13
2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC 2010) Hong Kong, China 11 - 13 December 2010 4 IEEE IEEE Catalog Number: CFP1047F-PRT ISBN: 978-1-4244-9719-5

UbiquitousComputing (EUC 2010) · 2011-06-07 · 2010IEEE/IFIP8thInternational ConferenceonEmbeddedand UbiquitousComputing (EUC2010) HongKong,China 11-13December2010 4IEEE IEEECatalogNumber:

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: UbiquitousComputing (EUC 2010) · 2011-06-07 · 2010IEEE/IFIP8thInternational ConferenceonEmbeddedand UbiquitousComputing (EUC2010) HongKong,China 11-13December2010 4IEEE IEEECatalogNumber:

2010 IEEE/IFIP 8th International

Conference on Embedded and

Ubiquitous Computing

(EUC 2010)

Hong Kong, China

11 - 13 December 2010

4 IEEE IEEE Catalog Number: CFP1047F-PRT

ISBN: 978-1-4244-9719-5

Page 2: UbiquitousComputing (EUC 2010) · 2011-06-07 · 2010IEEE/IFIP8thInternational ConferenceonEmbeddedand UbiquitousComputing (EUC2010) HongKong,China 11-13December2010 4IEEE IEEECatalogNumber:

2010IEEE/IFIP International

Conference on Embedded

and Ubiquitous Computing

EUC 2010

Table of Contents

Message from the EUC 2010 General Chairs xvii

Message from the EUC 2010 Program Chairs xviii

Message from the EUC 2010 Steering Committee Chairs xix

Message from the EUC 2010 Workshop/Symposium Chairs xx

EUC 2010 Organizing and Program Committees xxi

EUC 2010 Additional Reviewers xxviii

Message from the TrustCom 2010 Symposium Chairs xxix

Message from the UUWSN 2010 Workshop Chairs xxx

Message from the CSIOT 2010 Workshop Chairs xxxi

Message from the SeNAmI 2010 Workshop Chairs xxxii

Message from the WiNA 2010 Workshop Chairs xxxiii

Message from the ICNA 2010 Workshop Chairs xxxiv

TrustCom 2010 Organizing and Program Committees xxxv

UUWSN 2010 Organizing and Program Committees xxxvii

SeNAmI 2010 Organizing and Program Committees xxxviii

WiNA 2010 Organizing and Program Committees xxxix

ICNA 2010 Organizing and Program Committees xl

Keynotes xli

The 8th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing(EUC 2010)

Embedded Systems Software and Optimization

Schedule Swapping: A Technique for Temperature Management

ofDistributed Embedded Systems 1

Farzad Sarnie Ghahfarokhi andAlireza Ejlali

User-Level Network Protocol Stacks for Automotive Infotainment Systems 7

Mu-Youl Lee andHyun- WookJin

Page 3: UbiquitousComputing (EUC 2010) · 2011-06-07 · 2010IEEE/IFIP8thInternational ConferenceonEmbeddedand UbiquitousComputing (EUC2010) HongKong,China 11-13December2010 4IEEE IEEECatalogNumber:

Replay Debugging for Multi-threaded Embedded Software 15

Yann-Hang Lee, Young Wn Song, Rohit Girme, Sagar Zaveri, and Yan Chen

Real-time Enhancement for Xen Hypervisor 23

Peijie Yu, Mingyuan Xia, Qian Lin, Min Zhu, Shcmg Gao, Zhengwei Qi, Kai Chen,

and Haibing Gnan

Embedded Systems and Hardware/Software Co-Design

Optimized Schedule Synthesis under Real-Time Constraints for the Dynamic

Segment of FlexRay 31

Reinhard Schneider, Unmesh Bordoloi, Dip Goswami, andSamarjit Chakraborty

Optimizing Runtime Reconfiguration Decisions 39

Thilo Pionteck, Steffen Sammann, and Carsten Albrecht

Architectural Support for Reducing Parallel Processing Overhead in

an Embedded Multiprocessor 47

Jian Wang, Joar Sohl, and Dake Liu

Trading Conditional Execution for More Registers on ARM Processors 53

Huang-Jia Cheng, Yuan-Shin Hwang, Rong-Guey Chang, and Cheng-Wei Chen

An Environment for Design Software and Hardware Aspects ofClock

Synchronization and Communication in DRTES 60

Brahim Hamid andAdel Ziani

Implementation of a Floating Point Adder and Subtracter in NoGAP, A

Comparative Case Study 68

Per Karlstrdm, Wenbiao Zhou, andDake Liu

Co-Simulation of Self-Adaptive Automotive Embedded Systems 73

Marc Zeller, Gereon Weiss, Dirk Eilers, andRudiKnorr

Middleware for Ubiquitous and Autonomous Computing

Empirical Evaluation of Content-based Pub/Sub Systems over Cloud

Infrastructure 81

Biao Zhang, Beihong Jin, Haibiao Chen, and Ziyuan Qin

A Reflective Service Gateway for Integrating Evolvable Sensor-Actuator

Networks with Pervasive Infrastructure 89

Seong Hoon Kim, Daeyoung Kim, Jeong Seok Kang, and Hong Seong Park

Handling Mobility on a QoS-Aware Service-based Framework for Mobile

Systems 97

Joel Gongalves, Luis Lino Ferreira, Luis Miguel Pinho, and Guilherme Silva

Page 4: UbiquitousComputing (EUC 2010) · 2011-06-07 · 2010IEEE/IFIP8thInternational ConferenceonEmbeddedand UbiquitousComputing (EUC2010) HongKong,China 11-13December2010 4IEEE IEEECatalogNumber:

Trust Measurement Methods in Organic Computing Systems by Direct

Observation 105

RolfKiefJiaber, Benjamin Satzger, Julia Schmitt, MichaelRoth, and Theo Ungerer

Mobile and Context-aware Computing

GEDS: GPU Execution of Continuous Queries on Spatio-Temporal Data

Streams 112

Jonathan Cazalas and Ratan Guha

Rule-based Approach for Context Inconsistency Management Scheme

in Ubiquitous Computing 120

Yong-jae Lee, Jaehyoung Lim, Soon J. Hyun, andDongman Lee

Transferring Ontologies between Mobile Devices and Knowledge-Based

Systems 127

Xiang Su andJukka Riekki

Middleware Support for Context-awareness in Asynchronous Pervasive

Computing Environments 136

Jianping Yu, Yu Huang, Jiannong Cao, andXianping Tao

Cyber-Physical Systems and the Internet of Things

An Application Framework for Loosely Coupled Networked Cyber-Physical

Systems 144

Minyoung Kim, Mark-Oliver Stehr, Jinwoo Kim, andSoonhoi Ha

LocaToR: Locating Passive RFID Tags with the Relative Neighborhood

Graph 154

YiyangZhao, S.C. Cheung, andLionelM, Ni

An OSGi Based RFID Complex Event Processing System 162

Hou Weifeng, Hou Di, and Chen Juan

Power-Aware Computing

Real-Time Constrained Task Scheduling in 3D Chip Multiprocessor to Reduce

Peak Temperature 170

Jiayin Li, Meikang Qiu, Jianwei Niu, Tianzhou Chen, and Yongxin Zhu

Improving the Accuracy of Object Tracking in Three Dimensional WSNs

Using Bayesian Estimation Methods 177

Junzhao Du, Lei Mao, Hui Liu, Bo Wu, andDeke Guo

Power Management in Real Time Embedded Systems through Online

and Adaptive Interplay ofDPM and DVFS Policies 184

Khurram Bhatti, Cecile Belleudy, and Michel Auguin

Page 5: UbiquitousComputing (EUC 2010) · 2011-06-07 · 2010IEEE/IFIP8thInternational ConferenceonEmbeddedand UbiquitousComputing (EUC2010) HongKong,China 11-13December2010 4IEEE IEEECatalogNumber:

A Connection-assured Many-to-one Communication ofWireless Sensors

with Two Transmission Ranges 192

Wan Yeon Lee, Hyung Goo Paek, Jeong-Mo Yeo, and Kyong Hoon Kim

Sensor Networks

Partitioning Detection and Connectivity Restoration Algorithm for Wireless

Sensor and Actor Networks 200

MuhammadImran, Mohamad Younis, Abas Md. Said, andHalabi Hasbullah

Towards Precise Synchronisation in Wireless Sensor Networks 208

Lawrence Cheng, Stephen Hailes, andAlan Wilson

On Efficient Clock Drift Prediction Means and their Applicability to IEEE

802.15.4 216

Marcin Brzozowski, Hendrik Salomon, and Peter Langendoerfer

RISN: An Efficient, Dynamically Tasked and Interoperable Sensor Network

Overlay 224

Evens Jean, Robert T. Collins, Ali R. Hurson, Sahra Sedigh, and Yu Jiao

Efficient Data Delivery in Wireless Sensor Networks with Ubiquitous Mobile

Data Collectors 232

Weiwei Jiao, Long Cheng, Min Chen, Canfeng Chen, and Jian Ma

Virtual Brokers for Large-Scale Publish/Subscribe in Wireless Sensor

Networks 240

Yang Liu, Boon-Chong Seet, and Adnan Al-Anbuky

Multimedia and Data Management

Multi-resolution Next Location Prediction for Distributed Virtual

Environments 247

Jaroslav Pribyl andPavel Zemcik

Trick Play Function for VOD with SVC source 255

PengZhu, Hideya Yoshiuchi, and Satoshi Yoshizawa

OCO: A Multi-channel MAC Protocol with Opportunistic Cooperation

for Wireless Sensor Networks 260

Jinbao Li, Desheng Zhang, and Longjiang Guo

Video Streaming over Wireless Mesh Networks with Multi-Gateway Support 268

Huali Cui, Depei Qian, Xingjim Zhang, and Yi Liu

Page 6: UbiquitousComputing (EUC 2010) · 2011-06-07 · 2010IEEE/IFIP8thInternational ConferenceonEmbeddedand UbiquitousComputing (EUC2010) HongKong,China 11-13December2010 4IEEE IEEECatalogNumber:

Real-Time Systems and Wireless Mesh Networks

Hierarchical Real-Time Scheduling Framework for Imprecise Computations .273

Guy Martin Tchamgoue, Kyong Hoon Kim, Yong-Kee Jun, and Wan Yeon Lee

Preemption Control Using Frequency Scaling in Fixed Priority Scheduling. .281

Abhilash Thekkilakattil, Anju S. Pillai, Radu Dobrin, and Sasikumar Punnekkat

Hierarchical Cooperative Data Caching for Wireless Mesh Networks .289

Weigang Wu and Yifei Huang

The 8th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing(Workshops / Symposiums 2010)

UnderWater Acoustic Sensor Network 2010 (UUWSN 2010)

UUWSN -1: Architecture Design

Adaptive GTS Allocation Scheme based on IEEE 802.15.4 for Underwater

Acoustic Sensor Networks 297

Jung-Il Namgung, Soo-Young Shin, Nam-Yeol Yun, andSoo-Hyun Park

Design and Implementation of the Test-bed for Underwater Acoustic Sensor

Network Based on ARM9 Processor 302

Yung-Pyo Kim, Jung-Il Namgung, Nam-Yeol Yun, Hui-Jin Cho, Imtiaz Ahmed Khan,

and Soo-Hyun Park

The Architecture of Surface Gateway for Underwater Acoustic Sensor

Networks 307

Youngjun Jo, Jungyoungj Bae, Hyunjae Shin, Heungwoo Nam, Saeyoung Ahn,

and Sunshin An

UUWSN - 2: Tracking and Localization

Bearings-only Tracking Systems with Distributed Floating Beacons

in Underwater Sensor Networks ,311

Eunchan Kim, Sangho Lee, Chungsan Kim, andKiseon Kim

Localization with a Mobile Beacon in Underwater Sensor Networks .316

Sangho Lee and Kiseon Kim

Communication in a Behavior-based Approach to Target Detection

and Tracking with Autonomous Underwater Vehicles ,320

Laura Sorbi, Laura Toni, Graziano Pio De Capua, andLorenzo Rossi

Page 7: UbiquitousComputing (EUC 2010) · 2011-06-07 · 2010IEEE/IFIP8thInternational ConferenceonEmbeddedand UbiquitousComputing (EUC2010) HongKong,China 11-13December2010 4IEEE IEEECatalogNumber:

UUWSN - 3: Communication and Implementation

Experimental Results of Single Carrier Digital Modulation for Underwater

Sensor Networks 326

Se-young Kim, Jeong-woo Han, Ki-man Kim, Sang-hoon Baek, Hyung-chul Kim,

and Chang-hwa Kim

Robot Control Using an Underwater Acoustic Modem 331

Jun-Ho Jeon, Chang-Gi Hong, Sung-Joon Park, Changhwa Kim, and Sangkyung Kim

A Study on the Underwater Acoustic Communication with Direct Sequence

Spread Spectrum 337

Se-youngKim, Ki-man Kim, Won-seok Choi, Min-jae Kim, Seung-yong Chun,

and Kwon Son

The International Workshop on Constructing Software for Internet of Things (CSIOT2010)

CSIOT - 1: Software Design for Internet of Things

Semantic Device Bus for Internet of Things 341

Kun Yang, Shijian Li, Li Zhang, and Gang Pan

IOT Gateway: BridgingWireless Sensor Networks into Internet ofThings 347

Qian Zhu, Ruicong Wang, Qi Chen, Yan Liu, and Weijun Qin

Spatio-Temporal Events in the Internet of Things 353

Beihong Jin and Haibiao Chen

Implementation of Cloud Computing Environment for Discrete Event System

Simulation using Service Oriented Architecture 359

Chungman Seo, Yovngshin Han, Haeyoung Lee, Jason J. Jung, and Chilgee Lee

UbiCloud: A Cloud Computing System for Ubiquitous Terminals Based

on End User Virtualization 363

Yuanfei Chen, Zhenmin Zhu, Yi Zeng, andZhe He

The 3rd International Workshop on Sensor Networks and Ambient Intelligence (SeNAmI2010)

SeNAmI -1: Communication and Energy Consumption

Repair Policies of Coverage Holes Based Dynamic Node Activation

in Wireless Sensor Networks 368

Xiao-Heng Deng, Chu-Gui Xu, Fu-Yao Zhao, and Yi Liu

Page 8: UbiquitousComputing (EUC 2010) · 2011-06-07 · 2010IEEE/IFIP8thInternational ConferenceonEmbeddedand UbiquitousComputing (EUC2010) HongKong,China 11-13December2010 4IEEE IEEECatalogNumber:

A Method for Dimensioning Micro-Scale Solar Energy Harvesting Systems

Based on Energy Level Simulations 372

Sebastian Bader, Torsten Schokel, andBengt Oelmann

Online Personal Connection Presentation System for Communication

Assistance 380

Ryota Ayaki, Hideki Shimada, andKenya Sato

SeNAml - 2: Context-aware Design

A Light Reasoning Infrastructure to Enable Context-aware Mobile

Applications 386

Josue Iglesias, Ana M. Bernardos, Alejandro Alvarez, and Marcos Sacristan

Context Awareness Aims at Novel Fruition Models: Augmented Reality May

be the Killer Application for Context Awareness 392

Claudio Vemezia andMarco Marengo

When Ambient Intelligence Meets Internet Protocol Stack: User Layer Design .397

Yu Lu, Mehul Motani, and Wai-Choong Wong

SeNAml - 3: Cluster and Ambient Intelligence

An Efficient Clustering Algorithm Using Evolutionary HMM in Wireless

Sensor Networks 403

Rouhollah Goudarzi, Behrouz Jedari, andMasoud Sabaei

Two-Tier Cluster Based Routing Protocol for Wireless Sensor Networks 410

AsifU. Khattak, Ghalib A. Shah, and M. Ahsan

Ambient Intelligence, Smart Objects and Sensor Networks: Practical

Experiences 416

Elisabetta Farella

The 3rd International Workshop on Wireless Network Algorithm and Theory (WiNA

2010)

WiNA -1: Secured and Efficient Sensor Networks

A Deterministic Key Management Scheme for Securing Cluster-Based

Sensors Networks 422

Mandicou Ba, Ibrahima Niang, Bamba Gueye, and Thomas Noel

A Fast Heuristic for Solving the D1EC Coloring Problem 428

Fabio Campoccia and Vincenzo Mancuso

Energy Balanced Routing Strategy in Wireless Sensor Networks 436

Xiaoguang Zhang and Zheng Da Wu

Page 9: UbiquitousComputing (EUC 2010) · 2011-06-07 · 2010IEEE/IFIP8thInternational ConferenceonEmbeddedand UbiquitousComputing (EUC2010) HongKong,China 11-13December2010 4IEEE IEEECatalogNumber:

WiNA - 2: Interference, Coverage and Power Control

Interference Minimization in Wireless Networks 444

Hakob Aslanyan andJose Rolim

Avoidance of Blind Period for Node Coverage Grouping on Wireless Sensor

Networks 450

Chow-Sing Lin and Chih-Chung Chen

Predictive Power Control for Mobile Wireless Networks with Time-Varying

Delay 456

Cunwu Han, Dehui Sun, Zhijun Li, and Mingyue Zhao

The International Workshop on Challenged Network Architecture (ICNA 2010)

ICNA10-1: Mobility and Routing

RWPAD: A Mobility Model for DTN Routing Performance Evaluation 460

Yong Wang, Wei Peng, Xilong Mao, and Zhenghu Gong

Uncertainty Reasoning on Fuzziness and Randomness in Challenged Networks 466

YangLi, Jing Wang, Yaowen Yuan, Xiumei Fan, and Qian He

Spray and Routing for Message Delivery in Challenged Networks 472

Wanrong Yu, Chunqing Wu, andXiaofeng Hu

International Symposium on Trusted Computing and Communications (TRUSTCOM2010)

Trust Management and Evaluation

M-Trust: A Trust Management Scheme for Mobile P2P Networks 476

Basit Qureshi, Geyong Mm, and Demetres Kouvatsos

A Dynamic Trust Establishment and Management Framework for Wireless

Sensor Networks 484

Junqi Zhang, Rajan Shankaran, MehmelA. Orgun, Vijay Varadharajan, andAbdul Sattar

Trusted Risk Evaluation and Attribute Analysis in Ad-Hoc Networks Security

Mechanism based on Projection Pursuit Principal Component Analysis 492

Jihang Ye, Mengyao Liu, and Cai Fu

Trust Management in Wireless Mobile Networks with Cooperative

Communications 498

Reyhaneh Changiz, Hassan Halabian, F. Richard Yu, loannis Lambadaris, andHelen Tang

CredibilityRank: A Framework for the Design and Evaluation ofRank-based

Credibility Models for Web Applications 504

Sara Guimaraes, Arlei Silva, Wagner Meira Jr., andAdriano Pereira

Page 10: UbiquitousComputing (EUC 2010) · 2011-06-07 · 2010IEEE/IFIP8thInternational ConferenceonEmbeddedand UbiquitousComputing (EUC2010) HongKong,China 11-13December2010 4IEEE IEEECatalogNumber:

Node Trust Assessment in Mobile Ad Hoc Networks Based

on Multi-dimensional Fuzzy Decision Making 511

Zhang Feng, Jia Zhi-ping, LiXin, andXiaHui

The Deficit and Dynamics ofTrust 517

Abhaya C. Nayak

Attack Detection

On the Security of Non-Linear HB (NLHB) Protocol against Passive Attack 523

MohammadReza Sohizadeh Abyaneh

Detecting Security Attacks in Trusted Virtual Domains 529

Udaya Kiran Tupakula and Vijay Varadharajan

PDVDS: A Pattern-Driven Software Vulnerability Detection System 536

Shaoyin Cheng, Jinding Wang, Jiajie Wang, Jun Yang, and Fan Jiang

Detection and Prevention ofRouting Intrusions in Mobile Ad Hoc Networks 542

Pradeep Moradiya andSrinivas Sarnpalli

Monitoring Library Function-based Intrusion Prevention System

with Continuing Execution Mechanism 548

Yudai Kato, Yuji Makimoto, Hironori Shirai, Hiromi Shimizu, Ynsuke Furuya,

Shoichi Saito, and Hiroshi Matsuo

On the Sender Cover Traffic Countermeasure against an Improved Statistical

Disclosure Attack 555

Rajiv Bagai, Huabo Lu, andBin Tang

Passive Worm and Malware Detection in Peer-to-Peer Networks 561

Sahar Fahimian, Amirvala Movahed, and Mehdi Khairazi

Authentication and Digital Signature

Combined Authentication and Quality of Service in Cooperative

Communication Networks 566

Ramya Ramamoorthy, F. Richard Yu, Helen Tang, andPeter Mason

Hierarchical Certificateless Signatures 572

Lei Zhang, Qianhong Wu, Josep Domingo-Ferrer, andBo Qin

A Novel Secure Bilinear Pairing Based Remote User Authentication Scheme

with Smart Card 578

Majid Bayat, Mohammad Sabzinejad, andAmirvala Movahed

Efficient RPTD Authentication Scheme for Supply Chain Applications 583

Fei Bi and Yi Mu

Page 11: UbiquitousComputing (EUC 2010) · 2011-06-07 · 2010IEEE/IFIP8thInternational ConferenceonEmbeddedand UbiquitousComputing (EUC2010) HongKong,China 11-13December2010 4IEEE IEEECatalogNumber:

Trust-Based Authentication for Secure Communication in Cognitive Radio

Networks 589

Sazia Parvin, Song Han, Biming Tian, and Farookh Kadeer Hussain

Cryptography and Security Protocols

A Scalable Encryption Scheme for Multi-Privileged Group Communications 597

Qiushuang Du, Guojun Wang, and Qin Liu

Side-Channel Resistance Evaluation of a Neural Network Based Lightweight

Cryptography Scheme 603

Marc Stottinger, Sarin A. Huss, Sascha Miihlbach, andAndreas Koch

Security of the TCG Privacy-CA Solution 609

Liqun Chen and Bogdan Warinschi

A Key Management Protocol for Multiphase Hierarchical Wireless Sensor

Networks 617

Biming Tian, Song Han, Sazia Parvin, and Tharam S. Dillon

Designing Security Protocols Adapted to the Constraints of Mobile

Environments 624

M. Kamel, K. Boudaoud, S. Lequeux, and M. Riveill

Extending a Key-Chain Based Certified Email Protocol with Transparent TTP 630

Zhiyuan Liu, Jun Pang, and Chenyi Zhang

Modelling Smart Card Security Protocols in SystemC TLM 637

Aisha Bushager and Mark Zwolinski

Trusted Services and Applications

Secret Key Generation Rate vs. Reconciliation Cost Using Wireless Channel

Characteristics in Body Area Networks 644

Syed Taha AH, Vijay Sivaraman, and Diethelm Ostry

A Secure Self-Destructing Scheme for Electronic Data 651

Fengshun Yue, Guojun Wang, and Qin Liu

Modeling and Robust Control for Trusted Web Server 659

Bing Du and Chun Ruan

Trusted Routing for Resource-Constrained Wireless Sensor Networks 666

KhaledDaabaj, Mike Dixon, Terry Koziniec, andKevin Lee

Secure Mobile Business Information Processing 672

Nicolai Kuntze, RolandRieke, Giinther Diederich, Richard Sethmann, Karsten Sohr,

Tanveer Mustafa, and Kai-Oliver Detken

Simulator Problem in User Centric Smart Card Ownership Model 679

Raja Naeem Akram, Konstantinos Markanlonakis, and Keith Mayes

Page 12: UbiquitousComputing (EUC 2010) · 2011-06-07 · 2010IEEE/IFIP8thInternational ConferenceonEmbeddedand UbiquitousComputing (EUC2010) HongKong,China 11-13December2010 4IEEE IEEECatalogNumber:

Phase Characterization and Classification for Micro-architecture Soft Error 687

Yu Cheng, Anguo Ma, Yiaing Tang, and Minxuan Zhang

Trusted Network Computing

An Access Control Architecture for Distributing Trust in Pervasive Computing

Environments 695

Raquel Hill, JalalAl-Muhtadi, and William E. Byrd

Formal Trust Specification in Service Workflows 703

Wattana Viriyasitavat andAndrew Martin

Capability-Role-Based Delegation in Workflow Systems 711

Koji Hasebe and Mitsuhiro Mabuchi

SimTrust: A New Method of Trust Network Generation 718

TouhidBhuiyan, YueXu, andAudim Jesang

Above the Trust and Security in Cloud Computing: A Notion Towards

Innovation 723

Mahbub Ahmed, YangXiang, andShawkat All

Probabilistic Analysis on Mesh Network Fault Tolerance: Deterministic

vs. Stochastic 731

Gaocai Wang, Taoshen Li, and Jianer Chen

Trust in Mobile and Wireless Networks

S-Kcore: A Social-aware Kcore Decomposition Algorithm in Pocket Switched

Networks 737

Ming Li, Longxiang Gao, and Wanlei Zhou

Key Sharing in Hierarchical Wireless Sensor Networks 743

Ya-nanLiu, Jian Wang, HeDu, and Liang Zhang

The Cost ofAltruistic Punishment in Indirect Reciprocity-based Cooperation

in Mobile Ad Hoc Networks 749

Marcin Seredynski andPascalBouvry

TARo: Trusted Anonymous Routing for MANETs 756

Jiefeng (Terence) Chen, Roksana Boreli, and Vijay Sivaraman

A Routing Algorithm Based on Trustworthy Core Tree for WSN 763

Jiang-tao Wang, Li-miao Li, and Zhi-gang Chen

Page 13: UbiquitousComputing (EUC 2010) · 2011-06-07 · 2010IEEE/IFIP8thInternational ConferenceonEmbeddedand UbiquitousComputing (EUC2010) HongKong,China 11-13December2010 4IEEE IEEECatalogNumber:

Security Protection and Reliability

Defending Malicious Collision Attacks in Wireless Sensor Networks 771

Phillip Reindl, Kendall Nygard, andXiaojiang Du

Automated Software Protection through Program Extemalization

on Memory-Limited Secure Devices 777

Serge Chaumetle, Olivier Ly, andRenaud Tabary

Guess and Determine Attack on Trivium Family 785

Neda Rohani, Zainab Noferesti, JavadMohajeri, and MohmmadReza Aref

Isolating System Faults on Vehicular Network Gateways Using Virtualization 791

Sung-Moon Chung andHyun-Wook Jin

A Fault-tolerant Architecture with Error Correcting Code for

the Instruction-level Temporal Redundancy 797

Chao Yan, Hongjun Dai, Tianzhou Chen, andMeikang Qiu

Trust Model, Platform and Framework

A Cloud Architecture of Virtual Trusted Platform Modules 804

Dongxi Liu, Jack Lee, Julian Jang, Surya Nepal, andJohn Zic

Trusted Computing Platform in Your Pocket 812

Surya Nepal, John Zic, Dongxi Liu, and Julian Jang

A Distributed Trust Model for Securing Mobile Ad Hoc Networks 818

Pushpita Chatlerjee, Indranil Sengupta, andS.K. Ghosh

OST: A Transaction Based Online Social Trust Model for Social Network

and File Sharing Security 826

Ming Li, Bonti Alessio, and Wanlei Zhou

Analysis ofProperty Based Attestation in Trusted Platforms 833

Aarthi Nagarajan, Vijay Varadharajan, and Michael Hitchens

PBTrust: A Priority-Based Trust Model for Service Selection in General

Service-Oriented Environments 841

Xing Su, Minjie Zhang, Yi Mu, andKwang Mong Sim

Author Index 849