52 research outputs found

    BARI+: A Biometric Based Distributed Key Management Approach for Wireless Body Area Networks

    Get PDF
    Wireless body area networks (WBAN) consist of resource constrained sensing devices just like other wireless sensor networks (WSN). However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain

    Technologies that assess the location of physical activity and sedentary behavior: a systematic review

    Get PDF
    Background: The location in which physical activity and sedentary behavior are performed can provide valuable behavioral information, both in isolation and synergistically with other areas of physical activity and sedentary behavior research. Global positioning systems (GPS) have been used in physical activity research to identify outdoor location; however, while GPS can receive signals in certain indoor environments, it is not able to provide room- or subroom-level location. On average, adults spend a high proportion of their time indoors. A measure of indoor location would, therefore, provide valuable behavioral information. Objective: This systematic review sought to identify and critique technology which has been or could be used to assess the location of physical activity and sedentary behavior. Methods: To identify published research papers, four electronic databases were searched using key terms built around behavior, technology, and location. To be eligible for inclusion, papers were required to be published in English and describe a wearable or portable technology or device capable of measuring location. Searches were performed up to February 4, 2015. This was supplemented by backward and forward reference searching. In an attempt to include novel devices which may not yet have made their way into the published research, searches were also performed using three Internet search engines. Specialized software was used to download search results and thus mitigate the potential pitfalls of changing search algorithms. Results: A total of 188 research papers met the inclusion criteria. Global positioning systems were the most widely used location technology in the published research, followed by wearable cameras, and radio-frequency identification. Internet search engines identified 81 global positioning systems, 35 real-time locating systems, and 21 wearable cameras. Real-time locating systems determine the indoor location of a wearable tag via the known location of reference nodes. Although the type of reference node and location determination method varies between manufacturers, Wi-Fi appears to be the most popular method. Conclusions: The addition of location information to existing measures of physical activity and sedentary behavior will provide important behavioral information

    Context representation for context-aware mobile multimedia content recommendation

    Get PDF
    Very few of the current solutions for content recommendation take into consideration the context of usage when analyzing the preferences of the user and issuing recommendations. Nonetheless, context can be extremely useful to help identify appropriate content for the specific situation or activity the user is in, while consuming the content. In this paper, we present a solution to allow content-based recommendation systems to take full potential of contextual data, by defining a standards-based representation model which accounts for possible relationships among low-level contexts. The MPEG-7 and MPEG-21 standards are used for content description and low-level context representation. OWL/RDF ontologies are used to capture contextual concepts and, together with SWRL to establish relationships and perform reasoning to derive high-level concepts the way humans do. This knowledge is then used to drive the recommendation and content adaptation processes. As a side achievement, an extension to the MPEG-21 specification was developed to accommodate the description of user activities, which we believe have a great impact on the type of content to be recommended

    On Analyzing User Location Discovery Methods in Smart Homes: A Taxonomy and Survey

    Get PDF
    User Location Discovery (ULD) is a key issue in smart home ecosystems, as it plays a critical role in many applications. If a smart home management system cannot detect the actual location of the users, the desired applications may not be able to work successfully. This article proposes a new taxonomy with a broad coverage of ULD methods in terms of user satisfaction and technical features. In addition, we provide a state-of-the-art survey of ULD methods and apply our taxonomy to map these methods. Mapping contributes to gap analysis for existing ULDs and also validates the applicability and accuracy of the taxonomy. Using this systematic approach, the features and characteristics of the current ULD methods are identified (i.e., equipment and algorithms). Next, the weaknesses and advantages of these methods are analyzed utilizing ten important evaluation metrics. Although we mainly focus on smart homes, the results of this article can be generalized to other spaces such as smart offices and eHealth environments

    Context Aware Middleware Architectures: Survey and Challenges

    Get PDF
    Abstract: Context aware applications, which can adapt their behaviors to changing environments, are attracting more and more attention. To simplify the complexity of developing applications, context aware middleware, which introduces context awareness into the traditional middleware, is highlighted to provide a homogeneous interface involving generic context management solutions. This paper provides a survey of state-of-the-art context aware middleware architectures proposed during the period from 2009 through 2015. First, a preliminary background, such as the principles of context, context awareness, context modelling, and context reasoning, is provided for a comprehensive understanding of context aware middleware. On this basis, an overview of eleven carefully selected middleware architectures is presented and their main features explained. Then, thorough comparisons and analysis of the presented middleware architectures are performed based on technical parameters including architectural style, context abstraction, context reasoning, scalability, fault tolerance, interoperability, service discovery, storage, security & privacy, context awareness level, and cloud-based big data analytics. The analysis shows that there is actually no context aware middleware architecture that complies with all requirements. Finally, challenges are pointed out as open issues for future work

    Exploring language contact and use among globally mobile populations: a qualitative study of English-speaking short-stay academic sojourners in the Republic of Korea

    Get PDF
    This study explores the language contact and use of English speaking sojourners in the Republic of Korea who had no prior knowledge of Korean language or culture prior to arriving in the country. The study focuses on the use of mobile technology assisted l anguage use. Study participants responded to an online survey about their experiences using the Korean language when interacting with Korean speakers, their free time activities, and the types of digital and mobile technologies they used. The survey respon ses informed questions for later discussion groups, in which participants discussed challenges and solutions when encountering new linguistic and social scenarios with Korean speakers. Semi structured interviews were employed to examine the linguistic, soc ial and technological dimensions of the study participants’ brief sojourn in Korea in more depth. The interviews revealed a link between language contact, language use and a mobile instant messaging application. In the second phase of the study, online surveys focused on the language and technology link discovered in the first phase. Throughout Phase Two , the researcher observed the study participants in a series of social contexts, such as informal English practice and university events. Phase Two concluded with semi structured interviews that demonstrated language contact and use within mobile instant messaging chat rooms on participants’ handheld smart devices. The two phases revealed three key factors influencing the language contact and use between the study participants and Korean speakers. Firstly, a mutual perspicacity for mobile technologies and digital communication supported their mediated, screen to screen and blended direct and mediated face to screen interactions. Secondly, Korea’s advanced digital environment comprised handheld smart devices, smart device applications and ubiquitous, high speed Wi Fi their Korean speaking hosts to self reliance. Thirdly, language use between the study participants and Korean speakers incorporated a range of sociolinguistic resources including the exchange of symbols, small expressive images, photographs, video and audio recordings along with or in place of typed text. Using these resources also helped the study participants learn and take part in social and cultural practices, such as gifting digitally, within mobile instant messaging chat rooms. The findings of the study are drawn together in a new conceptual model which h as been called sociolinguistic digital acuity , highlighting the optimal conditions for language contact and use during a brief sojourn in a country with an unfamiliar language and culture

    A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations

    Get PDF
    We put forward a fragile zero watermarking scheme to detect and characterize malicious modifications made to a database relation. Most of the existing watermarking schemes for relational databases introduce intentional errors or permanent distortions as marks into the database original content. These distortions inevitably degrade the data quality and data usability as the integrity of a relational database is violated. Moreover, these fragile schemes can detect malicious data modifications but do not characterize the tempering attack, that is, the nature of tempering. The proposed fragile scheme is based on zero watermarking approach to detect malicious modifications made to a database relation. In zero watermarking, the watermark is generated (constructed) from the contents of the original data rather than introduction of permanent distortions as marks into the data. As a result, the proposed scheme is distortion-free; thus, it also resolves the inherent conflict between security and imperceptibility. The proposed scheme also characterizes the malicious data modifications to quantify the nature of tempering attacks. Experimental results show that even minor malicious modifications made to a database relation can be detected and characterized successfully

    Location Based Indoor and Outdoor Lightweight Activity Recognition System

    Get PDF
    In intelligent environments one of the most relevant information that can be gathered about users is their location. Their position can be easily captured without the need for a large infrastructure through devices such as smartphones or smartwatches that we easily carry around in our daily life, providing new opportunities and services in the field of pervasive computing and sensing. Location data can be very useful to infer additional information in some cases such as elderly or sick care, where inferring additional information such as the activities or types of activities they perform can provide daily indicators about their behavior and habits. To do so, we present a system able to infer user activities in indoor and outdoor environments using Global Positioning System (GPS) data together with open data sources such as OpenStreetMaps (OSM) to analyse the user’s daily activities, requiring a minimal infrastructure

    Activity Inference for Ambient Intelligence Through Handling Artifacts in a Healthcare Environment

    Get PDF
    Human activity inference is not a simple process due to distinct ways of performing it. Our proposal presents the SCAN framework for activity inference. SCAN is divided into three modules: (1) artifact recognition, (2) activity inference, and (3) activity representation, integrating three important elements of Ambient Intelligence (AmI) (artifact-behavior modeling, event interpretation and context extraction). The framework extends the roaming beat (RB) concept by obtaining the representation using three kinds of technologies for activity inference. The RB is based on both analysis and recognition from artifact behavior for activity inference. A practical case is shown in a nursing home where a system affording 91.35% effectiveness was implemented in situ. Three examples are shown using RB representation for activity representation. Framework description, RB description and CALog system overcome distinct problems such as the feasibility to implement AmI systems, and to show the feasibility for accomplishing the challenges related to activity recognition based on artifact recognition. We discuss how the use of RBs might positively impact the problems faced by designers and developers for recovering information in an easier manner and thus they can develop tools focused on the user

    Symmetry-Adapted Machine Learning for Information Security

    Get PDF
    Symmetry-adapted machine learning has shown encouraging ability to mitigate the security risks in information and communication technology (ICT) systems. It is a subset of artificial intelligence (AI) that relies on the principles of processing future events by learning past events or historical data. The autonomous nature of symmetry-adapted machine learning supports effective data processing and analysis for security detection in ICT systems without the interference of human authorities. Many industries are developing machine-learning-adapted solutions to support security for smart hardware, distributed computing, and the cloud. In our Special Issue book, we focus on the deployment of symmetry-adapted machine learning for information security in various application areas. This security approach can support effective methods to handle the dynamic nature of security attacks by extraction and analysis of data to identify hidden patterns of data. The main topics of this Issue include malware classification, an intrusion detection system, image watermarking, color image watermarking, battlefield target aggregation behavior recognition model, IP camera, Internet of Things (IoT) security, service function chain, indoor positioning system, and crypto-analysis
    • 

    corecore