首页 > 最新文献

2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing最新文献

英文 中文
High-Efficient Multi-key Exchange Protocol Based on Three-Party Authentication 基于三方认证的高效多密钥交换协议
K. Tsai, Yi-Li Huang, Fang-Yie Leu, J. Tan, Mengyuan Ye
Three-party authenticated key exchange protocol is designed for securing the communication between two users with the help of a trusted server. The users can encrypt data with the exchanged secret keys and then transmit the cipher text to each other. However, the inefficiency, unreliability, and inflexibility problems that can be found in many previous studies should be solved. Therefore, in this paper, we propose a secure multiple key exchange scheme, named the High-efficient Multi-key Exchange protocol based on Three-party Authentication (HeM3A for short), which provides users with a secure method to exchange their encryption keys by utilizing the elliptic curve cryptographic method, the logical XOR operation and the binary addition. The propose is hiding important parameters so as to avoid them from being cracked by hackers easily, and resist known-key, impersonation, replay and eavesdropping attacks. The multi-key exchange process, which provides higher security and performance than previous protocols, is practically useful in securing mobile applications.
三方认证密钥交换协议是为了在可信服务器的帮助下保护两个用户之间的通信而设计的。用户可以使用交换的密钥对数据进行加密,然后将密文传输给对方。然而,在以往的许多研究中发现的低效率、不可靠和不灵活的问题需要得到解决。因此,本文提出了一种安全的多密钥交换方案,命名为基于三方认证的高效多密钥交换协议(HeM3A),该方案利用椭圆曲线加密方法、逻辑异同运算和二进制加法,为用户提供了一种安全的交换加密密钥的方法。建议隐藏重要的参数,以避免其容易被黑客破解,并抵御已知密钥攻击、冒充攻击、重放攻击和窃听攻击。多密钥交换过程比以前的协议提供更高的安全性和性能,在保护移动应用程序方面具有实际用途。
{"title":"High-Efficient Multi-key Exchange Protocol Based on Three-Party Authentication","authors":"K. Tsai, Yi-Li Huang, Fang-Yie Leu, J. Tan, Mengyuan Ye","doi":"10.1109/IMIS.2014.70","DOIUrl":"https://doi.org/10.1109/IMIS.2014.70","url":null,"abstract":"Three-party authenticated key exchange protocol is designed for securing the communication between two users with the help of a trusted server. The users can encrypt data with the exchanged secret keys and then transmit the cipher text to each other. However, the inefficiency, unreliability, and inflexibility problems that can be found in many previous studies should be solved. Therefore, in this paper, we propose a secure multiple key exchange scheme, named the High-efficient Multi-key Exchange protocol based on Three-party Authentication (HeM3A for short), which provides users with a secure method to exchange their encryption keys by utilizing the elliptic curve cryptographic method, the logical XOR operation and the binary addition. The propose is hiding important parameters so as to avoid them from being cracked by hackers easily, and resist known-key, impersonation, replay and eavesdropping attacks. The multi-key exchange process, which provides higher security and performance than previous protocols, is practically useful in securing mobile applications.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115268556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Proposal of Autonomous Flight Wireless Nodes with Delay Tolerant Networks for Disaster Use 基于容延迟网络的自主飞行无线节点灾害应用研究
Noriki Uchida, Noritaka Kawamura, Tomoyuki Ishida, Y. Shibata
Many cities or towns are located in mountain and sea areas, and these areas would be isolated from others because of the disconnection of networks or transportation if a large scale disaster should happen. In this paper, Delay Tolerant Networking (DTN) based on the Data Triage Method with the user policies and the Autonomous Flight Wireless Nodes (AFW) based on autonomous flights and data deliveries are introduced. In the proposed system, the drone with wireless interfaces is applied, and it actively supports the proposed DTN routings for the Disaster Information System (DIS). That is, the AFW automatically flies for seeking possible wireless nodes, send and receive disaster information by the proposed DTN routings, and return to the possible stations that wireless charge units are equipped when the battery needs to charge. Then, the implementations and the field experiments are discussed for the effectiveness of the proposed methods.
许多城市或城镇位于山区和海域,一旦发生大规模灾害,这些地区将因网络或交通中断而与其他地区隔绝。本文介绍了基于用户策略的数据分类方法的容延迟网络(DTN)和基于自主飞行和数据传输的自主飞行无线节点(AFW)。该系统采用具有无线接口的无人机,主动支持灾害信息系统(DIS)的DTN路由。即AFW自动飞行寻找可能的无线节点,按照提出的DTN路由发送和接收灾难信息,当电池需要充电时,自动返回到配备无线充电单元的可能站点。然后,对所提方法的实施和现场实验进行了讨论。
{"title":"Proposal of Autonomous Flight Wireless Nodes with Delay Tolerant Networks for Disaster Use","authors":"Noriki Uchida, Noritaka Kawamura, Tomoyuki Ishida, Y. Shibata","doi":"10.1109/IMIS.2014.18","DOIUrl":"https://doi.org/10.1109/IMIS.2014.18","url":null,"abstract":"Many cities or towns are located in mountain and sea areas, and these areas would be isolated from others because of the disconnection of networks or transportation if a large scale disaster should happen. In this paper, Delay Tolerant Networking (DTN) based on the Data Triage Method with the user policies and the Autonomous Flight Wireless Nodes (AFW) based on autonomous flights and data deliveries are introduced. In the proposed system, the drone with wireless interfaces is applied, and it actively supports the proposed DTN routings for the Disaster Information System (DIS). That is, the AFW automatically flies for seeking possible wireless nodes, send and receive disaster information by the proposed DTN routings, and return to the possible stations that wireless charge units are equipped when the battery needs to charge. Then, the implementations and the field experiments are discussed for the effectiveness of the proposed methods.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114668654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
On the Vulnerability of Ghost Domain Names
Hiroaki Kikuchi, Tomohiro Arimizu
We study the vulnerability in domain name system, so called as "Ghost domain names", which is discovered by Jiang, Liang, Li, Li, Duan and Wu in NDSS 2012. The ghost domain vulnerability allows a malicious domain name to stay resolvable long after it has been removed form the upper level server. Our study examines the feasibility of the ghost domain vulnerability still active and clarifies the latest status of the attack based on the experimental results on open DNS servers.
我们研究了江、梁、李、李、段、吴在NDSS 2012中发现的域名系统漏洞,即所谓的“幽灵域名”。幽灵域漏洞允许恶意域名在从上层服务器删除后长时间保持可解析。我们的研究考察了幽灵域漏洞仍然活跃的可行性,并根据开放DNS服务器上的实验结果澄清了攻击的最新状态。
{"title":"On the Vulnerability of Ghost Domain Names","authors":"Hiroaki Kikuchi, Tomohiro Arimizu","doi":"10.1109/IMIS.2014.87","DOIUrl":"https://doi.org/10.1109/IMIS.2014.87","url":null,"abstract":"We study the vulnerability in domain name system, so called as \"Ghost domain names\", which is discovered by Jiang, Liang, Li, Li, Duan and Wu in NDSS 2012. The ghost domain vulnerability allows a malicious domain name to stay resolvable long after it has been removed form the upper level server. Our study examines the feasibility of the ghost domain vulnerability still active and clarifies the latest status of the attack based on the experimental results on open DNS servers.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125815432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Flexible, Direct Interactions between CoAP-enabled IoT Devices 支持coap的物联网设备之间灵活、直接的交互
Girum Teklemariam, J. Hoebeke, I. Moerman, P. Demeester
The wireless communication capability of sensors and actuators made them suitable for several automation solutions which involve sensing physical properties and acting upon them. These days, gateway or cloud based sensor/actuator interaction models are widely used. In this model, every sensor/actuator interaction goes through the gateway or via the cloud. In order to realize the true Internet of Things philosophy where everything is interconnected, direct interactions between sensors and actuators, also called bindings, are important. In this paper, we introduce a CoAP based sensor/actuator binding solution where a 3rd party is responsible for setting up the binding, but is not involved in any of the further interactions between the sensor and actuator. As binding creation and execution is fully based on Restful CoAP interactions, very flexible bindings between any two devices can be created. We implemented this solution in Contiki and evaluated the implementation by taking different measures such as delay, memory footprint, and packet size.
传感器和执行器的无线通信能力使它们适用于涉及感知物理特性并对其采取行动的几种自动化解决方案。如今,基于网关或云的传感器/执行器交互模型被广泛使用。在这个模型中,每个传感器/执行器的交互都要通过网关或云。为了实现万物互联的真正物联网理念,传感器和执行器之间的直接交互(也称为绑定)非常重要。在本文中,我们介绍了一种基于CoAP的传感器/执行器绑定解决方案,其中第三方负责设置绑定,但不参与传感器和执行器之间的任何进一步交互。由于绑定的创建和执行完全基于Restful CoAP交互,因此可以在任意两个设备之间创建非常灵活的绑定。我们在Contiki中实现了这个解决方案,并通过采取不同的措施(如延迟、内存占用和数据包大小)来评估实现。
{"title":"Flexible, Direct Interactions between CoAP-enabled IoT Devices","authors":"Girum Teklemariam, J. Hoebeke, I. Moerman, P. Demeester","doi":"10.1109/IMIS.2014.42","DOIUrl":"https://doi.org/10.1109/IMIS.2014.42","url":null,"abstract":"The wireless communication capability of sensors and actuators made them suitable for several automation solutions which involve sensing physical properties and acting upon them. These days, gateway or cloud based sensor/actuator interaction models are widely used. In this model, every sensor/actuator interaction goes through the gateway or via the cloud. In order to realize the true Internet of Things philosophy where everything is interconnected, direct interactions between sensors and actuators, also called bindings, are important. In this paper, we introduce a CoAP based sensor/actuator binding solution where a 3rd party is responsible for setting up the binding, but is not involved in any of the further interactions between the sensor and actuator. As binding creation and execution is fully based on Restful CoAP interactions, very flexible bindings between any two devices can be created. We implemented this solution in Contiki and evaluated the implementation by taking different measures such as delay, memory footprint, and packet size.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125882579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Seamless SPMIPv6-Based Handoff Scheme for Next-Generation Mobile Networks 基于spmipv6的下一代移动网络无缝切换方案
Chulhee Cho, Jun-Dong Cho, Jongpil Jeong
In next-generation mobile networks (NGWNs), seamless service for users and handoffs between heterogeneous networks must be taken into account. In this paper, we propose a seamless proxy-based handoff scheme using the PMIPv6-based proxy model, which is able to improve the performance of handoffs in sensor-based mobile networks. Our scheme can efficiently support IP-based seamless mobility by reducing the search process. The performance results show that our proposed scheme outperforms the existing schemes in terms of Quality of Service (QoS), including such factors as throughput, handoff latency, packet loss, and signaling overhead.
在下一代移动网络(NGWNs)中,必须考虑用户的无缝服务和异构网络之间的切换。在本文中,我们提出了一种基于pmipv6的无缝代理切换方案,该方案能够提高基于传感器的移动网络中的切换性能。该方案通过减少搜索过程,有效地支持基于ip的无缝移动。性能结果表明,我们提出的方案在服务质量(QoS)方面优于现有方案,包括吞吐量、切换延迟、数据包丢失和信令开销等因素。
{"title":"Seamless SPMIPv6-Based Handoff Scheme for Next-Generation Mobile Networks","authors":"Chulhee Cho, Jun-Dong Cho, Jongpil Jeong","doi":"10.1109/IMIS.2014.19","DOIUrl":"https://doi.org/10.1109/IMIS.2014.19","url":null,"abstract":"In next-generation mobile networks (NGWNs), seamless service for users and handoffs between heterogeneous networks must be taken into account. In this paper, we propose a seamless proxy-based handoff scheme using the PMIPv6-based proxy model, which is able to improve the performance of handoffs in sensor-based mobile networks. Our scheme can efficiently support IP-based seamless mobility by reducing the search process. The performance results show that our proposed scheme outperforms the existing schemes in terms of Quality of Service (QoS), including such factors as throughput, handoff latency, packet loss, and signaling overhead.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122770473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Survey of Green, Energy-Aware Security and Some of Its Recent Developments in Networking and Mobile Computing 绿色,能源意识安全的调查及其在网络和移动计算方面的一些最新发展
M. Migliardi, A. Merlo, L. Caviglione
Since its inception, the field of Green, Energy-Aware Security (GEAS) has gathered momentum and has seen many interesting developments in some of its different declinations. In this paper we will analyze some of the most recent evolutions and we will summarize the current state of the art describing some of the most interesting and promising advancements. More in details, we will focus on i) energy management in network nodes, ii) exploitation of security mechanisms to save energy and iii) use of energy consumption as a marker for malicious activities in energy constrained computational platforms.
自成立以来,绿色节能安全(GEAS)领域势头强劲,并在一些不同的领域取得了许多有趣的发展。在本文中,我们将分析一些最新的演变,我们将总结当前的艺术状态,描述一些最有趣和最有前途的进步。更详细地说,我们将重点关注i)网络节点中的能源管理,ii)利用安全机制来节省能源,以及iii)在能源受限的计算平台中使用能源消耗作为恶意活动的标志。
{"title":"A Survey of Green, Energy-Aware Security and Some of Its Recent Developments in Networking and Mobile Computing","authors":"M. Migliardi, A. Merlo, L. Caviglione","doi":"10.1109/IMIS.2014.30","DOIUrl":"https://doi.org/10.1109/IMIS.2014.30","url":null,"abstract":"Since its inception, the field of Green, Energy-Aware Security (GEAS) has gathered momentum and has seen many interesting developments in some of its different declinations. In this paper we will analyze some of the most recent evolutions and we will summarize the current state of the art describing some of the most interesting and promising advancements. More in details, we will focus on i) energy management in network nodes, ii) exploitation of security mechanisms to save energy and iii) use of energy consumption as a marker for malicious activities in energy constrained computational platforms.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114245266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A System to Enable Level-of-Detail Mobile Interaction with Augmented Media Objects 一种能够与增强媒体对象进行细节级移动交互的系统
David Gómez, A. Bernardos, J. Casar
This paper presents a service concept that enables the virtual augmentation of physical objects through a mobile device. Each object is linked to a tree of virtual resources (e.g. digital contents). Resources are organized in levels-of-detail that depend on the user's distance and orientation towards the object itself (i.e. user's attitude). The root node of the content tree hosts a set of items that can be retrieved from the most distant position to the object, each depth level in the tree is associated to the observer's attitude towards the object, thus the structure facilitates 'spatial browsing' of information. On this concept, we have implemented an indoor sensor-based Augmented Reality system that relies on a RFID positioning mat for positioning. To complete the attitude calculation and to adjust the service interface, we have handled typical indoor problems such as compass calibration and its bias management. The service has been instantiated to augment a TV set to spatially browse geography contents, the content tree is organized in continent, country and city levels and delivers synchronized resources to the mobile interface and to the TV, depending on the user's attitude and its previous interactions. Results of a limited user test show that the service concept is acceptable to the users and underline the need to get better control of resources representation. Although the chosen object for demonstration is a media one, the concept is applicable to any kind of object.
本文提出了一种通过移动设备实现物理对象虚拟增强的服务概念。每个对象都链接到虚拟资源树(例如数字内容)。资源是根据用户对对象本身的距离和方向(即用户的态度)按细节级别组织的。内容树的根节点承载了一组可以从距离对象最远的位置检索到的项目,树中的每个深度级别都与观察者对对象的态度有关,因此结构有利于信息的“空间浏览”。基于这个概念,我们实现了一个基于室内传感器的增强现实系统,该系统依赖于RFID定位垫进行定位。为了完成姿态计算和调整服务接口,我们处理了典型的室内问题,如罗盘校准及其偏差管理。该服务已被实例化,以增强电视机在空间上浏览地理内容,内容树按大陆、国家和城市级别组织,并根据用户的态度和以前的交互向移动界面和电视提供同步资源。有限用户测试的结果表明,用户可以接受服务概念,并强调需要更好地控制资源表示。虽然选择的演示对象是媒介对象,但这个概念适用于任何类型的对象。
{"title":"A System to Enable Level-of-Detail Mobile Interaction with Augmented Media Objects","authors":"David Gómez, A. Bernardos, J. Casar","doi":"10.1109/IMIS.2014.47","DOIUrl":"https://doi.org/10.1109/IMIS.2014.47","url":null,"abstract":"This paper presents a service concept that enables the virtual augmentation of physical objects through a mobile device. Each object is linked to a tree of virtual resources (e.g. digital contents). Resources are organized in levels-of-detail that depend on the user's distance and orientation towards the object itself (i.e. user's attitude). The root node of the content tree hosts a set of items that can be retrieved from the most distant position to the object, each depth level in the tree is associated to the observer's attitude towards the object, thus the structure facilitates 'spatial browsing' of information. On this concept, we have implemented an indoor sensor-based Augmented Reality system that relies on a RFID positioning mat for positioning. To complete the attitude calculation and to adjust the service interface, we have handled typical indoor problems such as compass calibration and its bias management. The service has been instantiated to augment a TV set to spatially browse geography contents, the content tree is organized in continent, country and city levels and delivers synchronized resources to the mobile interface and to the TV, depending on the user's attitude and its previous interactions. Results of a limited user test show that the service concept is acceptable to the users and underline the need to get better control of resources representation. Although the chosen object for demonstration is a media one, the concept is applicable to any kind of object.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121986227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Research on Comparison and Analysis of the DEFSOP, NIST Cell SOP, and ISO27037 SOP DEFSOP、NIST Cell SOP、ISO27037 SOP的比较分析研究
I. Lin, Yun-Sheng Yen, Fang-Yie Leu
In recent years, Information and Communication Technology (ICT) has developed rapidly, and smart phones have become very important communication tools in the modern world. Because smart phones contain copious personal information and have high mobility and powerful hardware, crimes involving smart phones have increased rapidly. There are many types of modus operandi that are increasing, and smart phones have become one of the highly technical tools used to commit a crime. In view of this, our research will discuss Smart-Phone Digital Evidence Forensics Standard Operating Procedure (Smart-Phone DEFSOP) which was proposed by Prof. I-Long, Lin. Our research will compare with the SOP which was proposed by National Institute of Standards and Technology (NIST) cell SOP, and ISO27037. Finally, we will use trusted third party forensics tools to collect, analyze and examine digital evidences. In order to assist proof capacity of digital evidences in the court, we have to authenticate the "integrity", "consistency" and "precision" of the digital evidences.
近年来,信息通信技术(ICT)发展迅速,智能手机已经成为现代社会非常重要的通信工具。由于智能手机包含了丰富的个人信息,并且具有高移动性和强大的硬件,涉及智能手机的犯罪迅速增加。有许多类型的作案手法正在增加,智能手机已经成为用于犯罪的高技术工具之一。鉴于此,我们的研究将讨论由林一龙教授提出的智能手机数字证据取证标准操作程序(Smart-Phone DEFSOP)。我们的研究将与美国国家标准与技术研究院(NIST) cell SOP提出的SOP和ISO27037进行比较。最后,我们将使用可信的第三方取证工具来收集、分析和检查数字证据。为了辅助数字证据在法庭上的证明能力,我们必须对数字证据的“完整性”、“一致性”和“准确性”进行认证。
{"title":"Research on Comparison and Analysis of the DEFSOP, NIST Cell SOP, and ISO27037 SOP","authors":"I. Lin, Yun-Sheng Yen, Fang-Yie Leu","doi":"10.1109/IMIS.2014.74","DOIUrl":"https://doi.org/10.1109/IMIS.2014.74","url":null,"abstract":"In recent years, Information and Communication Technology (ICT) has developed rapidly, and smart phones have become very important communication tools in the modern world. Because smart phones contain copious personal information and have high mobility and powerful hardware, crimes involving smart phones have increased rapidly. There are many types of modus operandi that are increasing, and smart phones have become one of the highly technical tools used to commit a crime. In view of this, our research will discuss Smart-Phone Digital Evidence Forensics Standard Operating Procedure (Smart-Phone DEFSOP) which was proposed by Prof. I-Long, Lin. Our research will compare with the SOP which was proposed by National Institute of Standards and Technology (NIST) cell SOP, and ISO27037. Finally, we will use trusted third party forensics tools to collect, analyze and examine digital evidences. In order to assist proof capacity of digital evidences in the court, we have to authenticate the \"integrity\", \"consistency\" and \"precision\" of the digital evidences.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128350568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Method of Measuring Document Similarity for Movie Recommendation 一种新的电影推荐文档相似度度量方法
Sung-min Kim, Young-guk Ha
One of good ways for a person to find a movie the person would like is, supposedly, to find a movie that is similar to other movies that the person found interesting before. For those who like to find movies in this way, there are a few websites where users can search for similar movies to a certain movie. Recommendation systems of such websites rely on rating information or experts' analysis which take a lot of time and efforts of humans to get. This paper suggests a method for scoring similarity among movies using movie scripts. The method we suggest doesn't need any rating information or metadata to analyze. Instead of using those kinds of information, our method is about measuring similarities among documents. There are several conventional methods for the purpose, but it is based on matching keywords. To overcome the limit of matching keywords directly, our method compares two documents in an indirect way.
一个人找到自己喜欢的电影的一个好方法是,据说,找到一部和他之前觉得有趣的电影相似的电影。对于那些喜欢用这种方式寻找电影的人来说,有一些网站可以让用户搜索到与某一部电影相似的电影。这类网站的推荐系统依赖于评级信息或专家的分析,这需要人类花费大量的时间和精力来获得。本文提出了一种基于电影剧本的电影相似度评分方法。我们建议的方法不需要任何评级信息或元数据来分析。我们的方法是度量文档之间的相似性,而不是使用这些信息。有几种传统的方法可以实现这一目的,但它是基于匹配关键字的。为了克服直接匹配关键字的限制,我们的方法以间接的方式比较两个文档。
{"title":"A New Method of Measuring Document Similarity for Movie Recommendation","authors":"Sung-min Kim, Young-guk Ha","doi":"10.1109/IMIS.2014.5","DOIUrl":"https://doi.org/10.1109/IMIS.2014.5","url":null,"abstract":"One of good ways for a person to find a movie the person would like is, supposedly, to find a movie that is similar to other movies that the person found interesting before. For those who like to find movies in this way, there are a few websites where users can search for similar movies to a certain movie. Recommendation systems of such websites rely on rating information or experts' analysis which take a lot of time and efforts of humans to get. This paper suggests a method for scoring similarity among movies using movie scripts. The method we suggest doesn't need any rating information or metadata to analyze. Instead of using those kinds of information, our method is about measuring similarities among documents. There are several conventional methods for the purpose, but it is based on matching keywords. To overcome the limit of matching keywords directly, our method compares two documents in an indirect way.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114865714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Threats and Countermeasures on a 4G Mobile Network 4G移动网络的威胁与对策
Seongmin Park, Sekwon Kim, Joo-Hyung Oh, Myoungsun Noh, Chaetae Im
The appearance of high performance smartphones and increasing mobile services, enabled by the advancement of mobile phones and mobile communication technology, changed the mobile communication network architecture from a closed type to open type. In the open type network, anyone can access the network and various attacks and abnormal traffic can penetrate it, but existing IP based security technologies cannot block them. Particularly, there is no technology to detect the protocols such as GTP (GPRS Tunneling Protocol) specialized to the mobile communication network in the high volume traffic processing environment in the 4G mobile network. This paper describes the various types of threats to 4G mobile networks and measures to cope with them.
高性能智能手机的出现和移动通信技术的进步带来的移动服务的增加,使移动通信网络的架构从封闭式转变为开放式。在开放式网络中,任何人都可以接入网络,各种攻击和异常流量都可以穿透网络,但现有的基于IP的安全技术无法阻挡这些攻击和异常流量。特别是在4G移动网络的大流量处理环境中,没有检测移动通信网络专用的GTP (GPRS隧道协议)等协议的技术。本文介绍了4G移动网络面临的各种威胁以及应对措施。
{"title":"Threats and Countermeasures on a 4G Mobile Network","authors":"Seongmin Park, Sekwon Kim, Joo-Hyung Oh, Myoungsun Noh, Chaetae Im","doi":"10.1109/IMIS.2014.79","DOIUrl":"https://doi.org/10.1109/IMIS.2014.79","url":null,"abstract":"The appearance of high performance smartphones and increasing mobile services, enabled by the advancement of mobile phones and mobile communication technology, changed the mobile communication network architecture from a closed type to open type. In the open type network, anyone can access the network and various attacks and abnormal traffic can penetrate it, but existing IP based security technologies cannot block them. Particularly, there is no technology to detect the protocols such as GTP (GPRS Tunneling Protocol) specialized to the mobile communication network in the high volume traffic processing environment in the 4G mobile network. This paper describes the various types of threats to 4G mobile networks and measures to cope with them.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134239892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1