Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. H...Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. Hardware implementations of the advanced encryption standard (AES) for authentication and encryption are presented. An energy consumption variable is derived to evaluate low-power design strategies for battery-powered devices. It proves that compact AES architectures fail to optimize the AES hardware energy, whereas reducing invalid switching activities and implementing power-optimized sub-modules are the reasonable methods. Implementations of different substitution box (S-Boxes) structures are presented with 0.25μm 1.8 V CMOS (complementary metal oxide semiconductor) standard cell library. The comparisons and trade-offs among area, security, and power are explored. The experimental results show that Galois field composite S-Boxes have smaller size and highest security but consume considerably more power, whereas decoder-switch-encoder S-Boxes have the best power characteristics with disadvantages in terms of size and security. The combination of these two type S-Boxes instead of homogeneous S-Boxes in AES circuit will lead to optimal schemes. The technique of latch-dividing data path is analyzed, and the quantitative simulation results demonstrate that this approach diminishes the glitches effectively at a very low hardware cost.展开更多
Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classific...Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classification requirements of identity authentication, the requirement of trust transfer and cross identity authentication, the bi-directional identity authentication, the security delegation and the simple privacy protection etc are all these unsolved problems. In this paper, a new novel ubiquitous computing identity authentication mechanism, named UCIAMdess, is presented. It is based on D-S Evidence Theory and extended SPKI/SDSI. D-S Evidence Theory is used in UCIAMdess to compute the trust value from the ubiquitous computing environment to the principal or between the different ubiquitous computing environments. SPKI-based authorization is expanded by adding the trust certificate in UCIAMdess to solve above problems in the ubiquitous computing environments. The identity authentication mechanism and the algorithm of certificate reduction are given in the paper to solve the multi-levels trust-correlative identity authentication problems. The performance analyses show that UCIAMdess is a suitable security mechanism in solving the complex ubiquitous computing problems.展开更多
Ubiquitous computing systems typically have lots of security problems in the area of identification supply by means of classical Public Key Infrastructure (PKI) methods. The limited computing resources, the disconne...Ubiquitous computing systems typically have lots of security problems in the area of identification supply by means of classical Public Key Infrastructure (PKI) methods. The limited computing resources, the disconnection network, the classification requirements of identification, the requirement of trust transfer and cross identification, the bidirectional identification, the security delegation and the privacy protection etc are all these unsolved problems. In this paper, UCIMssp, a new novel ubiquitous computing identification mechanism based on SPKI/SDSI and Peer-to-Peer (P2P) is presented. SPKI- based authorization is exploited in UCIMssp to solve the above problems in the smalbscale ubiquitous computing environment. The DHT and flooding technology of P2P overlay network over the Intemet is expanded to solve the routing search in the large-scale ubiquitous computing environment. The architecture of ubiquitous computing environment, the validation of identification requisition, the identification authorization processes and the identification supply processes etc of UCIMssp are described in the paper. The performance analysis shows that UCIMssp is a suitable security solution used in the large-scale ubiquitous computing environment.展开更多
To provide the right services or information to the right users, at the right time and in the right place in ubiquitous computing environment, an Indoor Ubiquitous Computing Environment based on Location-Awareness, IU...To provide the right services or information to the right users, at the right time and in the right place in ubiquitous computing environment, an Indoor Ubiquitous Computing Environment based on Location-Awareness, IUCELA, is presented in this paper. A general architecture of IUCELA is designed to connect multiple sensing devices with locationaware applications. Then the function of location-aware middleware which is the core componnet of the proposed architecture is elaborated. Finally an indoor forum is taken as an example scenario to demonstrate the security, usefulness, flexibiltity and robustness of IUCELA.展开更多
We are entering into a new era of enterprise computing that is characterized by an emphasis on broadband convergence, knowledge sharing, and calm services. Some people refer to this as the 'ubiquitous network'...We are entering into a new era of enterprise computing that is characterized by an emphasis on broadband convergence, knowledge sharing, and calm services. Some people refer to this as the 'ubiquitous network' business model because its focus is on a high degree of connectivity between a company and its customers, suppliers, and channel partners. Moreover, immediate access to ideas, goods, and services will be of greater value than the traditional model of permanent and ponderous possession. This paper illustrates how ubiquitous computing technology can be combined with legacy computer-based information systems, along with thoughts on relevant issues of ubiquitous commerce. We also propose a model for how to assess levels of ubiquitous computing services.展开更多
Lightweight ubiquitous computing security architecture was presented. Lots of our recent researches have been integrated in this architecture. And the main current researches in the related area have also been absorbe...Lightweight ubiquitous computing security architecture was presented. Lots of our recent researches have been integrated in this architecture. And the main current researches in the related area have also been absorbed. The main attention of this paper was providing a compact and realizable method to apply ubiquitous computing into our daily lives under sufficient secure guarantee. At last,the personal intelligent assistant system was presented to show that this architecture was a suitable and realizable security mechanism in solving the ubiquitous computing problems.展开更多
1 Introduction New technologies and other developments haye changedthe information seeking behaviors of the academic communityand the general public.Nowhere is this more evident than inthe exponential growth of the Wo...1 Introduction New technologies and other developments haye changedthe information seeking behaviors of the academic communityand the general public.Nowhere is this more evident than inthe exponential growth of the World Wide Web and cellularphone usage.Responding to these user needs and newtechnologies,libraries are moving from being InformationWarehouses to becoming Information Portals.Full-text。展开更多
In the Internet of Things(IoT)based system,the multi-level client’s requirements can be fulfilled by incorporating communication technologies with distributed homogeneous networks called ubiquitous computing systems(...In the Internet of Things(IoT)based system,the multi-level client’s requirements can be fulfilled by incorporating communication technologies with distributed homogeneous networks called ubiquitous computing systems(UCS).The UCS necessitates heterogeneity,management level,and data transmission for distributed users.Simultaneously,security remains a major issue in the IoT-driven UCS.Besides,energy-limited IoT devices need an effective clustering strategy for optimal energy utilization.The recent developments of explainable artificial intelligence(XAI)concepts can be employed to effectively design intrusion detection systems(IDS)for accomplishing security in UCS.In this view,this study designs a novel Blockchain with Explainable Artificial Intelligence Driven Intrusion Detection for IoT Driven Ubiquitous Computing System(BXAI-IDCUCS)model.The major intention of the BXAI-IDCUCS model is to accomplish energy efficacy and security in the IoT environment.The BXAI-IDCUCS model initially clusters the IoT nodes using an energy-aware duck swarm optimization(EADSO)algorithm to accomplish this.Besides,deep neural network(DNN)is employed for detecting and classifying intrusions in the IoT network.Lastly,blockchain technology is exploited for secure inter-cluster data transmission processes.To ensure the productive performance of the BXAI-IDCUCS model,a comprehensive experimentation study is applied,and the outcomes are assessed under different aspects.The comparison study emphasized the superiority of the BXAI-IDCUCS model over the current state-of-the-art approaches with a packet delivery ratio of 99.29%,a packet loss rate of 0.71%,a throughput of 92.95 Mbps,energy consumption of 0.0891 mJ,a lifetime of 3529 rounds,and accuracy of 99.38%.展开更多
Office environments have recently adopted ubiquitous computing for collaboration and mobile communication to promote real-time enterprises. Ubiquitous offices, introduced by Weiser and adopted as emerging computationa...Office environments have recently adopted ubiquitous computing for collaboration and mobile communication to promote real-time enterprises. Ubiquitous offices, introduced by Weiser and adopted as emerging computational technology to support office works, have already affected the practice of companies and organizations. Within this context, this study deals with a work service model of the ubiquitous office environments by understanding human behaviors and works in their workspace. We propose a ubiquitous office model considering the correlation between ubiquitous computing technologies and work services in the office. Two attributes are emphasized, collaboration and mobility, as identifiers for categorizing the work types. The types of work services have variations in the amount of communication and the proportion of working outside of the office. The proposed work service model of the ubiquitous office includes territorial and non-territorial services to enable workers in and out of the office to interact with each other effectively. The findings in this paper would be a theoretical basis for embodying an intelligent office which supports office works efficiently.展开更多
With the rapid development of information and communication technology (ICT) and sensor technology, ubiquitous computing (or pervasive computing) has become widely used with much convenience to human life. For ins...With the rapid development of information and communication technology (ICT) and sensor technology, ubiquitous computing (or pervasive computing) has become widely used with much convenience to human life. For instance, people can use their electronic devices at hand (e.g., Google glasses or Apple watch) to access information they need. However, this '~ubiquitous" service poses challenges to human autonomy. Based on the analysis of the features of pervasive computing, this paper points out the ambiguity between the subject and object of ubiquitous computing and shows technological interventions can affect human autonomy at three levels: technology addiction, the degradation of human capacities, and the reversal of the end and the means caused by the fuzziness of ma^-machine interface. In other words, ubiquitous computing gives people unprecedented convenience, and it also deprives of their freedom. According to Kant's Theory of Freedom, this article reflects on the relationship between the autonomy of technology and that of humankind.展开更多
The paper introduces a novel paradigm to use ubiquitous computing in urban traffic control as a methodology to include the benefits of considering physical elements implicated in the environment. This promising idea a...The paper introduces a novel paradigm to use ubiquitous computing in urban traffic control as a methodology to include the benefits of considering physical elements implicated in the environment. This promising idea arises from previous results in the literature, where ubiquitous computing achieves significant and promising results in diverse scenarios. Some works in the state-of- the-art clearly state that traditional traffic light signals are not capable of offering higher service levels when they should control the vehicular mobility because of different constraints. In this sense, the paper proposes an adaptation of the main ideas of ubiquitous computing as a metaphor to facilitate the interaction between users and traffic infrastructures in order to improve the users’ experience on the road.展开更多
The ubiquitous economy brings both pros and cons for the organizations. The third space emerged by the development of ubiquitous computing generates new concept of community. The community is tightly coupled with peop...The ubiquitous economy brings both pros and cons for the organizations. The third space emerged by the development of ubiquitous computing generates new concept of community. The community is tightly coupled with people, products, and systems. Organizational strategies need to be reshaped for the changing environment in the third space and community. Organizational structure also needs to change for community serving organization. Community serving concept equipped with the standardized technology will be essential. One of the key technologies, RFID service will play a key role to acknowledge identification and services required. When the needs for sensing the environment increase, technological requirement such as the ubiquitous sensor network (USN) will be critically needed..展开更多
The recent surge in development of smart homes and smart cities can be observed in many developed countries.While the idea to control devices that are in home(embedded with the Internet of Things(IoT)smart devices)by ...The recent surge in development of smart homes and smart cities can be observed in many developed countries.While the idea to control devices that are in home(embedded with the Internet of Things(IoT)smart devices)by the user who is outside the home might sound fancy,but it comes with a lot of potential threats.There can be many attackers who will be trying to take advantage of this.So,there is a need for designing a secure scheme whichwill be able to distinguish among genuine/authorized users of the system and attackers.And knowing about the details of when and what IoT devices are used by the user,the attacker can trace the daily activities of user and can plan an attack accordingly.Thus,the designed security scheme should guarantee confidentiality,anonymity and un-traceability.Most of the schemes proposed in the literature are either non-blockchain based which involves inherent problems of storing data in a single-server or assuming weaker attack models.In this work,we propose a novel scheme based on blockchain technology,assuming a stronger Canetti and Krawczyk(CK)-threat model.Through the formal and informal security,and comparative analysis,we show that the proposed scheme provides a superior security and more functionality features,with less communication cost and comparable computational cost as compared to other competent schemes.Moreover,the blockchain based simulation study on the proposed scheme has been conducted to show its feasibility in real-life application.展开更多
The traffic congestion has become an urgent problem to be solved,which appears in the domestic and foreign large and medium-sized cities.Intelligent transportation is one of the important applications of ubiquitous co...The traffic congestion has become an urgent problem to be solved,which appears in the domestic and foreign large and medium-sized cities.Intelligent transportation is one of the important applications of ubiquitous computing.And it's an important way to ease the traffic congestion of the city.Intelligent navigation system is an important embodiment of intelligent transportation.So far,there have been many kinds of traditional vehicle navigation systems.But when they are in use,drivers will pay extra attention to get the path information through the visual and auditory cues.It's dangerous for drivers when they drive.At the same time,with the development of science and technology,mobile navigation system has been widely used.The mobile navigation system is a comprehensive system which relates to the field of mobile communication and GPS.The objective of this paper is to develop a smart phone and interaction navigation system based on the feedback of vibration and micro programmed control unit(MCU)control system.When drivers are in the driving process,the new navigation system can avoid the same sense of multiple tasks,which makes each sensory focus on only one independent task.Through the analysis,the system is demonstrated to improve the driving safety.展开更多
In recent years, several researchers have applied workflow technologies for service automation on ubiquitous compating environments. However, most context-aware workflows do not offer a method to compose several workf...In recent years, several researchers have applied workflow technologies for service automation on ubiquitous compating environments. However, most context-aware workflows do not offer a method to compose several workflows in order to get mare large-scale or complicated workflow. They only provide a simple workflow model, not a composite workflow model. In this paper, the autorhs propose a context-aware workflow model to support composite workflows by expanding the patterns of the existing context-aware wrY:flows, which support the basic woddlow patterns. The suggested workflow model of. fers composite workflow patterns for a context-aware workflow, which consists of various flow patterns, such as simple, split, parallel flows, and subflow. With the suggested model, the model can easily reuse few of existing workflows to make a new workflow. As a result, it can save the development efforts and time of context-aware workflows and increase the workflow reusability. Therefore, the suggested model is expected to make it easy to develop applications related to context-aware workflow services on ubiquitous computing environments.展开更多
Metaverse is one of the main technologies in the daily lives of several people,such as education,tour systems,and mobile application services.Particularly,the number of users of mobile metaverse applications is increa...Metaverse is one of the main technologies in the daily lives of several people,such as education,tour systems,and mobile application services.Particularly,the number of users of mobile metaverse applications is increasing owing to the merit of accessibility everywhere.To provide an improved service,it is important to analyze online reviews that contain user satisfaction.Several previous studies have utilized traditional methods,such as the structural equation model(SEM)and technology acceptance method(TAM)for exploring user satisfaction,using limited survey data.These methods may not be appropriate for analyzing the users of mobile applications.To overcome this limitation,several researchers perform user experience analysis through online reviews and star ratings.However,some online reviews occasionally have inconsistencies between the star rating and the sentiment of the text.This variation disturbs the performance of machine learning.To alleviate the inconsistencies,Valence Aware Dictionary and sEntiment Reasoner(VADER),which is a sentiment classifier based on lexicon,is introduced.The current study aims to build a more accurate sentiment classifier based on machine learning with VADER.In this study,five sentiment classifiers are used,such as Naïve Bayes,K-Nearest Neighbors(KNN),Logistic Regression,Light Gradient Boosting Machine(LightGBM),and Categorical boosting algorithm(Catboost)with three embedding methods(Bag-of-Words(BoW),Term Frequency-Inverse Document Frequency(TF-IDF),Word2Vec).The results show that classifiers that apply VADER outperform those that do not apply VADER,excluding one classifier(Logistic Regression with Word2Vec).Moreover,LightGBM with TF-IDF has the highest accuracy 88.68%among other models.展开更多
In distributed computing environment,workflow technologies have been continuously developed.Recently,there is an attempt to apply these technologies to context-aware services in ubiquitous computing environment.The mi...In distributed computing environment,workflow technologies have been continuously developed.Recently,there is an attempt to apply these technologies to context-aware services in ubiquitous computing environment.The middleware,which offers services in such environments,should support the automation services suited for the user using various types of situational information around the user.In this paper,based on context-aware workflow language(CAWL),we propose a CAWL based composite workflow handler for supporting composite workflow services,which can integrate more than two service flows and handle them.The test results shows that the proposed CAWL handler can provide the user with the composite workflow services to cope with various demands on a basis of a scenario document founded on CAWL.展开更多
Experience is a sociological concept and builds over time. In a broader sense, the human-centered equivalents of experience and trust apply to D2D interaction. Ubiquitous computing (UbiComp) embeds intelligence and co...Experience is a sociological concept and builds over time. In a broader sense, the human-centered equivalents of experience and trust apply to D2D interaction. Ubiquitous computing (UbiComp) embeds intelligence and computing capabilities in everyday objects to make them effectively communicate, share resources, and perform useful tasks. The safety of resources is a serious problem. As a result, authorization and access control in UbiComp is a significant challenge. Our work presents experience as an outcome of history (HI), reliability (RL), transitivity (TR), and Ubiquity (UB). This experience model is easily adaptable to a variety of self-regulating context-aware access control systems. This paper proposes a framework for Experience-Based Access Control (EX-BAC) with all major services provided by the model. EX-BAC extends attribute-based access control. It uses logical device type and experience as context parameters for policy design. When compared with the state-of-the-art, EX-BAC is efficient with respect to response time.展开更多
Nowadays, many works are interested in adapting to the context without taking into account neither the responsiveness to adapt their solution, nor the ability of designers to model all the relevant concerns. Our paper...Nowadays, many works are interested in adapting to the context without taking into account neither the responsiveness to adapt their solution, nor the ability of designers to model all the relevant concerns. Our paper provides a new architecture for context management that tries to solve both problems. This approach is also based on the analysis and synthesis of context-aware frameworks proposed in literature. Our solution is focus on a separation of contextual concerns at the design phase and preserves it as much as possible at runtime. For this, we introduce the notion of independent views that allow designers to focus on their domain of expertise. At runtime, the architecture is splitted in 2 independent levels of adaptation. The highest is in charge of current context identification and manages each view independently. The lowest handles the adaptation of the application according to the rules granted by the previous level.展开更多
Mobility and resource-limitedness pose challenging issues to service configuration for quality of service (QoS) management in ubiquitous computing environments. Previous configuration approaches, such as static resour...Mobility and resource-limitedness pose challenging issues to service configuration for quality of service (QoS) management in ubiquitous computing environments. Previous configuration approaches, such as static resource reservation, dynamic resource allocation and single service composition are not valid in the environments. In this study, we present an adaptive service configuration approach. Firstly, we reduce the dynamic configuration process to a control model which aims to achieve the variation of critical QoS on minimal level with less resource cost. Secondly, to deal with different QoS variations, we design two configuration strategies—service chain reconfiguration and QoS parameter adjustment—and implement them based on fuzzy logic control theory. Finally, a configuration algorithm is developed to flexibly employ the two configuration strategies in tune with the error of critical QoS in configuration process. The results of simulation experiments suggest that our approach outper- forms existing configuration approaches in both QoS improvement and resource utilization.展开更多
基金the "863" High Technology Research and Development Program of China (2006AA01Z226)the Scientific Research Foundation of Huazhong University of Science and Technology (2006Z011B)the Program for New Century Excellent Talents in University (NCET-07-0328).
文摘Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. Hardware implementations of the advanced encryption standard (AES) for authentication and encryption are presented. An energy consumption variable is derived to evaluate low-power design strategies for battery-powered devices. It proves that compact AES architectures fail to optimize the AES hardware energy, whereas reducing invalid switching activities and implementing power-optimized sub-modules are the reasonable methods. Implementations of different substitution box (S-Boxes) structures are presented with 0.25μm 1.8 V CMOS (complementary metal oxide semiconductor) standard cell library. The comparisons and trade-offs among area, security, and power are explored. The experimental results show that Galois field composite S-Boxes have smaller size and highest security but consume considerably more power, whereas decoder-switch-encoder S-Boxes have the best power characteristics with disadvantages in terms of size and security. The combination of these two type S-Boxes instead of homogeneous S-Boxes in AES circuit will lead to optimal schemes. The technique of latch-dividing data path is analyzed, and the quantitative simulation results demonstrate that this approach diminishes the glitches effectively at a very low hardware cost.
基金Supported by the Ministry of Educationin China (No.104086)
文摘Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classification requirements of identity authentication, the requirement of trust transfer and cross identity authentication, the bi-directional identity authentication, the security delegation and the simple privacy protection etc are all these unsolved problems. In this paper, a new novel ubiquitous computing identity authentication mechanism, named UCIAMdess, is presented. It is based on D-S Evidence Theory and extended SPKI/SDSI. D-S Evidence Theory is used in UCIAMdess to compute the trust value from the ubiquitous computing environment to the principal or between the different ubiquitous computing environments. SPKI-based authorization is expanded by adding the trust certificate in UCIAMdess to solve above problems in the ubiquitous computing environments. The identity authentication mechanism and the algorithm of certificate reduction are given in the paper to solve the multi-levels trust-correlative identity authentication problems. The performance analyses show that UCIAMdess is a suitable security mechanism in solving the complex ubiquitous computing problems.
基金Supported by the Ministry of Educationin China(No.104086)
文摘Ubiquitous computing systems typically have lots of security problems in the area of identification supply by means of classical Public Key Infrastructure (PKI) methods. The limited computing resources, the disconnection network, the classification requirements of identification, the requirement of trust transfer and cross identification, the bidirectional identification, the security delegation and the privacy protection etc are all these unsolved problems. In this paper, UCIMssp, a new novel ubiquitous computing identification mechanism based on SPKI/SDSI and Peer-to-Peer (P2P) is presented. SPKI- based authorization is exploited in UCIMssp to solve the above problems in the smalbscale ubiquitous computing environment. The DHT and flooding technology of P2P overlay network over the Intemet is expanded to solve the routing search in the large-scale ubiquitous computing environment. The architecture of ubiquitous computing environment, the validation of identification requisition, the identification authorization processes and the identification supply processes etc of UCIMssp are described in the paper. The performance analysis shows that UCIMssp is a suitable security solution used in the large-scale ubiquitous computing environment.
基金Supported by the Ministry of Educationin China (No.104086)
文摘To provide the right services or information to the right users, at the right time and in the right place in ubiquitous computing environment, an Indoor Ubiquitous Computing Environment based on Location-Awareness, IUCELA, is presented in this paper. A general architecture of IUCELA is designed to connect multiple sensing devices with locationaware applications. Then the function of location-aware middleware which is the core componnet of the proposed architecture is elaborated. Finally an indoor forum is taken as an example scenario to demonstrate the security, usefulness, flexibiltity and robustness of IUCELA.
文摘We are entering into a new era of enterprise computing that is characterized by an emphasis on broadband convergence, knowledge sharing, and calm services. Some people refer to this as the 'ubiquitous network' business model because its focus is on a high degree of connectivity between a company and its customers, suppliers, and channel partners. Moreover, immediate access to ideas, goods, and services will be of greater value than the traditional model of permanent and ponderous possession. This paper illustrates how ubiquitous computing technology can be combined with legacy computer-based information systems, along with thoughts on relevant issues of ubiquitous commerce. We also propose a model for how to assess levels of ubiquitous computing services.
基金Key Project of Chinese Ministry of Education (No.104086)
文摘Lightweight ubiquitous computing security architecture was presented. Lots of our recent researches have been integrated in this architecture. And the main current researches in the related area have also been absorbed. The main attention of this paper was providing a compact and realizable method to apply ubiquitous computing into our daily lives under sufficient secure guarantee. At last,the personal intelligent assistant system was presented to show that this architecture was a suitable and realizable security mechanism in solving the ubiquitous computing problems.
文摘1 Introduction New technologies and other developments haye changedthe information seeking behaviors of the academic communityand the general public.Nowhere is this more evident than inthe exponential growth of the World Wide Web and cellularphone usage.Responding to these user needs and newtechnologies,libraries are moving from being InformationWarehouses to becoming Information Portals.Full-text。
基金This research work was funded by Institutional Fund Projects under grant no.(IFPIP:624-611-1443)。
文摘In the Internet of Things(IoT)based system,the multi-level client’s requirements can be fulfilled by incorporating communication technologies with distributed homogeneous networks called ubiquitous computing systems(UCS).The UCS necessitates heterogeneity,management level,and data transmission for distributed users.Simultaneously,security remains a major issue in the IoT-driven UCS.Besides,energy-limited IoT devices need an effective clustering strategy for optimal energy utilization.The recent developments of explainable artificial intelligence(XAI)concepts can be employed to effectively design intrusion detection systems(IDS)for accomplishing security in UCS.In this view,this study designs a novel Blockchain with Explainable Artificial Intelligence Driven Intrusion Detection for IoT Driven Ubiquitous Computing System(BXAI-IDCUCS)model.The major intention of the BXAI-IDCUCS model is to accomplish energy efficacy and security in the IoT environment.The BXAI-IDCUCS model initially clusters the IoT nodes using an energy-aware duck swarm optimization(EADSO)algorithm to accomplish this.Besides,deep neural network(DNN)is employed for detecting and classifying intrusions in the IoT network.Lastly,blockchain technology is exploited for secure inter-cluster data transmission processes.To ensure the productive performance of the BXAI-IDCUCS model,a comprehensive experimentation study is applied,and the outcomes are assessed under different aspects.The comparison study emphasized the superiority of the BXAI-IDCUCS model over the current state-of-the-art approaches with a packet delivery ratio of 99.29%,a packet loss rate of 0.71%,a throughput of 92.95 Mbps,energy consumption of 0.0891 mJ,a lifetime of 3529 rounds,and accuracy of 99.38%.
文摘Office environments have recently adopted ubiquitous computing for collaboration and mobile communication to promote real-time enterprises. Ubiquitous offices, introduced by Weiser and adopted as emerging computational technology to support office works, have already affected the practice of companies and organizations. Within this context, this study deals with a work service model of the ubiquitous office environments by understanding human behaviors and works in their workspace. We propose a ubiquitous office model considering the correlation between ubiquitous computing technologies and work services in the office. Two attributes are emphasized, collaboration and mobility, as identifiers for categorizing the work types. The types of work services have variations in the amount of communication and the proportion of working outside of the office. The proposed work service model of the ubiquitous office includes territorial and non-territorial services to enable workers in and out of the office to interact with each other effectively. The findings in this paper would be a theoretical basis for embodying an intelligent office which supports office works efficiently.
文摘With the rapid development of information and communication technology (ICT) and sensor technology, ubiquitous computing (or pervasive computing) has become widely used with much convenience to human life. For instance, people can use their electronic devices at hand (e.g., Google glasses or Apple watch) to access information they need. However, this '~ubiquitous" service poses challenges to human autonomy. Based on the analysis of the features of pervasive computing, this paper points out the ambiguity between the subject and object of ubiquitous computing and shows technological interventions can affect human autonomy at three levels: technology addiction, the degradation of human capacities, and the reversal of the end and the means caused by the fuzziness of ma^-machine interface. In other words, ubiquitous computing gives people unprecedented convenience, and it also deprives of their freedom. According to Kant's Theory of Freedom, this article reflects on the relationship between the autonomy of technology and that of humankind.
文摘The paper introduces a novel paradigm to use ubiquitous computing in urban traffic control as a methodology to include the benefits of considering physical elements implicated in the environment. This promising idea arises from previous results in the literature, where ubiquitous computing achieves significant and promising results in diverse scenarios. Some works in the state-of- the-art clearly state that traditional traffic light signals are not capable of offering higher service levels when they should control the vehicular mobility because of different constraints. In this sense, the paper proposes an adaptation of the main ideas of ubiquitous computing as a metaphor to facilitate the interaction between users and traffic infrastructures in order to improve the users’ experience on the road.
文摘The ubiquitous economy brings both pros and cons for the organizations. The third space emerged by the development of ubiquitous computing generates new concept of community. The community is tightly coupled with people, products, and systems. Organizational strategies need to be reshaped for the changing environment in the third space and community. Organizational structure also needs to change for community serving organization. Community serving concept equipped with the standardized technology will be essential. One of the key technologies, RFID service will play a key role to acknowledge identification and services required. When the needs for sensing the environment increase, technological requirement such as the ubiquitous sensor network (USN) will be critically needed..
基金supported by the Basic Science Research Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Education under Grant 2020R1I1A3058605The authors also extend their gratitude to the Deanship of Scientific Research at King Khalid University for funding this work through research groups programunder Grant Number R.G.P.1/399/42。
文摘The recent surge in development of smart homes and smart cities can be observed in many developed countries.While the idea to control devices that are in home(embedded with the Internet of Things(IoT)smart devices)by the user who is outside the home might sound fancy,but it comes with a lot of potential threats.There can be many attackers who will be trying to take advantage of this.So,there is a need for designing a secure scheme whichwill be able to distinguish among genuine/authorized users of the system and attackers.And knowing about the details of when and what IoT devices are used by the user,the attacker can trace the daily activities of user and can plan an attack accordingly.Thus,the designed security scheme should guarantee confidentiality,anonymity and un-traceability.Most of the schemes proposed in the literature are either non-blockchain based which involves inherent problems of storing data in a single-server or assuming weaker attack models.In this work,we propose a novel scheme based on blockchain technology,assuming a stronger Canetti and Krawczyk(CK)-threat model.Through the formal and informal security,and comparative analysis,we show that the proposed scheme provides a superior security and more functionality features,with less communication cost and comparable computational cost as compared to other competent schemes.Moreover,the blockchain based simulation study on the proposed scheme has been conducted to show its feasibility in real-life application.
基金Supported by the National High Technology Research and Development Program of China(863 Program)(2013AA013704)the National Youth Natural Science Foundation of China(61300145,61332017)+2 种基金the Postdoctoral Science Foundation of China(2014M561294)the Science and Technology Development Program Funded Projects of Jilin Province(20150520065JH)the National Key Technology Support Program(2015BAK04B00)
文摘The traffic congestion has become an urgent problem to be solved,which appears in the domestic and foreign large and medium-sized cities.Intelligent transportation is one of the important applications of ubiquitous computing.And it's an important way to ease the traffic congestion of the city.Intelligent navigation system is an important embodiment of intelligent transportation.So far,there have been many kinds of traditional vehicle navigation systems.But when they are in use,drivers will pay extra attention to get the path information through the visual and auditory cues.It's dangerous for drivers when they drive.At the same time,with the development of science and technology,mobile navigation system has been widely used.The mobile navigation system is a comprehensive system which relates to the field of mobile communication and GPS.The objective of this paper is to develop a smart phone and interaction navigation system based on the feedback of vibration and micro programmed control unit(MCU)control system.When drivers are in the driving process,the new navigation system can avoid the same sense of multiple tasks,which makes each sensory focus on only one independent task.Through the analysis,the system is demonstrated to improve the driving safety.
基金supported by the The Ministry of Knowledge Economy,Korea,the ITRC(Information Technology Research Center)support program(ⅡTA-2009-(C1090-0902-0007))
文摘In recent years, several researchers have applied workflow technologies for service automation on ubiquitous compating environments. However, most context-aware workflows do not offer a method to compose several workflows in order to get mare large-scale or complicated workflow. They only provide a simple workflow model, not a composite workflow model. In this paper, the autorhs propose a context-aware workflow model to support composite workflows by expanding the patterns of the existing context-aware wrY:flows, which support the basic woddlow patterns. The suggested workflow model of. fers composite workflow patterns for a context-aware workflow, which consists of various flow patterns, such as simple, split, parallel flows, and subflow. With the suggested model, the model can easily reuse few of existing workflows to make a new workflow. As a result, it can save the development efforts and time of context-aware workflows and increase the workflow reusability. Therefore, the suggested model is expected to make it easy to develop applications related to context-aware workflow services on ubiquitous computing environments.
基金This study was supported by a National Research Foundation of Korea(NRF)(http://nrf.re.kr/eng/index)grant funded by the Korean government(NRF-2020R1A2C1014957).
文摘Metaverse is one of the main technologies in the daily lives of several people,such as education,tour systems,and mobile application services.Particularly,the number of users of mobile metaverse applications is increasing owing to the merit of accessibility everywhere.To provide an improved service,it is important to analyze online reviews that contain user satisfaction.Several previous studies have utilized traditional methods,such as the structural equation model(SEM)and technology acceptance method(TAM)for exploring user satisfaction,using limited survey data.These methods may not be appropriate for analyzing the users of mobile applications.To overcome this limitation,several researchers perform user experience analysis through online reviews and star ratings.However,some online reviews occasionally have inconsistencies between the star rating and the sentiment of the text.This variation disturbs the performance of machine learning.To alleviate the inconsistencies,Valence Aware Dictionary and sEntiment Reasoner(VADER),which is a sentiment classifier based on lexicon,is introduced.The current study aims to build a more accurate sentiment classifier based on machine learning with VADER.In this study,five sentiment classifiers are used,such as Naïve Bayes,K-Nearest Neighbors(KNN),Logistic Regression,Light Gradient Boosting Machine(LightGBM),and Categorical boosting algorithm(Catboost)with three embedding methods(Bag-of-Words(BoW),Term Frequency-Inverse Document Frequency(TF-IDF),Word2Vec).The results show that classifiers that apply VADER outperform those that do not apply VADER,excluding one classifier(Logistic Regression with Word2Vec).Moreover,LightGBM with TF-IDF has the highest accuracy 88.68%among other models.
基金The MSIP(Ministry of Science,ICT&Future Planning),Korea,under the ITRC(Information Technology Research Center)support program(NIPA-2013-H0301-13-2006)supervised by the NIPA(National IT Industry Promotion Agency)
文摘In distributed computing environment,workflow technologies have been continuously developed.Recently,there is an attempt to apply these technologies to context-aware services in ubiquitous computing environment.The middleware,which offers services in such environments,should support the automation services suited for the user using various types of situational information around the user.In this paper,based on context-aware workflow language(CAWL),we propose a CAWL based composite workflow handler for supporting composite workflow services,which can integrate more than two service flows and handle them.The test results shows that the proposed CAWL handler can provide the user with the composite workflow services to cope with various demands on a basis of a scenario document founded on CAWL.
文摘Experience is a sociological concept and builds over time. In a broader sense, the human-centered equivalents of experience and trust apply to D2D interaction. Ubiquitous computing (UbiComp) embeds intelligence and computing capabilities in everyday objects to make them effectively communicate, share resources, and perform useful tasks. The safety of resources is a serious problem. As a result, authorization and access control in UbiComp is a significant challenge. Our work presents experience as an outcome of history (HI), reliability (RL), transitivity (TR), and Ubiquity (UB). This experience model is easily adaptable to a variety of self-regulating context-aware access control systems. This paper proposes a framework for Experience-Based Access Control (EX-BAC) with all major services provided by the model. EX-BAC extends attribute-based access control. It uses logical device type and experience as context parameters for policy design. When compared with the state-of-the-art, EX-BAC is efficient with respect to response time.
基金the U-Insither Project(collaborative project between the Universite Nice Sophia Antipolis and EDF R&D/STREP).
文摘Nowadays, many works are interested in adapting to the context without taking into account neither the responsiveness to adapt their solution, nor the ability of designers to model all the relevant concerns. Our paper provides a new architecture for context management that tries to solve both problems. This approach is also based on the analysis and synthesis of context-aware frameworks proposed in literature. Our solution is focus on a separation of contextual concerns at the design phase and preserves it as much as possible at runtime. For this, we introduce the notion of independent views that allow designers to focus on their domain of expertise. At runtime, the architecture is splitted in 2 independent levels of adaptation. The highest is in charge of current context identification and manages each view independently. The lowest handles the adaptation of the application according to the rules granted by the previous level.
基金Project (No. 05SN07114) supported by the International Cooperation Project of the Shanghai Science and Technology Commission of China and the National Research Council of Canada
文摘Mobility and resource-limitedness pose challenging issues to service configuration for quality of service (QoS) management in ubiquitous computing environments. Previous configuration approaches, such as static resource reservation, dynamic resource allocation and single service composition are not valid in the environments. In this study, we present an adaptive service configuration approach. Firstly, we reduce the dynamic configuration process to a control model which aims to achieve the variation of critical QoS on minimal level with less resource cost. Secondly, to deal with different QoS variations, we design two configuration strategies—service chain reconfiguration and QoS parameter adjustment—and implement them based on fuzzy logic control theory. Finally, a configuration algorithm is developed to flexibly employ the two configuration strategies in tune with the error of critical QoS in configuration process. The results of simulation experiments suggest that our approach outper- forms existing configuration approaches in both QoS improvement and resource utilization.