Since the beginning of the ubiquitous computing era, context-aware applications have been envisioned and pursued, with location and especially proximity information being one of the primary building blocks. To date, t...
详细信息
ISBN:
(纸本)9781467377027
Since the beginning of the ubiquitous computing era, context-aware applications have been envisioned and pursued, with location and especially proximity information being one of the primary building blocks. To date, there is still a lack of feasible solutions to perform proximity tests between mobile entities in a privacy-preserving manner, i.e., one that does not disclose one's location in case the other party is not in proximity. In this paper, we present our novel approach based on location tags built from surrounding Wi-Fi signals originating only from mobile devices. Since the set of mobile devices at a given location changes over time, this approach ensures the user's privacy when performing proximity tests. To improve the robustness of similarity calculations, we introduce a novel extension of the commonly used cosine similarity measure to allow for weighing its components while preserving the signal strength semantics. Our system is evaluated extensively in various settings, ranging from office scenarios to crowded mass events. the results show that our system allows for robust short-range proximity detection while preserving the participants' privacy.
distributed wireless networks have become popular due to the evolution of the Internet-of-things. these networks utilize ad-hoc routing protocols to interconnecting all nodes. Each peer forwards data for other nodes o...
详细信息
distributed wireless networks have become popular due to the evolution of the Internet-of-things. these networks utilize ad-hoc routing protocols to interconnecting all nodes. Each peer forwards data for other nodes on the basis of network connectivity and a set of conventions that is determined by the routing protocol. Still, these protocols fail to protect legitimate nodes against several types of selfish and malicious activity. thus, trust and reputation schemes are integrated with pure routing protocols to provide secure routing functionality. In this paper we propose ModConTR - a modular and adaptable trust and reputation-based system for secure routing. the system is composed of 11 different components which can be configured at runtime to adjust to each application's security and performance requirements. Presented work includes three possible configurations of ModConTR, considering ultra-lightweight, low-cost and lightweight implementations. Moreover, predefined configurations permit the implementation of the reasoning process for well-known secure routing protocols. thus, we present a security and performance analysis for each of the components, including a comparative analysis of 10 complete trust and reputation schemes under identical attack scenarios. ModConTR is implemented using the NS2 simulator and is integrated withthe DSR routing protocol.
Advances in medical technology is not sufficient alone to satisfy the growing and emerging needs such as improving quality of life, providing healthcare services tailored to each individual, ensuring efficient managem...
详细信息
ISBN:
(纸本)9781538691342;9781538691335
Advances in medical technology is not sufficient alone to satisfy the growing and emerging needs such as improving quality of life, providing healthcare services tailored to each individual, ensuring efficient management of care and creating sustainable social healthcare. there is a potential for substantially enhancing healthcare services by integrating information technologies, social networking technologies, digitization and control of biomedical devices, and utilization of big data technologies as well as machine learning techniques. Today, data has become more ubiquitous and accessible by virtue of advancements in smart sensor and actuator technologies. this in turn allow us to collect significant amount of data from biomedical devices and automate certain healthcare functions. In order to get maximum benefit from the generated data, there is a need to develop new models and distributed data analytics approaches for health industry. Big data has the potential to improve the quality and efficiency of health care services as well as reducing the maintenance costs by minimizing the risks related with malfunctions of biomedical devices. Hospitals grasp this noteworthy potential and convert collected data into valuable information that can be used for several purposes including management of biomedical device maintenance. To this end, in this study, by leveraging the latest advancements in big data analytics technologies, we propose a scalable predictive maintenance architecture for healthcare domain. We also discussed the opportunities and challenges of utilizing the proposed architecture in the healthcare domain.
ieee 802.11 set of standards grew from a highly obscured and unsecured technology to a robust and reliable solution for many of us. Broad acceptance and relatively simple implementation also made 802.11 a perfect targ...
详细信息
ieee 802.11 set of standards grew from a highly obscured and unsecured technology to a robust and reliable solution for many of us. Broad acceptance and relatively simple implementation also made 802.11 a perfect target for possible exploitation. Recently discovered wireless driver vulnerabilities exposed a new critical threat that legitimate users community is facing. What makes this vulnerability so dangerous to many of us is the fact that the actual exploitation cannot be prevented by commonly used tools such as firewalls, antivirus, and intrusion detection system's programs. Access to the victims machine is gained through a flawed third-party wireless driver, giving full kernel level access rights to the attacker. While kernel-level exploitation domain covers everything running beneaththe operating systems, this paper describes wireless device drivers vulnerability and proposes methods for vulnerability mitigations. this paper would assist IT professionals in evaluating, creating, and assessing security requirements associated with wireless networks connectivity.
End users execute today on their smart phones different kinds of mobile applications like calendar apps or high-end mobile games, differing in local resource usage. Utilizing local resources of a smart phone heavily, ...
详细信息
ISBN:
(纸本)9781467377027
End users execute today on their smart phones different kinds of mobile applications like calendar apps or high-end mobile games, differing in local resource usage. Utilizing local resources of a smart phone heavily, like playing high-end mobile games, drains its limited energy resource in few hours. To prevent the limited energy resource from a quick exhaustion, smart phones benefit from executing resource-intensive application parts on a remote server in the cloud (code offloading). During the remote execution on the remote server, a smart phone waits in idle mode until it receives a result. However, code offloading introduces computation and communication overhead, which decreases the energy efficiency and induces monetary cost. For instance, sending or receiving execution state information to or from a remote server consumes energy. Moreover, executing code on a remote server instance in a commercial cloud causes monetary cost. To keep consumed energy and monetary cost low, we present in this paper the concept of remote-side caching for code offloading, which increases the efficiency of code offloading. the remote-side cache serves as a collective storage of results for already executed application parts on remote servers, avoiding the repeated execution of previously run application parts. the smart phone queries the remote-side cache for corresponding results of resource-intensive application parts. In case of a cache hit, the smart phone gets immediately a result and continues the application execution. Otherwise, it migrates the application part and waits for a result of the remote execution. We show in our evaluation that the use of a remote-side cache decreases energy consumption and monetary cost for mobile applications by up to 97% and 99%, respectively.
We present dispel4py a versatile data-intensive kit presented as a standard Python library. It empowers scientists to experiment and test ideas using their familiar rapid-prototyping environment. It delivers mappings ...
详细信息
We present dispel4py a versatile data-intensive kit presented as a standard Python library. It empowers scientists to experiment and test ideas using their familiar rapid-prototyping environment. It delivers mappings to diverse computing infrastructures, including cloud technologies, HPC architectures and specialised data-intensive machines, to move seamlessly into production with large-scale data loads. the mappings are fully automated, so that the encoded data analyses and data handling are completely unchanged. the underpinning model is lightweight composition of fine-grained operations on data, coupled together by data streams that use the lowest cost technology available. these fine-grained workflows are locally interpreted during development and mapped to multiple nodes and systems such as MPI and Storm for production. We explain why such an approach is becoming more essential in order that data-driven research can innovate rapidly and exploit the growing wealth of data while adapting to current technical trends. We show how provenance management is provided to improve understanding and reproducibility, and how a registry supports consistency and sharing. three application domains are reported and measurements on multiple infrastructures show the optimisations achieved. Finally we present the next steps to achieve scalability and performance.
An orthogonal curvature fiber Bragg grating (FBG) sensor array is introduced, and it can detect the deformation and vibration of flexible structures such as rod, keel, etc. the sensor array composed of 20 sensors whic...
详细信息
An orthogonal curvature fiber Bragg grating (FBG) sensor array is introduced, and it can detect the deformation and vibration of flexible structures such as rod, keel, etc. the sensor array composed of 20 sensors which were averagely distributed on four optical fibers was mounted on the body of cylindrical shape memory alloy(SMA) substrate with staggered orthogonal arrangement. By the method of calibration, the relation coefficient between curvature and wavelength shift was obtained and the curvature of sensor was calculated accordingly, then, the space shape was reconstructed withthe help of the space curve fitting method based on curvature information of discrete points. In this paper, the operation principle, the design, packaging, calibration of FBG sensor array and the method of experiment were expounded in detail. the experiment result shows that the reconstructed spatial shape is lively, thus indicates that the relevant method and technology are feasible and practicable.
暂无评论