Emerging Directions in Embedded and Ubiquitous Computing EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 1-4, 2007, Proceedings

This book constitutes the refereed proceedings of the EUC 2007 workshops held in conjunction with the IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2007, in Taipei, Taiwan, in December 2007. The 69 revised full papers presented together with four invited papers were careful...

Full description

Saved in:
Bibliographic Details
Main Authors Denko, Mieso K, Shih, Chi-Sheng, Li, Kuan-Ching, Tsao, Shiao-Li, Zeng, Qing-An, Park, Soo-Hyun, Ko, Young-Bae, Hung, Shih-Hao, Park, Jong Hyuk, Denko, Mieso
Format eBook
LanguageEnglish
Published Berlin, Heidelberg Springer Berlin / Heidelberg 2007
Springer
Edition1
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN9783540770893
3540770895

Cover

Table of Contents:
  • Security Analysis -- Conclusion -- References -- UPS - An Ubiquitous Proximity eService for Trust Collaboration -- Changes of Proximity in the U-Commerce Era -- Significance of Ubiquitous Proximity e-Service -- Justification of Theoretical Support -- Value of Proximity: A Case Scenario -- Simulation Justification -- Conclusion -- References -- Obligations for Privacy and Confidentiality in Distributed Transactions -- Introduction -- Related Research -- Obligation of Trust (OoT) Protocol -- Example of WS-XACML Aware Applications -- Conclusion -- References -- Multi-channel Enhancements for IEEE 802.11-Based Multi-hop Ad-Hoc Wireless Networks -- Introduction -- Related Works -- Problem Statement -- Protocol Improvements -- Simulation -- Results -- Conclusion -- References -- An Intelligent Event-Driven Interface Agent for Interactive Digital Contents in Ubiquitous Environments -- Introduction -- Why Intelligent Event-Driven Interface Agent -- Notion of Event-Driven Object with Event Flow Chart -- Seamless Integration in Ubiquitous Computing Environments -- Comparison with Other Works -- Work Flow in Intelligent Event-Driven Interface Agent -- Implementation of Intelligent Event-Driven Interface -- Conclusions -- References -- A Loop-Based Key Management Scheme for Wireless Sensor Networks -- Introduction -- Related Works -- Loop-Based Key Management Scheme -- Basic Definitions -- The Loop-Based Topology -- Creation of a Loop Topology for Key Management -- The Loop-Based Key Management Scheme (LBKMS) -- Analysis, Simulation and Comparison -- Conclusion -- References -- A MAC Protocol with Little Idle Listening for Wireless Sensor Networks -- Introduction -- Related Work -- The MAC Protocol with Little Idle Listening (L-MAC) -- Description of L-MAC -- Latency Analysis -- Simulations and Performance Evaluation -- Conclusions -- References
  • Intro -- Title page -- Preface -- Organization -- Table of Contents -- Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks -- Introduction -- Related Work -- Threat Model -- Problem Statement -- Proposed Scheme -- Addition After Initial Deployment -- Analysis -- Security Analysis -- Conclusion -- A Critical Approach to Privacy Research in Ubiquitous Environments - Issues and Underlying Assumptions -- Introduction -- Background -- Characteristics of Ubiquitous Environments -- Privacy -- Privacy in Ubiquitous Environments -- Streams of Privacy Research in Ubiquitous Computing -- Digital Identities and Identity Management -- Privacy Preserving Approaches -- Discussion -- Conclusions -- References -- The Case Study of Information Security System for International Airports -- Introduction -- Corporate Information Protection Methods -- Device Control Technology -- Document Security Technology -- Policy and Contract Approach -- Computer Security Protection System Development -- Real-Time Encryption of User Files and Folders -- Real-Time Authentication of User's Access Right -- Watermarking to Printouts -- Security Code to Mobile Storage Devices -- Security File for Outside Transmission -- Implementation of Information Security System -- Summary and Conclusion -- References -- Quantitative Evaluation of Intrusion Tolerant Systems Subject to DoS Attacks Via Semi-Markov Cost Models -- Introduction -- Model 1 -- Model Description -- Optimal Preventive Maintenance Policy -- Model 2 -- Model Description -- Optimal Preventive Maintenance Policy -- Numerical Examples -- An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System -- Introduction -- Related Work -- Security Analysis of Chien and Chen's Scheme -- New Authentication Scheme -- System Initialization -- Normal Authentication Operation
  • Enhanced Sleep Mode Operations for Energy Saving in IEEE 802.16e -- Introduction -- Problem Statement and Related Work -- Proposed Energy Saving Schemes -- Simulation Results and Discussion -- Implementation Considerations -- Conclusions -- References -- Enhanced Fingerprint-Based Location Estimation System in Wireless LAN Environment -- Introduction -- Related Work -- Proposed System -- Asymmetrical Signal Strength -- Methodology -- Performance -- Experiment Setup -- Experimental Results and Analysis -- Summary and Future Work -- Improving Channel Scanning Procedures for WLAN Handoffs -- Introduction -- Problem Statements and Modeling -- Optimal and Heuristic Algorithms -- The Optimal Algorithm -- Heuristic Algorithm -- Simulation and Evaluation -- Conclusions -- References -- A Multicast Extension for Enhanced Mobile IP by Home Agent Handover -- Introduction -- HH-MIP Approach -- Proposed HH-MIP/ME Approach -- Basic Idea and Data Delivery -- Protocol Data Structure -- Performance Evaluation -- Simulation Environment -- Performance Criteria -- Simulation Results -- Conclusion -- References -- Autonomic Multi-server Distribution in Flash Crowds Alleviation Network -- Introduction -- Related Work -- FCAN Design -- Overview -- Key Features of FCAN -- Overall View -- The Cloud Growth and Shrinkage -- Multi-server Scenario -- Simulation and Results -- Discussions -- Conclusions -- Generic Energy-Efficient Geographic Routing for Ad-Hoc Wireless Networks -- Introduction -- Energy of Radio Model and Relay Constraint -- Energy Consumption and Propagation Model -- Relay Region -- Optimal Number of Relay Nodes -- Construction of EGR -- Selection of Relay Nodes -- Ad-Hoc Routing with Location Information -- Generic Sleeping Scheduler -- Simulation and Comparisons -- EGR Energy Saving -- Enhancing Energy Utilization and Lifetime in GAF -- Conclusion
  • References
  • Security Technologies Based on Home Gateway for Making Smart Home Secure -- Introduction -- General Model for Home Network -- Necessities of Security for Home Network -- Target of Existing Attacks Due to Connection to Internet -- Trusted Relationships Among Entities -- Others -- Security Technologies for Home Network -- Authentication -- Authorization -- Security Policy -- Implementation -- Conclusion -- References -- Layered Peer to Peer Streaming Using Hidden Markov Models -- Introduction -- Layered Streaming -- Peer Selection Using HMM -- Evaluation -- Related Work -- Conclusion -- Optimum Power Controller for Random Number Generator in the Crypto Module of Ubiquitous Computing Environment -- Introduction -- Framework of Optimum Power Controller (OPC) in Crypto Module -- Experimental Results -- Conclusion -- Problem Localization for Automated System Management in Ubiquitous Computin -- Introduction -- Related Works -- Problem Localization -- Proposed Model Structure -- Fundamental and Characteristics of Bayesian Network -- Preprocessing -- Structure Learning -- Experiment and Evaluation -- Conclusion -- References -- A High Speed Analog to Digital Converter for Ultra Wide Band Applications -- Introduction -- UWB Receiver -- ADC Architecture -- Comparator Design -- Encoder -- Results -- Conclusion -- References -- Design and DSP Software Implementation of Mobile WiMAX Baseband Transceiver Functions -- Introduction -- Overview of the IEEE 802.16e OFDMA PHY -- Some Key Baseband Signal Processing Functions -- Synchronization -- Channel Estimation -- FEC Decoding -- Simulation Results on Algorithm Performance -- Synchronization -- Channel Estimation -- FEC -- DSP Software Implementation -- Conclusion -- Cross-Layer Design for IEEE 802.16-2005 System Using Platform-Based Methodologies -- Introduction -- 802.16-2005 MAC and PHY Overview
  • Cross-Layer Issues -- System Architecture -- Design and Implementation Isssues -- Conclusion -- A Dynamic Frequency Allocation Scheme for IEEE 802.16 OFDMA-Based WMANs Using Hungary Algorithm -- Introduction -- System Model -- Dynamic Frequency Allocation -- Conventional Algorithms -- Hungarian Algorithm (HA) -- Enhanced Dynamic Frequency Allocation Algorithm -- Simulation Model and Results -- Conclusion -- References -- Wireless Network Management System for WiMAX / Wi-Fi Mesh Networks -- Introduction -- Related Work -- Design of Wireless Network Management System for WiMAX/ Wi-Fi Mesh Networks -- Implementation Environment and Develop Tools -- Experiments and Discussions -- Conclusions -- References -- An Implementation of QoS Framework for Heterogeneous Networks -- Introduction -- The Implemented Modules in NS-2 Simulator -- Access Category-Service Class (AC-SC) Mapping -- Call Admission Control (CAC) -- Scheduling Algorithm -- Performance Evaluation -- Simulation Environments -- Simulation Results -- Conclusions and Future Work -- References -- An Energy-Efficient MAC Design for IEEE 802.15.4-Based Wireless Sensor Networks -- Introduction -- IEEE 802.15.4 MAC -- Nonbeacon-Enabled Mode -- The Energy-Efficient MAC Design -- System Parameters -- Schedule Exchange Phase -- Schedule Generation Phase -- Performance Evaluation -- Simulation Environment -- Input Parameters and Output Measures -- Numerical Results -- Conclusion -- A Cross-Layer Signaling and Middleware Platform for Multi-interface Mobile Devices -- Introduction -- Related Work -- Middleware -- Cross Layer Design -- Driver-Level Network Event Notification -- System Architecture -- Middleware Platform and Cross-Layer Signaling -- Network Event Notification Mechanism -- Network-Aware Application -- Mobility Manager -- Modified Kphone -- Conclusion