• Title/Summary/Keyword: pervasive

Search Result 413, Processing Time 0.021 seconds

Attacks on and Countermeasures for an RFID Mutual Authentication Scheme in Pervasive Computing Environment

  • Mohaisen, Abedelaziz;Chang, Ku-Young;Hong, Do-Won
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.9
    • /
    • pp.1684-1697
    • /
    • 2011
  • We show that two protocols for RFID mutual authentication in pervasive computing environments, recently proposed by Kang et al, are vulnerable to several attacks. First, we show these protocols do not preserve the privacy of users' location. Once a tag is authenticated successfully, we show several scenarios where legitimate or illegitimate readers can trace the location of that tag without any further information about the tag's identifier or initial private key. Second, since the communication between readers and the database takes place over an insecure communication channel and in the plaintext form, we show scenarios where a compromised tag can gain access to confidential information that the tag is not supposed get access to. Finally, we show that these protocols are also vulnerable to the replay and denial-of-service attacks. While some of these attacks are due to simple flaws and can be easily fixed, others are more fundamental and are due to relaxing widely accepted assumptions in the literature. We examine this issue, apply countermeasures, and re-evaluate the protocols overhead after taking these countermeasures into account and compare them to other work in the literature.

Study on mobile agents for the intrusion detection in pervasive computing environment (퍼베이시브 컴퓨팅 환경에서의 침입탐지용 모바일 에이전트에 대한 연구)

  • Oh, Byung-Jin;Um, Nam-Kyoung;Mun, Hyung-Jin;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.3
    • /
    • pp.231-237
    • /
    • 2006
  • Pervasive computing environment is similar to the meaning of ubiquitous computing, however it is a kind of the commercial product, which is made from the collaboration between NIST and IBM. On the basis of this environment, the research of mobile agents for intrusion detection is going on in progress. In this paper, we study the research about mobile agents for the intrusion detection and then suggest scenarios using moving mobile agents based on the multiple mobile agents in the intrusion detection. Subsequently, we could figure out the problems which occurred through progress of integrity movement as a matter of the intrusion detection.

  • PDF

PRELIMINARY STUDY OF BRAIN SPECT IN CHILDREN WITH PERVASIVE DEVELOPMENTAL DISORDER OR DEVELOPMENTAL LANGUAGE DISORDER (전반적발달장애 아동 및 발달성언어장애 아동의 뇌 단일광자방출전산화단층촬영 소견에 대한 예비연구)

  • Shin, Yee-Jin;Ryu, Young-Hoon;Yook, Ki-Hwan;Noh, Kyung S;Song, Dong-Ho;Lee, Ho-Bun
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.8 no.2
    • /
    • pp.256-265
    • /
    • 1997
  • Objectives:The purpose of this study was to investigate the characteristics and differences of brain function in pervasive developmental disorder and developmental language disorder. Method:The subjects were composed of 14 cases of pervasive developmental disorder and 13 cases developmental language disorder. They were investigated by technitium-99m-EDC SPECT. All SPECT were visually assessed by two nuclear medicine specialists, and then quantified by region of interest including temporal, parietal cortex, thalamus, basal ganglia and cerebellum. Result:In both groups, cerebral blood flow was decreased in the temporal, parietal cortex, basal ganglia, thalamus, cerebellum by visual assessment. There was no significant difference between the 2 groups by quantitative and qualitative assessment. Conclusion:These results suggest that pervasive developmental disorder and developmental language disorder are caused by defects in the interneural connection and that both disorders are spectrum disorders.

  • PDF

A Study of Pervasive Roaming Services with Security Management Framework (퍼베이시브 로밍 서비스를 위한 보안 관리 프레임워크)

  • Kim, Gwan-Yeon;Hwang, Zi-On;Kim, Yong;Uhm, Yoon-Sik;Park, Se-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.115-129
    • /
    • 2007
  • The ubiquitous and autonomic computing environments is open and dynamic providing the universal wireless access through seamless integration of software and system architectures. The ubiquitous computing have to offer the user-centric pervasive services according to the wireless access. Therefore the roaming services with the predefined security associations among all of the mobile devices in various networks is especially complex and difficult. Furthermore, there has been little study of security coordination for realistic autonomic system capable of authenticating users with different kinds of user interfaces, efficient context modeling with user profiles on Smart Cards, and providing pervasive access service by setting roaming agreements with a variety of wireless network operators. This paper proposes a Roaming Coordinator-based security management framework that supports the capability of interoperator roaming with the pervasive security services among the push service based network domains. Compared to traditional mobile systems in which a Universal Subscriber Identity Module(USIM) is dedicated to one service domain only, our proposed system with Roaming Coordinator is more open, secure, and easy to update for security services throughout the different network domains such as public wireless local area networks(PWLANs), 3G cellular networks and wireless metropolitan area networks(WMANs).

Implementation of sensor network based health care system for diabetes patient

  • Kim, Jeong-Won
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.4
    • /
    • pp.454-458
    • /
    • 2008
  • It can improve human being's life quality that all people can have more convenient medical service under pervasive computing environment. For a pervasive health care application for diabetes patient, we've implemented a health care system, which is composed of three parts. Various sensors monitor both outer and inner environment of human such as temperature, blood pressure, pulse, and glycemic index, etc. These sensors form zigbee based sensor network. And medical information server accumulates sensing values and performs back-end processing. To simply transfer these sensing values to a medical team is a low level's medical service. So, we've designed a new service model based on back propagation neural network for more improved medical service. Our experiments show that a proposed healthcare system can give high level's medical service because it can recognize human's context more concretely.

Development of Indoor Positioning System for Location-aware Services (위치인지 서비스를 위한 Indoor Positioning System 기술 개발)

  • Park, Woo-Chool;Lee, Hyung-Soo;Yoon, Myung-Hyun
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.286-288
    • /
    • 2005
  • If we are to realize the everyday benefits promised by pervasive computing and context-aware applications, we must first develop the infrastructure to provide contextual location and orientation information through pervasive computing elements. We have implement indoor positioning system to supply orientation information. We have used ultrasound in indoor positioning system for distance and orientation measurements, then propose a set of methods to calculate orientation from an array of well placed ultrasonic sensors operating in the indoor positioning system. We have design and implement a indoor positioning system using a combination of hardware and software and demonstrate end-to-end functionality of the system.

  • PDF

Identifying Unusual Days

  • Kim, Min-Kyong;Kotz, David
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.1
    • /
    • pp.71-84
    • /
    • 2011
  • Pervasive applications such as digital memories or patient monitors collect a vast amount of data. One key challenge in these systems is how to extract interesting or unusual information. Because users cannot anticipate their future interests in the data when the data is stored, it is hard to provide appropriate indexes. As location-tracking technologies, such as global positioning system, have become ubiquitous, digital cameras or other pervasive systems record location information along with the data. In this paper, we present an automatic approach to identify unusual data using location information. Given the location information, our system identifies unusual days, that is, days with unusual mobility patterns. We evaluated our detection system using a real wireless trace, collected at wireless access points, and demonstrated its capabilities. Using our system, we were able to identify days when mobility patterns changed and differentiate days when a user followed a regular pattern from the rest. We also discovered general mobility characteristics. For example, most users had one or more repeating mobility patterns, and repeating mobility patterns did not depend on certain days of the week, except that weekends were different from weekdays.

An U-Healthcare Implementation for Diabetes Patient based on Context Awareness

  • Kim, Jeong-Won
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.3
    • /
    • pp.412-417
    • /
    • 2009
  • With ubiquitous computing aid, it can improve human being's life quality if all people have more convenient medical service under pervasive computing environment. In this paper, for a pervasive health care application for diabetes patient, we've implemented a health care system, which is composed of three parts. Various sensors monitor both outer and inner environment of human such as temperature, blood pressure, pulse, and glycemic index, etc. These sensors form zigbee-based sensor network. And as a backend, medical information server accumulates sensing data and performs back-end processing. To simply transfer these sensing values to a medical team may be a low level's medical service. So, we've designed a model with context awareness for more improved medical service which is based on ART(adaptive resonance theory) neural network. Our experiments show that a proposed healthcare system can provide improved medical service because it can recognize current context of patient more concretely.

Training-Free Fuzzy Logic Based Human Activity Recognition

  • Kim, Eunju;Helal, Sumi
    • Journal of Information Processing Systems
    • /
    • v.10 no.3
    • /
    • pp.335-354
    • /
    • 2014
  • The accuracy of training-based activity recognition depends on the training procedure and the extent to which the training dataset comprehensively represents the activity and its varieties. Additionally, training incurs substantial cost and effort in the process of collecting training data. To address these limitations, we have developed a training-free activity recognition approach based on a fuzzy logic algorithm that utilizes a generic activity model and an associated activity semantic knowledge. The approach is validated through experimentation with real activity datasets. Results show that the fuzzy logic based algorithms exhibit comparable or better accuracy than other training-based approaches.

A Design of People-Centric Distress Broadcast Scheme Using Context-Aware Technology in Pervasive Systems (Pervasive System에서 Context-Aware 기술을 이용한 People-Centric Distress Broadcast 기법 설계)

  • Dofitas Jr., Cyreneo S.;Ra, In-Ho
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2013.05a
    • /
    • pp.51-52
    • /
    • 2013
  • Recent advances in WSN and the wide use of social sensing technologies have been changing our daily lives. In the process of creating intertwining connections and interconnections greatly influencing on the way we communicate with other people, WSN and social communication media have a number of important capabilities that support their utilization in distress broadcast during emergency situations. This paper proposes a system model that makes better utilization of WSN and social sensing capabilities in sending out distress messages to the intended recipients more efficiently and effectively.

  • PDF