IFIP TC6 Open Digital Library

EUC Workshops 2007: Taipei, Taiwan

Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings

Mieso K. Denko, Chi-Sheng Shih, Kuan-Ching Li, Shiao-Li Tsao, Qing-An Zeng, Soo-Hyun Park, Young-Bae Ko, Shih-Hao Hung, Jong Hyuk Park

Springer, Lecture Notes in Computer Science 4809, ISBN: 978-3-540-77089-3



Contents

Trustworthiness, Reliability and Services in Ubiquitous and Sensor Networks

Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks.

Firdous Kausar, Sajid Hussain, Tai-Hoon Kim, Ashraf Masood

 1-11

A Critical Approach to Privacy Research in Ubiquitous Environments - Issues and Underlying Assumptions.

Maria Karyda, Stefanos Gritzalis, Jong Hyuk Park

 12-21

The Case Study of Information Security System for International Airports.

Hangbae Chang, Moonoh Kim, Hyuk-jun Kwon, Byungwan Han

 22-30

Quantitative Evaluation of Intrusion Tolerant Systems Subject to DoS Attacks Via Semi-Markov Cost Models.

Toshikazu Uemura, Tadashi Dohi

 31-42

An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System.

Nai-Wei Lo, Kuo-Hui Yeh

 43-56

UPS - An Ubiquitous Proximity eService for Trust Collaboration.

Yuanchu Hwang, Soe-Tsyr Yuan

 57-68

Obligations for Privacy and Confidentiality in Distributed Transactions.

Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, Anne Anderson

 69-81

Multi-channel Enhancements for IEEE 802.11-Based Multi-hop Ad-Hoc Wireless Networks.

YongSuk Lee, WoongChul Choi, SukJoong Kang, Seongje Cho

 82-92

An Intelligent Event-Driven Interface Agent for Interactive Digital Contents in Ubiquitous Environments.

Sukhoon Kang, Seokhoon Bae

 93-102

A Loop-Based Key Management Scheme for Wireless Sensor Networks.

YingZhi Zeng, Baokang Zhao, Jinshu Su, Xia Yan, Zili Shao

 103-114

A MAC Protocol with Little Idle Listening for Wireless Sensor Networks.

Chaoguang Men, Yongqian Lu, Dongsheng Wang

 115-123

Security Technologies Based on Home Gateway for Making Smart Home Secure.

Geon Woo Kim, Deok-Gyu Lee, Jong Wook Han, Sang Wook Kim

 124-135

Layered Peer to Peer Streaming Using Hidden Markov Models.

Sheng-De Wang, Zheng Yi Huang

 136-145

Optimum Power Controller for Random Number Generator in the Crypto Module of Ubiquitous Computing Environment.

Jinkeun Hong, Kihong Kim

 146-157

Problem Localization for Automated System Management in Ubiquitous Computing.

Shunshan Piao, Jeongmin Park, Eunseok Lee

 158-168

System and Software for Wireless SoC

A High Speed Analog to Digital Converter for Ultra Wide Band Applications.

Anand Mohan, Aladin Zayegh, Aleksandar Stojcevski

 169-180

Design and DSP Software Implementation of Mobile WiMAX Baseband Transceiver Functions.

Hai-wei Wang, David W. Lin, Kun-Chien Hung, Youn-Tai Lee

 181-192

Cross-Layer Design for IEEE 802.16-2005 System Using Platform-Based Methodologies.

Li-chuan Tseng, Kuan-yin Chen, ChingYao Huang

 193-204

A Dynamic Frequency Allocation Scheme for IEEE 802.16 OFDMA-Based WMANs Using Hungary Algorithm.

Shiann-Tsong Sheu, Chih-Cheng Yang, Hsu-Sheng Chang

 205-214

Wireless Network Management System for WiMAX / Wi-Fi Mesh Networks.

Li-Der Chou, Shih-Yao Cheng, Chien-Yi Li, Shing-Kuang Chen

 215-225

An Implementation of QoS Framework for Heterogeneous Networks.

Chang-Yang Ho, Hsi-Lu Chao

 226-236

An Energy-Efficient MAC Design for IEEE 802.15.4-Based Wireless Sensor Networks.

Yu-Kai Huang, Sze-Wei Huang, Ai-Chun Pang

 237-248

A Cross-Layer Signaling and Middleware Platform for Multi-interface Mobile Devices.

Yung-Chien Shih, Kai-Cheng Hsu, Chien-Chao Tseng

 249-260

Enhanced Sleep Mode Operations for Energy Saving in IEEE 802.16e.

Sixian Zheng, Kuochen Wang, Shiao-Li Tsao, Pochun Lin

 261-272

Enhanced Fingerprint-Based Location Estimation System in Wireless LAN Environment.

Wilson M. Yeung, JunYang Zhou, Joseph K. Ng

 273-284

Improving Channel Scanning Procedures for WLAN Handoffs.

Shiao-Li Tsao, Ya-Lien Cheng

 285-296

Network Centric Ubiquitous Systems

A Multicast Extension for Enhanced Mobile IP by Home Agent Handover.

Chun-Chuan Yang, Jeng-Yueng Chen, Li-Sheng Yu

 297-308

Autonomic Multi-server Distribution in Flash Crowds Alleviation Network.

Merdan Atajanov, Toshihiko Shimokawa, Norihiko Yoshida

 309-320

Generic Energy-Efficient Geographic Routing for Ad-Hoc Wireless Networks.

Chao-Lieh Chen, Jeng-Wei Lee, Cheng-Zh Lin, Yi-Tsung Chen, Jar-Shone Ker, Yau-Hwang Kuo

 321-332

Description of a New Feature Meta-model.

Yu Song, Qi Chen

 333-340

Studying of Multi-dimensional Based Replica Management in Object Storage System.

Zhipeng Tan, Dan Feng, Fei He, Ke Zhou

 341-354

Communication Model Exploration for Distributed Embedded Systems and System Level Interpretations.

Takashi Kinoshima, Kazutaka Kobayashi, Nurul Azma Zakaria, Masahiro Kimura, Noriko Matsumoto, Norihiko Yoshida

 355-364

An End-to-End QoS Adaptation Architecture for the Integrated IntServ and DiffServ Networks.

Ing-Chau Chang, Shi-Feng Chen

 365-376

Ubiquitous Laboratory: A Research Support Environment for Ubiquitous Learning Based on Sensor Networks.

Mianxiong Dong, Kaoru Ota, Minyi Guo, Zixue Cheng

 377-388

Intelligent Monitoring Using Wireless Sensor Networks.

Senol Zafer Erdogan, Sajid Hussain, Jong Hyuk Park

 389-400

On the Design of Micro-mobility for Mobile Network.

Junn-Yen Hu, Cheng-Fu Chou, Min-Shi Sha, Ing-Chau Chang, Chung-Yi Lai

 401-412

ANSWER: Adaptive Network Selection in WLAN/UMTS EnviRonment.

Chih-Cheng Hsu, Ming-Hung Chen, Cheng-Fu Chou, Wei-Chieh Chi, Chung-Yi Lai

 413-424

Self-authorized Public Key Management for Home Networks.

Hyoungshick Kim, S. Jae Oh

 425-434

A Cross-Layered Diagnostician in OSGi Platform for Home Network.

Pang-Chieh Wang, Yi-Hsuan Hung, Ting-Wei Hou

 435-444

Ubiquitous Underwater Acoustic-Sensor Network

LaMSM: Localization Algorithm with Merging Segmented Maps for Underwater Sensor Networks.

Eunchan Kim, Seok Woo, Chungsan Kim, Kiseon Kim

 445-454

TinyOS-Based Gateway for Underwater Acoustics/Radio Frequency Communication.

Phil-Jung Yun, Changhwa Kim, Sangkyung Kim, Seungjae Lee, Yong-Man Cho

 455-466

An Energy Scheduling Algorithm for Ensuring the Pre-determined Lifetime in Sensor Network.

Yong-Man Cho, Seungjae Lee, Changhwa Kim, Sangkyung Kim

 467-473

Underwater Acoustic Communication and Modem-Based Navigation Aids.

Dale Green

 474-481

State-of-the-Art in MAC Protocols for Underwater Acoustics Sensor Networks.

Hung Trong Nguyen, Soo Young Shin, Soo-Hyun Park

 482-493

An Ultrasonic Sensor Based Low-Power Acoustic Modem for Underwater Communication in Underwater Wireless Sensor Networks.

Heungwoo Nam, Sunshin An

 494-504

UWA-NAV - Energy Efficient Error Control Scheme for Underwater Acoustic Sensor Network.

Soo Young Shin, Soo-Hyun Park

 505-514

Underwater Wideband Source Localization Using the Interference Pattern Matching.

Seung-Yong Chun, Se-Young Kim, Ki-Man Kim

 515-522

A New Virtual Select Database Operation for Wireless Sensor Networks.

Seungjae Lee, Changhwa Kim, Sangkyung Kim

 523-530

GT2 - Reduced Wastes Time Mechanism for Underwater Acoustic Sensor Network.

Soo Young Shin, Soo-Hyun Park

 531-537

RFID and Ubiquitous Sensor Networks

Comparative Evaluation of Probabilistic and Deterministic Tag Anti-collision Protocols for RFID Networks.

Jihoon Choi, Wonjun Lee

 538-549

An Efficient Mutual Authentication Protocol on RFID Tags.

Hui-Feng Huang

 550-556

HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System.

JaeCheol Ha, Hwankoo Kim, JeaHoon Park, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd

 557-567

Target Classification in Sparse Sampling Acoustic Sensor Networks Using IDDC Algorithm.

Youngsoo Kim, Daeyoung Kim 0001, Taehong Kim, Jongwoo Sung, Seongeun Yoo

 568-578

Scriptable Sensor Network Based Home-Automation.

Thomas Haenselmann, Thomas King, Marcel Busse, Wolfgang Effelsberg, Markus Fuchs

 579-591

Applying Situation Awareness to Mobile Proactive Information Delivery.

Su Te Lei, Kang Zhang, Edwin Hsing-Mean Sha

 592-603

Embedded Software Optimization

Energy-Efficiency on a Variable-Bitrate Device.

Yung-Hen Lee, Jian-Jia Chen, Tei-Wei Kuo

 604-616

The Secure DAES Design for Embedded System Application.

Ming-Haw Jing, Jian-Hong Chen, Zih-Heng Chen, Yaotsu Chang

 617-626

Software Power Peak Reduction on Smart Card Systems Based on Iterative Compiling.

Matthias Grumer, Manuel Wendt, Stefan Lickl, Christian Steger, Reinhold Weiss, Ulrich Neffe, Andreas Mühlberger

 627-637

Simultaneous Operation Scheduling and Operation Delay Selection to Minimize Cycle-by-Cycle Power Differential.

Wei-Ting Yen, Shih-Hsu Huang, Chun-Hua Cheng

 638-647

A Simple Approach to Robust Optimal Pole Assignment of Decentralized Stochastic Singularly-Perturbed Computer Controlled Systems.

Kai-chao Yao

 648-659

Assured-Timeliness Integrity Protocols for Distributable Real-Time Threads with in Dynamic Distributed Systems.

Binoy Ravindran, Edward Curley, Jonathan Stephen Anderson, E. Douglas Jensen

 660-673

Evaluating Modeling Solutions on Their Ability to Support the Partitioning of Automotive Embedded Systems.

Augustin Kebemou, Ina Schieferdecker

 674-685

Security in Ubiquitous Computing

Security Analysis of the Certificateless Signature Scheme Proposed at SecUbiq 2006.

Je Hong Park, Bo Gyeong Kang

 686-691

New Efficient Certificateless Signature Scheme.

Lei Zhang 0009, Futai Zhang, Fangguo Zhang

 692-703

A Practical Identity-Based Signature Scheme from Bilinear Map.

Zhu Wang, Huiyan Chen

 704-715

Linkable Ring Signatures from Linear Feedback Shift Register.

Dong Zheng, Xiangxue Li, Kefei Chen, Jianhua Li

 716-727

A Simple and Efficient Key Exchange Scheme Against the Smart Card Loss Problem.

Ren-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei

 728-744

A Key Distribution Scheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor Networks.

Firdous Kausar, Sajid Hussain, Jong Hyuk Park, Ashraf Masood

 745-757

Token-Based Authenticated Key Establishment Protocols for Three-Party Communication.

Eun-Jun Yoon, Kee-Young Yoo

 758-769

Two Approaches on Pairwise Key Path Establishment for Sensor Networks.

Ping Li, Yaping Lin, Jiaying Wu

 770-780

An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks.

Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda

 781-794

Low-Cost and Strong-Security RFID Authentication Protocol.

JaeCheol Ha, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd

 795-807

A Ticket Based Binding Update Authentication Method for Trusted Nodes in Mobile IPv6 Domain.

Ilsun You

 808-819