Emerging Directions in Embedded and Ubiquitous Computing: EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the EUC 2007 workshops held in conjunction with the IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2007, in Taipei, Taiwan, in December 2007.

The 69 revised full papers presented together with four invited papers were carefully reviewed and selected from about 200 submissions to the seven workshops. Topics covered by the workshops are trustworthiness, reliability and services in ubiquitous and sensor networks (TRUST 2007), system and software for wireless system-on-chip (WSOC 2007), network centric ubiquitous systems (NCUS 2007), ubiquitous underwater acoustic-sensor network (UUWSN 2007), RFID and ubiquitous sensor networks (USN 2007), embedded software optimization (ESO 2007), and security in ubiquitous computing (SecUbiq 2007).

Author(s): Firdous Kausar, Sajid Hussain, Tai-hoon Kim, Ashraf Masood (auth.), Mieso K. Denko, Chi-sheng Shih, Kuan-Ching Li, Shiao-Li Tsao, Qing-An Zeng, Soo Hyun Park, Young-Bae Ko, Shih-Hao Hung, Jong Hyuk Park (eds.)
Series: Lecture Notes in Computer Science 4809 : Information Systems and Applications, incl. Internet/Web, and HCI
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2007

Language: English
Pages: 828
Tags: Computer Communication Networks; Special Purpose and Application-Based Systems; Information Systems Applications (incl.Internet); Data Encryption; User Interfaces and Human Computer Interaction; Computers and Society

Front Matter....Pages -
Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks....Pages 1-11
A Critical Approach to Privacy Research in Ubiquitous Environments – Issues and Underlying Assumptions....Pages 12-21
The Case Study of Information Security System for International Airports....Pages 22-30
Quantitative Evaluation of Intrusion Tolerant Systems Subject to DoS Attacks Via Semi-Markov Cost Models....Pages 31-42
An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System....Pages 43-56
UPS – An Ubiquitous Proximity eService for Trust Collaboration....Pages 57-68
Obligations for Privacy and Confidentiality in Distributed Transactions....Pages 69-81
Multi-channel Enhancements for IEEE 802.11-Based Multi-hop Ad-Hoc Wireless Networks....Pages 82-92
An Intelligent Event-Driven Interface Agent for Interactive Digital Contents in Ubiquitous Environments....Pages 93-102
A Loop-Based Key Management Scheme for Wireless Sensor Networks....Pages 103-114
A MAC Protocol with Little Idle Listening for Wireless Sensor Networks....Pages 115-123
Security Technologies Based on Home Gateway for Making Smart Home Secure....Pages 124-135
Layered Peer to Peer Streaming Using Hidden Markov Models....Pages 136-145
Optimum Power Controller for Random Number Generator in the Crypto Module of Ubiquitous Computing Environment....Pages 146-157
Problem Localization for Automated System Management in Ubiquitous Computing....Pages 158-168
A High Speed Analog to Digital Converter for Ultra Wide Band Applications....Pages 169-180
Design and DSP Software Implementation of Mobile WiMAX Baseband Transceiver Functions....Pages 181-192
Cross-Layer Design for IEEE 802.16-2005 System Using Platform-Based Methodologies....Pages 193-204
A Dynamic Frequency Allocation Scheme for IEEE 802.16 OFDMA-Based WMANs Using Hungary Algorithm....Pages 205-214
Wireless Network Management System for WiMAX / Wi-Fi Mesh Networks....Pages 215-225
An Implementation of QoS Framework for Heterogeneous Networks....Pages 226-236
An Energy-Efficient MAC Design for IEEE 802.15.4-Based Wireless Sensor Networks....Pages 237-248
A Cross-Layer Signaling and Middleware Platform for Multi-interface Mobile Devices....Pages 249-260
Enhanced Sleep Mode Operations for Energy Saving in IEEE 802.16e....Pages 261-272
Enhanced Fingerprint-Based Location Estimation System in Wireless LAN Environment....Pages 273-284
Improving Channel Scanning Procedures for WLAN Handoffs....Pages 285-296
A Multicast Extension for Enhanced Mobile IP by Home Agent Handover....Pages 297-308
Autonomic Multi-server Distribution in Flash Crowds Alleviation Network....Pages 309-320
Generic Energy-Efficient Geographic Routing for Ad-Hoc Wireless Networks....Pages 321-332
Description of a New Feature Meta-model....Pages 333-340
Studying of Multi-dimensional Based Replica Management in Object Storage System....Pages 341-354
Communication Model Exploration for Distributed Embedded Systems and System Level Interpretations....Pages 355-364
An End-to-End QoS Adaptation Architecture for the Integrated IntServ and DiffServ Networks....Pages 365-376
Ubiquitous Laboratory: A Research Support Environment for Ubiquitous Learning Based on Sensor Networks....Pages 377-388
Intelligent Monitoring Using Wireless Sensor Networks....Pages 389-400
On the Design of Micro-mobility for Mobile Network....Pages 401-412
ANSWER: Adaptive Network Selection in WLAN/UMTS EnviRonment....Pages 413-424
Self-authorized Public Key Management for Home Networks....Pages 425-434
A Cross-Layered Diagnostician in OSGi Platform for Home Network....Pages 435-444
LaMSM: Localization Algorithm with Merging Segmented Maps for Underwater Sensor Networks....Pages 445-454
TinyOS-Based Gateway for Underwater Acoustics/Radio Frequency Communication....Pages 455-466
An Energy Scheduling Algorithm for Ensuring the Pre-determined Lifetime in Sensor Network....Pages 467-473
Underwater Acoustic Communication and Modem-Based Navigation Aids....Pages 474-481
State-of-the-Art in MAC Protocols for Underwater Acoustics Sensor Networks....Pages 482-493
An Ultrasonic Sensor Based Low-Power Acoustic Modem for Underwater Communication in Underwater Wireless Sensor Networks....Pages 494-504
UWA-NAV – Energy Efficient Error Control Scheme for Underwater Acoustic Sensor Network....Pages 505-514
Underwater Wideband Source Localization Using the Interference Pattern Matching....Pages 515-522
A New Virtual Select Database Operation for Wireless Sensor Networks....Pages 523-530
GT 2 – Reduced Wastes Time Mechanism for Underwater Acoustic Sensor Network....Pages 531-537
Comparative Evaluation of Probabilistic and Deterministic Tag Anti-collision Protocols for RFID Networks....Pages 538-549
An Efficient Mutual Authentication Protocol on RFID Tags....Pages 550-556
HGLAP – Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System....Pages 557-567
Target Classification in Sparse Sampling Acoustic Sensor Networks Using IDDC Algorithm....Pages 568-578
Scriptable Sensor Network Based Home-Automation....Pages 579-591
Applying Situation Awareness to Mobile Proactive Information Delivery....Pages 592-603
Energy-Efficiency on a Variable-Bitrate Device....Pages 604-616
The Secure DAES Design for Embedded System Application....Pages 617-626
Software Power Peak Reduction on Smart Card Systems Based on Iterative Compiling....Pages 627-637
Simultaneous Operation Scheduling and Operation Delay Selection to Minimize Cycle-by-Cycle Power Differential....Pages 638-647
A Simple Approach to Robust Optimal Pole Assignment of Decentralized Stochastic Singularly-Perturbed Computer Controlled Systems....Pages 648-659
Assured-Timeliness Integrity Protocols for Distributable Real-Time Threads with in Dynamic Distributed Systems....Pages 660-673
Evaluating Modeling Solutions on Their Ability to Support the Partitioning of Automotive Embedded Systems....Pages 674-685
Security Analysis of the Certificateless Signature Scheme Proposed at SecUbiq 2006....Pages 686-691
New Efficient Certificateless Signature Scheme....Pages 692-703
A Practical Identity-Based Signature Scheme from Bilinear Map....Pages 704-715
Linkable Ring Signatures from Linear Feedback Shift Register....Pages 716-727
A Simple and Efficient Key Exchange Scheme Against the Smart Card Loss Problem....Pages 728-744
A Key Distribution Scheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor Networks....Pages 745-757
Token-Based Authenticated Key Establishment Protocols for Three-Party Communication....Pages 758-769
Two Approaches on Pairwise Key Path Establishment for Sensor Networks....Pages 770-780
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks....Pages 781-794
Low-Cost and Strong-Security RFID Authentication Protocol....Pages 795-807
A Ticket Based Binding Update Authentication Method for Trusted Nodes in Mobile IPv6 Domain....Pages 808-819
Back Matter....Pages -