance.
为了应对来自Internet的不可信代码带来的日益严重的威胁,人们提出了各种基于虚拟化的技术。这种技术利用软件层、虚拟机监视器或超级保护罩来实现计算机系统中的最高特权。通常,它们构建隔离的执行环境来运行不受信任的代码,同时保护系统的其他部分免受潜在安全问题的影响。在本文中,我们调查了一些基于虚拟化的技术,目的是找到一个合适的候选技术,作为PC平台上不受信任的代码执行解决方案。对竞争者进行了许多可取的特性审查,特别是安全性、透明性、可移植性和性能。
{"title":"A Survey of Virtualization Technologies Focusing on Untrusted Code Execution","authors":"Yan Wen, Jinjing Zhao, Gang Zhao, Hua Chen, Dongxia Wang","doi":"10.1109/IMIS.2012.92","DOIUrl":"https://doi.org/10.1109/IMIS.2012.92","url":null,"abstract":"In response to a continually advancing threat incurred by untrusted codes from Internet, various virtualization-based technologies have been proposed. Such technologies utilize a software layer, a virtual machine monitor or hyper visor, to achieve the highest privilege in a computer system. Generally, they construct isolated execution environments to run the untrusted code while shielding the other parts of the system from the potential security issues. In this paper, we survey a number of virtualization-based technologies with the goal of finding an appropriate candidate to serve as an untrusted code execution solution on PC platforms. Contenders are reviewed with a number of desirable properties, especially security, transparency portability and performance.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129456923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Method to Improve the Accuracy of the TOA Position Location Solution in Multistatic Radar Systems 一种提高多基地雷达系统TOA定位精度的方法
Jheng-Sian Li, Yung-Cheng Yao, Chun-Hung Chen, J. Wen
In this paper, a method to improve the accuracy of the time of arrival position location (TOA-PL) solution in multistatic radar systems is proposed. In the conventional TOA-PL technique, the least square (LS) method is applied to estimate target location. However, the performance of the method is significantly degraded under wrong measured data (called as the great error) at the receiver. Hence, the accuracy of location estimation needs to be improved. In this paper, a scheme is proposed to eliminate the effect of the great error. The performance of the location estimation is evaluated based on the root mean square error (RMSE). The results show that the performance with the proposed scheme is better than that with the conventional scheme.
提出了一种提高多基地雷达系统到达时间定位(TOA-PL)精度的方法。在传统的TOA-PL技术中,采用最小二乘法估计目标位置。然而,在接收端测量数据错误(称为大误差)的情况下,该方法的性能会显著下降。因此,需要提高定位估计的精度。本文提出了一种消除大误差影响的方案。基于均方根误差(RMSE)评价了定位估计的性能。结果表明,该方案的性能优于传统方案。
{"title":"A Method to Improve the Accuracy of the TOA Position Location Solution in Multistatic Radar Systems","authors":"Jheng-Sian Li, Yung-Cheng Yao, Chun-Hung Chen, J. Wen","doi":"10.1109/IMIS.2012.36","DOIUrl":"https://doi.org/10.1109/IMIS.2012.36","url":null,"abstract":"In this paper, a method to improve the accuracy of the time of arrival position location (TOA-PL) solution in multistatic radar systems is proposed. In the conventional TOA-PL technique, the least square (LS) method is applied to estimate target location. However, the performance of the method is significantly degraded under wrong measured data (called as the great error) at the receiver. Hence, the accuracy of location estimation needs to be improved. In this paper, a scheme is proposed to eliminate the effect of the great error. The performance of the location estimation is evaluated based on the root mean square error (RMSE). The results show that the performance with the proposed scheme is better than that with the conventional scheme.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116369241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Fighting against Vampire Appliances through Eco-Aware Things 通过生态意识的东西对抗吸血鬼电器
Juan Lopez-de-Armentia, Diego Casado Mansilla, D. López-de-Ipiña
This paper provides an overview of how Internet connected objects can lead to a social change towards energy efficiency in areas where people inhabit (cities, buildings or homes). For this aim it is proposed the use of social networks, like Twitter, as an interaction and communication channel between smart objects and human beings. The presented work demonstrates, by means of an experiment, how an augmented everyday object, i.e. a capsule-based coffee machine, may help to reduce the unnecessary consumed energy in electric appliances. The paper opens the discussion of the promising potential of combining people and future smart everyday objects teaming up to promote a more sustainable behaviour on the planet's behalf.
本文概述了互联网连接对象如何在人们居住的地区(城市,建筑物或家庭)导致能源效率的社会变革。为此,建议使用社交网络,如Twitter,作为智能对象与人类之间的交互和沟通渠道。通过一个实验,展示了一个增强的日常用品,即胶囊咖啡机,如何帮助减少电器中不必要的能源消耗。这篇论文开始讨论将人类和未来的智能日常物品结合起来,代表地球促进更可持续的行为,这一前景广阔的潜力。
{"title":"Fighting against Vampire Appliances through Eco-Aware Things","authors":"Juan Lopez-de-Armentia, Diego Casado Mansilla, D. López-de-Ipiña","doi":"10.1109/IMIS.2012.112","DOIUrl":"https://doi.org/10.1109/IMIS.2012.112","url":null,"abstract":"This paper provides an overview of how Internet connected objects can lead to a social change towards energy efficiency in areas where people inhabit (cities, buildings or homes). For this aim it is proposed the use of social networks, like Twitter, as an interaction and communication channel between smart objects and human beings. The presented work demonstrates, by means of an experiment, how an augmented everyday object, i.e. a capsule-based coffee machine, may help to reduce the unnecessary consumed energy in electric appliances. The paper opens the discussion of the promising potential of combining people and future smart everyday objects teaming up to promote a more sustainable behaviour on the planet's behalf.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132106935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Mixed Reality-Aware Service Architecture for Mobile Environments 面向移动环境的混合现实感知服务架构
A. Dominguez, T. Robles, R. Alcarria, E. Cedeño
It is a fact that mobile devices have emerged as the core interaction platforms for Human-to-Machine communication. Mixed Reality has reached mobile devices indeed. However, there are still issues regarding its consumption beyond stand-alone applications, such as Layar and Wikitude. This article states the benefits of consuming and integrating Mixed Reality with mobile services through our tailored Service Description Language. Finally, it describes our Mixed Reality-aware architecture for mobile environments and its validation.
移动设备已经成为人机交流的核心交互平台,这是一个事实。混合现实确实已经进入移动设备。然而,在独立应用程序(如Layar和Wikitude)之外的消费方面仍然存在问题。本文阐述了通过我们量身定制的服务描述语言来使用和集成混合现实与移动服务的好处。最后,它描述了我们用于移动环境的混合现实感知架构及其验证。
{"title":"Mixed Reality-Aware Service Architecture for Mobile Environments","authors":"A. Dominguez, T. Robles, R. Alcarria, E. Cedeño","doi":"10.1109/IMIS.2012.124","DOIUrl":"https://doi.org/10.1109/IMIS.2012.124","url":null,"abstract":"It is a fact that mobile devices have emerged as the core interaction platforms for Human-to-Machine communication. Mixed Reality has reached mobile devices indeed. However, there are still issues regarding its consumption beyond stand-alone applications, such as Layar and Wikitude. This article states the benefits of consuming and integrating Mixed Reality with mobile services through our tailored Service Description Language. Finally, it describes our Mixed Reality-aware architecture for mobile environments and its validation.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132277932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Extending Mesh Networks to Opportunistic Resource Sharing 将网状网络扩展到机会资源共享
J. Hansen
We propose a high-level framework that extends the notion of opportunistic mesh networking to include opportunistic access to and sharing of other device resources such as nonvolatile data storage and computation. While work has been done on providing opportunistic access to each of these resources (network access, data storage, and computation, that is) individually, this paper is an attempt to bring all three resource-sharing applications under the same umbrella. This framework uses an existing "web of trust" protocol that does not require a full public-key infrastructure (PKI) and adds reputation mechanisms to handle interactions between both explicitly-trusted and untrusted peers. Once devices have initiated a connection, they mutually authenticate one another and negotiate the terms of a resource-sharing agreement overran encrypted tunnel. This agreement may involve a payment of electronic currency or a request for credit in exchange for a particular resource, or the resource may be provided at no cost. Each device's local policy dictates how interactions with others should proceed.
我们提出了一个高级框架,扩展机会网状网络的概念,包括机会访问和共享其他设备资源,如非易失性数据存储和计算。虽然已经完成了对这些资源(即网络访问、数据存储和计算)分别提供机会访问的工作,但本文试图将这三种资源共享应用程序置于同一保护伞下。该框架使用现有的“信任网络”协议,该协议不需要完整的公钥基础设施(PKI),并添加声誉机制来处理显式信任和不受信任的对等体之间的交互。一旦设备启动了连接,它们相互验证并协商资源共享协议的条款。本协议可能涉及电子货币支付或信用请求,以换取特定资源,或者该资源可能免费提供。每个设备的本地策略规定了与其他设备的交互应该如何进行。
{"title":"Extending Mesh Networks to Opportunistic Resource Sharing","authors":"J. Hansen","doi":"10.1109/IMIS.2012.100","DOIUrl":"https://doi.org/10.1109/IMIS.2012.100","url":null,"abstract":"We propose a high-level framework that extends the notion of opportunistic mesh networking to include opportunistic access to and sharing of other device resources such as nonvolatile data storage and computation. While work has been done on providing opportunistic access to each of these resources (network access, data storage, and computation, that is) individually, this paper is an attempt to bring all three resource-sharing applications under the same umbrella. This framework uses an existing \"web of trust\" protocol that does not require a full public-key infrastructure (PKI) and adds reputation mechanisms to handle interactions between both explicitly-trusted and untrusted peers. Once devices have initiated a connection, they mutually authenticate one another and negotiate the terms of a resource-sharing agreement overran encrypted tunnel. This agreement may involve a payment of electronic currency or a request for credit in exchange for a particular resource, or the resource may be provided at no cost. Each device's local policy dictates how interactions with others should proceed.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133776459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1