2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008)

11-13 June 2008

Filter Results

Displaying Results 1 - 25 of 100
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (409 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (60 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - xii
    Request permission for commercial reuse | PDF file iconPDF (171 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2008, Page(s):xiii - xiv
    Request permission for commercial reuse | PDF file iconPDF (128 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome from the Conference Program Co-Chairs

    Publication Year: 2008, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (121 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees

    Publication Year: 2008, Page(s):xvi - xxi
    Request permission for commercial reuse | PDF file iconPDF (146 KB)
    Freely Available from IEEE
  • Cyber-Physical Systems: A New Frontier

    Publication Year: 2008, Page(s):1 - 9
    Cited by:  Papers (59)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    The report of the President's Council of Advisors on Science and Technology (PCAST) has placed CPS on the top of the priority list for federal research investment [6]. This article first reviews some of the challenges and promises of CPS, followed by an articulation of some specific challenges and promises that are more closely related to the sensor networks, ubiquitous and trustworthy computing c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Enforcement Model for Distributed Usage Control

    Publication Year: 2008, Page(s):10 - 18
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (266 KB) | HTML iconHTML

    Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous access control in dynamic computing environments where subject attributes and system states can be changed. Particularly, this is very useful in specifying security requirements to control the usage of an object after it is r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • China's National Research Project on Wireless Sensor Networks

    Publication Year: 2008, Page(s): 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (138 KB)

    This talk will give an overview of the 5-year National Basic Research Program of China (also known as the 973 Program) on Wireless Sensor Networks that was launched in September 2006 and sponsored by the Ministry of Science and Technology. This national research project involves researchers from many major universities in China and Hong Kong, and aims to tackle fundamental research issues rising i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Strong QoS and Collision Control in WLAN Mesh and Ubiquitous Networks

    Publication Year: 2008, Page(s):20 - 27
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (195 KB) | HTML iconHTML

    Quality of service (QoS) provisioning is critical to real-time applications such as VOIP and IPTV, but has not been resolved in multihop networks such as mesh and ad hoc networks. For multiple access in ubiquitous networks, energy efficiency is of the single most important design goal, and can be supported through power save and power control techniques. In this paper, we propose a class of MAC pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Construct Small Worlds in Wireless Networks Using Data Mules

    Publication Year: 2008, Page(s):28 - 35
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (921 KB) | HTML iconHTML

    A small world phenomenon has been discovered in a wide range of disciplines, such as physics, biology, social science, information system, computer networks, etc. In a wireless network, the small world phenomenon is used in the development of novel routing strategies. However, past studies made use of wire lines as shortcuts to construct a small world in a wireless network. First, it's difficult t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Load Awareness Multi-Channel MAC Protocol Design for Ad Hoc Networks

    Publication Year: 2008, Page(s):36 - 43
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (198 KB) | HTML iconHTML

    Exploiting multiple channels improves the system performance in a heavy-loaded wireless ad hoc network. Many multi-channel MAC protocols have been proposed recently. The number of channels being used is fixed for these protocols, which limits their flexibility. As a result, these protocols may suffer from either longer delay in a light-loaded network or higher collision probability in a heavy-load... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Reactive Local Positioning System for Ad Hoc Networks

    Publication Year: 2008, Page(s):44 - 51
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4265 KB) | HTML iconHTML

    Existing ad hoc location systems measure locations proactively by continuous measurements and communication among all nodes in an ad hoc network. However, in certain location-based applications only a few nodes need the location of a few other nodes, in which case the proactive approach results in an unnecessarily large overhead. We propose a scheme for a reactive ad hoc location system, which avo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Distributed Authentication Framework for Single Sign-On Services

    Publication Year: 2008, Page(s):52 - 58
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    In this paper we present a novel single sign-on scheme known as secure distributed single sign-on (SeDSSO). SeDSSO provides secure fault-tolerant authentication using threshold key encryption with a distributed authentication service. The authentication service consists of n total authentication servers utilizing a (t, n) threshold encryption scheme, where t distinct server-signed messages are req... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study on Digital Audio Watermarking Internet Applications

    Publication Year: 2008, Page(s):59 - 66
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (321 KB) | HTML iconHTML

    This paper aims to explore the feasibility of embedding Cellophane's QR Code in sound watermarking and conducting simultaneous linkage of hidden information through the principles of psychological and physiological models. In the research, we tried to realize the theory through Visual Basic and observed that different type of music would indirectly affect the identifiably of sound watermarking. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Enhanced Trust Model Based on Reputation for P2P Networks

    Publication Year: 2008, Page(s):67 - 73
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (150 KB) | HTML iconHTML

    Trust plays an important role in peer-to-peer (P2P) networks for enabling peers to share resources and services. It is necessary to build an effective security trust model to solve the trust problem during interactions between peers. In this paper, we propose an enhanced trust model based on reputation. We apply SupP2Prep [Chhabra et al., 2004] in our trust model, which is a protocol for reputatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Security of the Full-Band Image Watermark for Copyright Protection

    Publication Year: 2008, Page(s):74 - 80
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (920 KB) | HTML iconHTML

    Digital watermarks have been embedded invisibly in digital media to protect copy rights of legal owners. The embedded watermarks can be extracted to indicate ownership originals. In this paper a robust Full-Band Image Watermark method is investigated by using various attacks on the watermarked image. Image attacks have evolved so much that they are not just destructive, that is, degrading the visu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Body Sensor Networks for Increased Safety in Bomb Disposal Missions

    Publication Year: 2008, Page(s):81 - 89
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (251 KB) | HTML iconHTML

    Bomb disposal manned missions are inherently safety-critical. Wireless sensor network (WSN) technology potentially offers an opportunity to increase the safety of the operatives involved in such missions through detailed physiological parameters monitoring and fusion of "health" information. Wearing heavy armour during bomb disposal manned missions may have side effects that, due to reduction of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Cloaking Algorithm Based on Spatial Networks for Location Privacy

    Publication Year: 2008, Page(s):90 - 97
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (262 KB) | HTML iconHTML

    Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred to as location anonymizer) responsible for cloaking at least k users' locations for protecting location privacy. A location anonymizer will generate cloaked regions in which there are at least k users for query processing.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Controlled Disclosure of Context Information across Ubiquitous Computing Domains

    Publication Year: 2008, Page(s):98 - 105
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1134 KB) | HTML iconHTML

    One of the challenges in ubiquitous computing is that of mobility, which typically requires interaction between intelligent environments in different domains of administration. We present a highly distributed and collaborative system that enables context-aware applications to obtain context information about mobile entities (users or devices) independent of the domain that produces this informatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Proxy Signatures For Ubiquitous Computing

    Publication Year: 2008, Page(s):106 - 113
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (246 KB) | HTML iconHTML

    Proxy signatures have been extensively used to solve authentication issues in mobile agent applications and authorization problems in distributed systems. However, conventional proxy signatures use traditional public key cryptosystems and are quite heavyweight. Thus, a direct application of these traditional signatures face significant performance challenges when applied to resource constrained ub... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sub-optimal Step-by-Step Node Deployment Algorithm for User Localization in Wireless Sensor Networks

    Publication Year: 2008, Page(s):114 - 121
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB) | HTML iconHTML

    User/object localization is one of the promising applications for WSNs. So far, there is no flexible node deployment algorithm targeting on optimizing the localization performance. To facilitate node deployment for localization applications in WSNs, we propose, based on a universal performance evaluation metric, a low-complexity, step-by-step node deployment algorithm which provides sub-optimal so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neighborhood-Aware Density Control in Wireless Sensor Networks

    Publication Year: 2008, Page(s):122 - 129
    Cited by:  Papers (6)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB) | HTML iconHTML

    In dense wireless sensor networks, density control is an important technique for prolonging network's lifetime. However, due to the intrinsic many-to-one communication pattern of sensor networks, nodes close to the sink tend to deplete their energy faster than other nodes. This unbalanced energy usage among nodes significantly reduces the network lifetime. In this paper, we propose neighborhood-aw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.