Upload
others
View
0
Download
0
Embed Size (px)
Citation preview
2010 IEEE/IFIP 8th International
Conference on Embedded and
Ubiquitous Computing
(EUC 2010)
Hong Kong, China
11 - 13 December 2010
4 IEEE IEEE Catalog Number: CFP1047F-PRT
ISBN: 978-1-4244-9719-5
2010IEEE/IFIP International
Conference on Embedded
and Ubiquitous Computing
EUC 2010
Table of Contents
Message from the EUC 2010 General Chairs xvii
Message from the EUC 2010 Program Chairs xviii
Message from the EUC 2010 Steering Committee Chairs xix
Message from the EUC 2010 Workshop/Symposium Chairs xx
EUC 2010 Organizing and Program Committees xxi
EUC 2010 Additional Reviewers xxviii
Message from the TrustCom 2010 Symposium Chairs xxix
Message from the UUWSN 2010 Workshop Chairs xxx
Message from the CSIOT 2010 Workshop Chairs xxxi
Message from the SeNAmI 2010 Workshop Chairs xxxii
Message from the WiNA 2010 Workshop Chairs xxxiii
Message from the ICNA 2010 Workshop Chairs xxxiv
TrustCom 2010 Organizing and Program Committees xxxv
UUWSN 2010 Organizing and Program Committees xxxvii
SeNAmI 2010 Organizing and Program Committees xxxviii
WiNA 2010 Organizing and Program Committees xxxix
ICNA 2010 Organizing and Program Committees xl
Keynotes xli
The 8th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing(EUC 2010)
Embedded Systems Software and Optimization
Schedule Swapping: A Technique for Temperature Management
ofDistributed Embedded Systems 1
Farzad Sarnie Ghahfarokhi andAlireza Ejlali
User-Level Network Protocol Stacks for Automotive Infotainment Systems 7
Mu-Youl Lee andHyun- WookJin
Replay Debugging for Multi-threaded Embedded Software 15
Yann-Hang Lee, Young Wn Song, Rohit Girme, Sagar Zaveri, and Yan Chen
Real-time Enhancement for Xen Hypervisor 23
Peijie Yu, Mingyuan Xia, Qian Lin, Min Zhu, Shcmg Gao, Zhengwei Qi, Kai Chen,
and Haibing Gnan
Embedded Systems and Hardware/Software Co-Design
Optimized Schedule Synthesis under Real-Time Constraints for the Dynamic
Segment of FlexRay 31
Reinhard Schneider, Unmesh Bordoloi, Dip Goswami, andSamarjit Chakraborty
Optimizing Runtime Reconfiguration Decisions 39
Thilo Pionteck, Steffen Sammann, and Carsten Albrecht
Architectural Support for Reducing Parallel Processing Overhead in
an Embedded Multiprocessor 47
Jian Wang, Joar Sohl, and Dake Liu
Trading Conditional Execution for More Registers on ARM Processors 53
Huang-Jia Cheng, Yuan-Shin Hwang, Rong-Guey Chang, and Cheng-Wei Chen
An Environment for Design Software and Hardware Aspects ofClock
Synchronization and Communication in DRTES 60
Brahim Hamid andAdel Ziani
Implementation of a Floating Point Adder and Subtracter in NoGAP, A
Comparative Case Study 68
Per Karlstrdm, Wenbiao Zhou, andDake Liu
Co-Simulation of Self-Adaptive Automotive Embedded Systems 73
Marc Zeller, Gereon Weiss, Dirk Eilers, andRudiKnorr
Middleware for Ubiquitous and Autonomous Computing
Empirical Evaluation of Content-based Pub/Sub Systems over Cloud
Infrastructure 81
Biao Zhang, Beihong Jin, Haibiao Chen, and Ziyuan Qin
A Reflective Service Gateway for Integrating Evolvable Sensor-Actuator
Networks with Pervasive Infrastructure 89
Seong Hoon Kim, Daeyoung Kim, Jeong Seok Kang, and Hong Seong Park
Handling Mobility on a QoS-Aware Service-based Framework for Mobile
Systems 97
Joel Gongalves, Luis Lino Ferreira, Luis Miguel Pinho, and Guilherme Silva
Trust Measurement Methods in Organic Computing Systems by Direct
Observation 105
RolfKiefJiaber, Benjamin Satzger, Julia Schmitt, MichaelRoth, and Theo Ungerer
Mobile and Context-aware Computing
GEDS: GPU Execution of Continuous Queries on Spatio-Temporal Data
Streams 112
Jonathan Cazalas and Ratan Guha
Rule-based Approach for Context Inconsistency Management Scheme
in Ubiquitous Computing 120
Yong-jae Lee, Jaehyoung Lim, Soon J. Hyun, andDongman Lee
Transferring Ontologies between Mobile Devices and Knowledge-Based
Systems 127
Xiang Su andJukka Riekki
Middleware Support for Context-awareness in Asynchronous Pervasive
Computing Environments 136
Jianping Yu, Yu Huang, Jiannong Cao, andXianping Tao
Cyber-Physical Systems and the Internet of Things
An Application Framework for Loosely Coupled Networked Cyber-Physical
Systems 144
Minyoung Kim, Mark-Oliver Stehr, Jinwoo Kim, andSoonhoi Ha
LocaToR: Locating Passive RFID Tags with the Relative Neighborhood
Graph 154
YiyangZhao, S.C. Cheung, andLionelM, Ni
An OSGi Based RFID Complex Event Processing System 162
Hou Weifeng, Hou Di, and Chen Juan
Power-Aware Computing
Real-Time Constrained Task Scheduling in 3D Chip Multiprocessor to Reduce
Peak Temperature 170
Jiayin Li, Meikang Qiu, Jianwei Niu, Tianzhou Chen, and Yongxin Zhu
Improving the Accuracy of Object Tracking in Three Dimensional WSNs
Using Bayesian Estimation Methods 177
Junzhao Du, Lei Mao, Hui Liu, Bo Wu, andDeke Guo
Power Management in Real Time Embedded Systems through Online
and Adaptive Interplay ofDPM and DVFS Policies 184
Khurram Bhatti, Cecile Belleudy, and Michel Auguin
A Connection-assured Many-to-one Communication ofWireless Sensors
with Two Transmission Ranges 192
Wan Yeon Lee, Hyung Goo Paek, Jeong-Mo Yeo, and Kyong Hoon Kim
Sensor Networks
Partitioning Detection and Connectivity Restoration Algorithm for Wireless
Sensor and Actor Networks 200
MuhammadImran, Mohamad Younis, Abas Md. Said, andHalabi Hasbullah
Towards Precise Synchronisation in Wireless Sensor Networks 208
Lawrence Cheng, Stephen Hailes, andAlan Wilson
On Efficient Clock Drift Prediction Means and their Applicability to IEEE
802.15.4 216
Marcin Brzozowski, Hendrik Salomon, and Peter Langendoerfer
RISN: An Efficient, Dynamically Tasked and Interoperable Sensor Network
Overlay 224
Evens Jean, Robert T. Collins, Ali R. Hurson, Sahra Sedigh, and Yu Jiao
Efficient Data Delivery in Wireless Sensor Networks with Ubiquitous Mobile
Data Collectors 232
Weiwei Jiao, Long Cheng, Min Chen, Canfeng Chen, and Jian Ma
Virtual Brokers for Large-Scale Publish/Subscribe in Wireless Sensor
Networks 240
Yang Liu, Boon-Chong Seet, and Adnan Al-Anbuky
Multimedia and Data Management
Multi-resolution Next Location Prediction for Distributed Virtual
Environments 247
Jaroslav Pribyl andPavel Zemcik
Trick Play Function for VOD with SVC source 255
PengZhu, Hideya Yoshiuchi, and Satoshi Yoshizawa
OCO: A Multi-channel MAC Protocol with Opportunistic Cooperation
for Wireless Sensor Networks 260
Jinbao Li, Desheng Zhang, and Longjiang Guo
Video Streaming over Wireless Mesh Networks with Multi-Gateway Support 268
Huali Cui, Depei Qian, Xingjim Zhang, and Yi Liu
Real-Time Systems and Wireless Mesh Networks
Hierarchical Real-Time Scheduling Framework for Imprecise Computations .273
Guy Martin Tchamgoue, Kyong Hoon Kim, Yong-Kee Jun, and Wan Yeon Lee
Preemption Control Using Frequency Scaling in Fixed Priority Scheduling. .281
Abhilash Thekkilakattil, Anju S. Pillai, Radu Dobrin, and Sasikumar Punnekkat
Hierarchical Cooperative Data Caching for Wireless Mesh Networks .289
Weigang Wu and Yifei Huang
The 8th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing(Workshops / Symposiums 2010)
UnderWater Acoustic Sensor Network 2010 (UUWSN 2010)
UUWSN -1: Architecture Design
Adaptive GTS Allocation Scheme based on IEEE 802.15.4 for Underwater
Acoustic Sensor Networks 297
Jung-Il Namgung, Soo-Young Shin, Nam-Yeol Yun, andSoo-Hyun Park
Design and Implementation of the Test-bed for Underwater Acoustic Sensor
Network Based on ARM9 Processor 302
Yung-Pyo Kim, Jung-Il Namgung, Nam-Yeol Yun, Hui-Jin Cho, Imtiaz Ahmed Khan,
and Soo-Hyun Park
The Architecture of Surface Gateway for Underwater Acoustic Sensor
Networks 307
Youngjun Jo, Jungyoungj Bae, Hyunjae Shin, Heungwoo Nam, Saeyoung Ahn,
and Sunshin An
UUWSN - 2: Tracking and Localization
Bearings-only Tracking Systems with Distributed Floating Beacons
in Underwater Sensor Networks ,311
Eunchan Kim, Sangho Lee, Chungsan Kim, andKiseon Kim
Localization with a Mobile Beacon in Underwater Sensor Networks .316
Sangho Lee and Kiseon Kim
Communication in a Behavior-based Approach to Target Detection
and Tracking with Autonomous Underwater Vehicles ,320
Laura Sorbi, Laura Toni, Graziano Pio De Capua, andLorenzo Rossi
UUWSN - 3: Communication and Implementation
Experimental Results of Single Carrier Digital Modulation for Underwater
Sensor Networks 326
Se-young Kim, Jeong-woo Han, Ki-man Kim, Sang-hoon Baek, Hyung-chul Kim,
and Chang-hwa Kim
Robot Control Using an Underwater Acoustic Modem 331
Jun-Ho Jeon, Chang-Gi Hong, Sung-Joon Park, Changhwa Kim, and Sangkyung Kim
A Study on the Underwater Acoustic Communication with Direct Sequence
Spread Spectrum 337
Se-youngKim, Ki-man Kim, Won-seok Choi, Min-jae Kim, Seung-yong Chun,
and Kwon Son
The International Workshop on Constructing Software for Internet of Things (CSIOT2010)
CSIOT - 1: Software Design for Internet of Things
Semantic Device Bus for Internet of Things 341
Kun Yang, Shijian Li, Li Zhang, and Gang Pan
IOT Gateway: BridgingWireless Sensor Networks into Internet ofThings 347
Qian Zhu, Ruicong Wang, Qi Chen, Yan Liu, and Weijun Qin
Spatio-Temporal Events in the Internet of Things 353
Beihong Jin and Haibiao Chen
Implementation of Cloud Computing Environment for Discrete Event System
Simulation using Service Oriented Architecture 359
Chungman Seo, Yovngshin Han, Haeyoung Lee, Jason J. Jung, and Chilgee Lee
UbiCloud: A Cloud Computing System for Ubiquitous Terminals Based
on End User Virtualization 363
Yuanfei Chen, Zhenmin Zhu, Yi Zeng, andZhe He
The 3rd International Workshop on Sensor Networks and Ambient Intelligence (SeNAmI2010)
SeNAmI -1: Communication and Energy Consumption
Repair Policies of Coverage Holes Based Dynamic Node Activation
in Wireless Sensor Networks 368
Xiao-Heng Deng, Chu-Gui Xu, Fu-Yao Zhao, and Yi Liu
A Method for Dimensioning Micro-Scale Solar Energy Harvesting Systems
Based on Energy Level Simulations 372
Sebastian Bader, Torsten Schokel, andBengt Oelmann
Online Personal Connection Presentation System for Communication
Assistance 380
Ryota Ayaki, Hideki Shimada, andKenya Sato
SeNAml - 2: Context-aware Design
A Light Reasoning Infrastructure to Enable Context-aware Mobile
Applications 386
Josue Iglesias, Ana M. Bernardos, Alejandro Alvarez, and Marcos Sacristan
Context Awareness Aims at Novel Fruition Models: Augmented Reality May
be the Killer Application for Context Awareness 392
Claudio Vemezia andMarco Marengo
When Ambient Intelligence Meets Internet Protocol Stack: User Layer Design .397
Yu Lu, Mehul Motani, and Wai-Choong Wong
SeNAml - 3: Cluster and Ambient Intelligence
An Efficient Clustering Algorithm Using Evolutionary HMM in Wireless
Sensor Networks 403
Rouhollah Goudarzi, Behrouz Jedari, andMasoud Sabaei
Two-Tier Cluster Based Routing Protocol for Wireless Sensor Networks 410
AsifU. Khattak, Ghalib A. Shah, and M. Ahsan
Ambient Intelligence, Smart Objects and Sensor Networks: Practical
Experiences 416
Elisabetta Farella
The 3rd International Workshop on Wireless Network Algorithm and Theory (WiNA
2010)
WiNA -1: Secured and Efficient Sensor Networks
A Deterministic Key Management Scheme for Securing Cluster-Based
Sensors Networks 422
Mandicou Ba, Ibrahima Niang, Bamba Gueye, and Thomas Noel
A Fast Heuristic for Solving the D1EC Coloring Problem 428
Fabio Campoccia and Vincenzo Mancuso
Energy Balanced Routing Strategy in Wireless Sensor Networks 436
Xiaoguang Zhang and Zheng Da Wu
WiNA - 2: Interference, Coverage and Power Control
Interference Minimization in Wireless Networks 444
Hakob Aslanyan andJose Rolim
Avoidance of Blind Period for Node Coverage Grouping on Wireless Sensor
Networks 450
Chow-Sing Lin and Chih-Chung Chen
Predictive Power Control for Mobile Wireless Networks with Time-Varying
Delay 456
Cunwu Han, Dehui Sun, Zhijun Li, and Mingyue Zhao
The International Workshop on Challenged Network Architecture (ICNA 2010)
ICNA10-1: Mobility and Routing
RWPAD: A Mobility Model for DTN Routing Performance Evaluation 460
Yong Wang, Wei Peng, Xilong Mao, and Zhenghu Gong
Uncertainty Reasoning on Fuzziness and Randomness in Challenged Networks 466
YangLi, Jing Wang, Yaowen Yuan, Xiumei Fan, and Qian He
Spray and Routing for Message Delivery in Challenged Networks 472
Wanrong Yu, Chunqing Wu, andXiaofeng Hu
International Symposium on Trusted Computing and Communications (TRUSTCOM2010)
Trust Management and Evaluation
M-Trust: A Trust Management Scheme for Mobile P2P Networks 476
Basit Qureshi, Geyong Mm, and Demetres Kouvatsos
A Dynamic Trust Establishment and Management Framework for Wireless
Sensor Networks 484
Junqi Zhang, Rajan Shankaran, MehmelA. Orgun, Vijay Varadharajan, andAbdul Sattar
Trusted Risk Evaluation and Attribute Analysis in Ad-Hoc Networks Security
Mechanism based on Projection Pursuit Principal Component Analysis 492
Jihang Ye, Mengyao Liu, and Cai Fu
Trust Management in Wireless Mobile Networks with Cooperative
Communications 498
Reyhaneh Changiz, Hassan Halabian, F. Richard Yu, loannis Lambadaris, andHelen Tang
CredibilityRank: A Framework for the Design and Evaluation ofRank-based
Credibility Models for Web Applications 504
Sara Guimaraes, Arlei Silva, Wagner Meira Jr., andAdriano Pereira
Node Trust Assessment in Mobile Ad Hoc Networks Based
on Multi-dimensional Fuzzy Decision Making 511
Zhang Feng, Jia Zhi-ping, LiXin, andXiaHui
The Deficit and Dynamics ofTrust 517
Abhaya C. Nayak
Attack Detection
On the Security of Non-Linear HB (NLHB) Protocol against Passive Attack 523
MohammadReza Sohizadeh Abyaneh
Detecting Security Attacks in Trusted Virtual Domains 529
Udaya Kiran Tupakula and Vijay Varadharajan
PDVDS: A Pattern-Driven Software Vulnerability Detection System 536
Shaoyin Cheng, Jinding Wang, Jiajie Wang, Jun Yang, and Fan Jiang
Detection and Prevention ofRouting Intrusions in Mobile Ad Hoc Networks 542
Pradeep Moradiya andSrinivas Sarnpalli
Monitoring Library Function-based Intrusion Prevention System
with Continuing Execution Mechanism 548
Yudai Kato, Yuji Makimoto, Hironori Shirai, Hiromi Shimizu, Ynsuke Furuya,
Shoichi Saito, and Hiroshi Matsuo
On the Sender Cover Traffic Countermeasure against an Improved Statistical
Disclosure Attack 555
Rajiv Bagai, Huabo Lu, andBin Tang
Passive Worm and Malware Detection in Peer-to-Peer Networks 561
Sahar Fahimian, Amirvala Movahed, and Mehdi Khairazi
Authentication and Digital Signature
Combined Authentication and Quality of Service in Cooperative
Communication Networks 566
Ramya Ramamoorthy, F. Richard Yu, Helen Tang, andPeter Mason
Hierarchical Certificateless Signatures 572
Lei Zhang, Qianhong Wu, Josep Domingo-Ferrer, andBo Qin
A Novel Secure Bilinear Pairing Based Remote User Authentication Scheme
with Smart Card 578
Majid Bayat, Mohammad Sabzinejad, andAmirvala Movahed
Efficient RPTD Authentication Scheme for Supply Chain Applications 583
Fei Bi and Yi Mu
Trust-Based Authentication for Secure Communication in Cognitive Radio
Networks 589
Sazia Parvin, Song Han, Biming Tian, and Farookh Kadeer Hussain
Cryptography and Security Protocols
A Scalable Encryption Scheme for Multi-Privileged Group Communications 597
Qiushuang Du, Guojun Wang, and Qin Liu
Side-Channel Resistance Evaluation of a Neural Network Based Lightweight
Cryptography Scheme 603
Marc Stottinger, Sarin A. Huss, Sascha Miihlbach, andAndreas Koch
Security of the TCG Privacy-CA Solution 609
Liqun Chen and Bogdan Warinschi
A Key Management Protocol for Multiphase Hierarchical Wireless Sensor
Networks 617
Biming Tian, Song Han, Sazia Parvin, and Tharam S. Dillon
Designing Security Protocols Adapted to the Constraints of Mobile
Environments 624
M. Kamel, K. Boudaoud, S. Lequeux, and M. Riveill
Extending a Key-Chain Based Certified Email Protocol with Transparent TTP 630
Zhiyuan Liu, Jun Pang, and Chenyi Zhang
Modelling Smart Card Security Protocols in SystemC TLM 637
Aisha Bushager and Mark Zwolinski
Trusted Services and Applications
Secret Key Generation Rate vs. Reconciliation Cost Using Wireless Channel
Characteristics in Body Area Networks 644
Syed Taha AH, Vijay Sivaraman, and Diethelm Ostry
A Secure Self-Destructing Scheme for Electronic Data 651
Fengshun Yue, Guojun Wang, and Qin Liu
Modeling and Robust Control for Trusted Web Server 659
Bing Du and Chun Ruan
Trusted Routing for Resource-Constrained Wireless Sensor Networks 666
KhaledDaabaj, Mike Dixon, Terry Koziniec, andKevin Lee
Secure Mobile Business Information Processing 672
Nicolai Kuntze, RolandRieke, Giinther Diederich, Richard Sethmann, Karsten Sohr,
Tanveer Mustafa, and Kai-Oliver Detken
Simulator Problem in User Centric Smart Card Ownership Model 679
Raja Naeem Akram, Konstantinos Markanlonakis, and Keith Mayes
Phase Characterization and Classification for Micro-architecture Soft Error 687
Yu Cheng, Anguo Ma, Yiaing Tang, and Minxuan Zhang
Trusted Network Computing
An Access Control Architecture for Distributing Trust in Pervasive Computing
Environments 695
Raquel Hill, JalalAl-Muhtadi, and William E. Byrd
Formal Trust Specification in Service Workflows 703
Wattana Viriyasitavat andAndrew Martin
Capability-Role-Based Delegation in Workflow Systems 711
Koji Hasebe and Mitsuhiro Mabuchi
SimTrust: A New Method of Trust Network Generation 718
TouhidBhuiyan, YueXu, andAudim Jesang
Above the Trust and Security in Cloud Computing: A Notion Towards
Innovation 723
Mahbub Ahmed, YangXiang, andShawkat All
Probabilistic Analysis on Mesh Network Fault Tolerance: Deterministic
vs. Stochastic 731
Gaocai Wang, Taoshen Li, and Jianer Chen
Trust in Mobile and Wireless Networks
S-Kcore: A Social-aware Kcore Decomposition Algorithm in Pocket Switched
Networks 737
Ming Li, Longxiang Gao, and Wanlei Zhou
Key Sharing in Hierarchical Wireless Sensor Networks 743
Ya-nanLiu, Jian Wang, HeDu, and Liang Zhang
The Cost ofAltruistic Punishment in Indirect Reciprocity-based Cooperation
in Mobile Ad Hoc Networks 749
Marcin Seredynski andPascalBouvry
TARo: Trusted Anonymous Routing for MANETs 756
Jiefeng (Terence) Chen, Roksana Boreli, and Vijay Sivaraman
A Routing Algorithm Based on Trustworthy Core Tree for WSN 763
Jiang-tao Wang, Li-miao Li, and Zhi-gang Chen
Security Protection and Reliability
Defending Malicious Collision Attacks in Wireless Sensor Networks 771
Phillip Reindl, Kendall Nygard, andXiaojiang Du
Automated Software Protection through Program Extemalization
on Memory-Limited Secure Devices 777
Serge Chaumetle, Olivier Ly, andRenaud Tabary
Guess and Determine Attack on Trivium Family 785
Neda Rohani, Zainab Noferesti, JavadMohajeri, and MohmmadReza Aref
Isolating System Faults on Vehicular Network Gateways Using Virtualization 791
Sung-Moon Chung andHyun-Wook Jin
A Fault-tolerant Architecture with Error Correcting Code for
the Instruction-level Temporal Redundancy 797
Chao Yan, Hongjun Dai, Tianzhou Chen, andMeikang Qiu
Trust Model, Platform and Framework
A Cloud Architecture of Virtual Trusted Platform Modules 804
Dongxi Liu, Jack Lee, Julian Jang, Surya Nepal, andJohn Zic
Trusted Computing Platform in Your Pocket 812
Surya Nepal, John Zic, Dongxi Liu, and Julian Jang
A Distributed Trust Model for Securing Mobile Ad Hoc Networks 818
Pushpita Chatlerjee, Indranil Sengupta, andS.K. Ghosh
OST: A Transaction Based Online Social Trust Model for Social Network
and File Sharing Security 826
Ming Li, Bonti Alessio, and Wanlei Zhou
Analysis ofProperty Based Attestation in Trusted Platforms 833
Aarthi Nagarajan, Vijay Varadharajan, and Michael Hitchens
PBTrust: A Priority-Based Trust Model for Service Selection in General
Service-Oriented Environments 841
Xing Su, Minjie Zhang, Yi Mu, andKwang Mong Sim
Author Index 849