2011 Fifth International
Conference on Innovative Mobile
and Internet Services in
Ubiquitous Computing
(IMIS 2011)
Seoul, South Korea
30 June-2 July 2011
Editors:
Ilsun You Feilong Tang
Leonard Barolli Fatos Xhafa
IEEE IEEE Catalog Number: CFP1158N-PRT
ISBN: 978-1-61284-733-7
2011 Fifth International
Conference on Innovative
Mobile and Internet Services
in Ubiquitous Computing
IMIS2011
Table of Contents
Message from IMIS 2011 General Co-chairs xvi
Message from IMIS 2011 Program Committee Co-chairs xvii
Message from IMIS 2011 International Conference Workshop
Co-chairs xviii
IMIS 2011 Organizing Committee xix
IMIS 2011 Track Area Chairs xx
IMIS 2011 Reviewers xxv
IMIS 2011 Keynote Talk xxviii
Message from ACTICS 2011 International Workshop
Organizers xxix
ACTICS 2011 Organizing Committee xxx
ACTICS 2011 Reviewers xxxi
Message from FIMIS 2011 Workshop Co-chairs xxxii
FIMIS 2011 Organizing Committee xxxiii
FIMIS 2011 Reviewers xxxiv
Message from FINGNet 2011 International Workshop
Organizers xxxv
FINGNet 2011 Organizing Committee xxxvi
FINGNet 2011 Reviewers xxxvii
Message from IFSN 2011 International Workshop Organizers xxxviii
IFSN 2011 Organizing Committee xxxix
IFSN 2011 Reviewers xl
Message from ITAUC 2011 International Workshop
Organizers xii
ITAUC 2011 Organizing Committee. xm
V
ITAUC 2011 Reviewers xiiii
Message from MoMoPE 2011 International Workshop
Organizers xiiv
MoMoPE 2011 Organizing Committee xlv
MoMoPE 2011 Reviewers xlvi
Message from MCNCS 2011 International Workshop
Organizers xivii
MCNCS 2011 Organizing Committee xiviii
MCNCS 2011 Reviewers xMx
Message from WAIS 2011 International Workshop
Organizers i
WAIS 2011 Organizing Committee H
WAIS 2011 Reviewers Hi
Selected Area: Practical Security on Internet Services I
The Design of Video Door Phone and Control System for Home Secure
Applications 1
Ching-Lung Chang andHart-Yu Tsai
Reversability Assessment on Secure USB Memories 6
Kyungroul Lee, Sitha Pho, andKangbin Yim
Keyboard Security: A Technological Review 9
Kyungroul Lee and Kangbin Yim
Architecture to Support Heterogeneous Devices for Video Surveillance
System 16
MohammadA. Mikki, Kyungroul Lee, Wansoo Kim, andKangbin Yim
Cloud Computing and Service Management I
An Online Migration Environment for Executing Mobile Applications on
the Cloud 20
Shih-Hao Hung, Chi-Sheng Shih, Jeng-Peng Shieh, Chen-Pang Lee, and Yi-Hsiang Huang
A Heuristic Approach for Scalability of Multi-tiers Web Application in Clouds ...28
Ruiqing Chi, Zhuzhong Qian, and Sanglu Lu
Performability Analysis of laaS Cloud 36
Ji Ho Kim, Sang Mm Lee, Dong SeongKim, andJong Sou Park
Towards Multi-criteria Cloud Service Selection 44
Zia ur Rehman, Farookh K. Hussain, and Omar K. Hussain
vi
Internet, Wireless and Mobile Networks for UPC I
An IP Passing Protocol for Vehicular Ad Hoc Networks with Network
Fragmentations 49
Yuh-Shyan Chen, Chih-Shun Hsu, and Wei-Han Yi
NTC: Towards Efficient Network Coding in Delay Tolerant Networks 57
Baokang Zhao, Ziming Song, Jinshu Su, Wei Peng, and Qiaolin Hu
Context and Location-Aware Computing
Contexts-Management Strategy in Considering the Security in Urban
Computing Based on Urban Design 65
Hoon Ko, Goreti Marreiros, Kyung-jin An, Zita Vale, Tai-hoon Kim,
andJong-Myoung Choi
Efficient Object Localization for Query-by-Subregion 73
Yong-Hwan Lee, Bonam Kim, and Heung-Jun Kim
Short-Term Prediction-Based Optimistic Object Tracking Strategy in Wireless
Sensor Networks 78
Jenq Muh Hsu, Chao Chun Chen, and Chia Chi Li
Selected Area: Practical Security on Internet Services II
Adaptive DDoS Detector Design Using Fast Entropy Computation Method 86
Giseop No and Ilkyeun Ra
A Resource Perspective to Wireless Sensor Network Security 94
Venkatesh Kannan and Sahena Ahmed
ACSP: A Novel Security Protocol against Counting Attack for UHF RFID
Systems 100
Ce Chen, Zhuzhong Qian, Ilsun You, Jue Hong, andSanglu Lu
Cloud Computing and Service Management II
"Variated Availability" Approach to the Services Manageable Delivering 106
Natalia Kryvinska, Christine Strauss, and Peter Zinterhof
A Formal Model for Dynamic Service Updates in Pervasive Computing 114
SiqiDu, Linpeng Huang, andJunqing Chen
An Effective Deadlock Prevention Mechanism for Distributed Transaction
Management 120
Lin Lou, Feilong Tang, Ilsun You, Minyi Guo, Yao Shen, andLi Li
vii
Internet, Wireless and Mobile Networks for UPC II
A Case for Real-World Smart Environments: The Development of a Remote
Autonomous Energy Aware Monitoring System Using Next Generation
Technologies 128
Nicholas McLauchlan and Nik Bessis
"Memoxo" - Browser-Based Prototype for the Audio/Video Messages
Recording 136
Markus Hockner, RudolfHartjes, Christine Strauss, and Natalia Kryvinska
Embedded Systems and Wearable Computers
Task Optimization Based on CPU Pipeline Technique in Multicore System 143
Bo Wang, Yongwei Wu, and Weimin Zheng
Display Verification IP Core Design Based on Star-Extraction
and Star-Recognition Image Processing on FPGA 151
Linyang Sheng, Jingbo Shao, Min Xu, and Yuanquan Cui
Trying Linear Network Coding on a Network Flow Processor 156
Peng Cao, Long Zheng, Yanchao Lu, Feilong Tang, Ilsun You, and Minyi Guo
A Formalization of an Emulation Based Co-designed Virtual Machine 164
Wei Chen, Weixia Xu, Zhiying Wang, Qiang Dou, Yongwen Wang, Baokang Zhao,
and Baosheng Wang
Selected Area: Practical Security on Internet Services III
Secure Information Management Protocol Based on Linguistic Sharing
Techniques 169
Marek R. Ogiela and Urszula Ogiela
Combining Static and Dynamic Analysis to Discover Software Vulnerabilities 175
Ruoyu Zhang, Shiqiu Huang, Zhengwei Qi, andHaibin Guan
Data Management in Pervasive Systems
Semantic Analysis Processes in UBIAS Systems for Cognitive Data
Interpretation 182
Lidia Ogiela and Marek R. Ogiela
Information Retrieval Techniques to Grasp User Intention in Pervasive
Computing Environment 186
Myunggwon Hwang, Pankoo Kim, andDongjin Choi
Improvements on Sequential Minimal Optimization Algorithm for Support
Vector Machine Based on Semi-sparse Algorithm 192
Xiaopeng Yang, Hu Guan, Feilong Tang, llsun You, Minyi Guo, and Yao Shen
viii
Security, Trust and Privacy
Universal, Fast Method for iPad Forensics Imaging via USB Adapter 200
Luis Gomez-Miralles andJoan Arnedo-Moreno
Trust-Driven Policy Enforcement through Gate Automata 208
Gabriele Costa and Ilaria Matteucci
DDoS Attacks Detection Using GA Based Optimized Traffic Matrix 216
Je Hak Lee, Dong Seong Kim, Sang Min Lee, andJong Sou Park
Novel Multi-bit and Multi-image Steganography Using Adaptive Embedding
Algorithms with Minimum Error 221
Rong-Jian Chen, Jui-Lin Lai, and Shi-Jinn Horng
Knowledge Cities and Disaster Recovery
Buildings and Crowds: Forming Smart Cities for More Effective Disaster
Management 229
Eleana Asimakopoulou andNik Bessis
ICTs and Effective Communication Strategies: Specific Needs of Information
before, during and after Disasters : 235
Zemp Helena
Modeling, Simulation and Performance in UPC
Ubiquitous Computing and Distributed Agent-Based Simulation 241
B.G.W. Craenen andG.K. Theodoropoulos
A PCA-based Approach to Modeling Location Update and Pagingfor Location Area Planning 248
Jingbo Sun, Yue Wang, Jian Yuan, andXiuming Shan
Circuit Emulation Services over SCTP 253
Shiwei Hu, Minyi Guo, Feilong Tang, Jingyu Zhou, and Yao Shen
Session 1: Cognitive Radio Systems, Sensors and Applications (ACTICS 2011)
Channel Allocation for a Single Cell Cognitive Radio Network Using Genetic
Algorithm 258
Subhasree Bhattacharjee, Amit Konar, and Atulya K. Nagar
A Proposal of an Application of Life Log to Remote Consultation 265
Yuya Uesugi, Tasuku Yamamoto, Jun Sawamoto, Norihisa Segawa, Eiji Sugino,Takuto Goto, andHiroshi Yajima
ix
Session 2: Protocols and Algorithms (ACTICS 2011)
Effect of Sink Location on Aggregation Based on Degree ofConnectivity
for Wireless Sensor Networks 271
DavidFolue, Foued Melakessou, Houda Labiod, and Thomas Engel
Extending Wireless Sensor Network Lifetime in the LEACH-SM Protocol
by Spare Selection 277
BHal Abu Bah- andLeszek Lilien
Session 1: Ubiquitous and Cloud Computing (FIMIS 2011)
A Game-Theoretic Resource Allocation Algorithm Based on Utility in IEEE
802.1 le 283
Li Yishan, Li Yuhong, and Li Tao
Modeling and Analysis of Cloud Computing Availability Based on Eucalyptus
Platform for E-Government Data Center 289
Sok Chvob, Manish Pokharel, andJong Sou Park
Personalized Information Recommendataion Using Hybrid CBR and CSP in
a Ubiquitous Computing Environment 297
Mye Sohn, Hyunwoo Kim, andHyun Jung Lee
Session 2: Mobility Issues in Wireless Networks (FIMIS 2011)
A Novel Mobility Management Mechanism Based on Destination Address
Overwritten and ID/Locator Separation 304
Hon Yunjing, Li Yuhong, and Yu Liang
Secure Mobility Management Scheme for 6L0WPAN ID/Locator Split
Architecture 310
Antonio J. Jara, Leandro Marin, Antonio F. G. Skarmeta, Dhananjay Singh,
Gohel Bakul, andDaeyeoul Kim
Session 1: Architectures and Platforms (FINGNet 2011)
Cost-Optimal Validation Mechanisms and Cheat-Detection for CrowdsourcingPlatforms 316
Matthias Hirth, Tobias Hofifeld, andPhuoc Tran-Gia
Anatomy ofa Crowdsourcing Platform - Using the ExampleofMicroworkers.com 322
Matthias Hirth, Tobias Hofifeld, andPhuoc Tran-Gia
An Evaluation of QoE in Cloud Gaming Based on Subjective Tests 330
Michael Jarschel, Daniel Schlosser, Sven Scheuring, and Tobias Hofifeld
X
Functional Composition and Its ChallengesAbbas Siddiqui, Rahamatuttah Khondoker, BerndReuther, Paul Mueller,
Christian Henke, andHelge Backhaus
,336
Session 2: Security Issues and Mobile Internet Applications (FINGNet 2011)
Secure Code Dissemination Using Energy-Efficient Minimal Virtual
Backbone in Sensor Networks 341
Jisun Kim, Jiyoung Lim, and Kijoon Chae
Self-Similar Properties of Spam 347
JongsukR. Lee, Hae-Duck J. Jeong, Don McNickle, and Krz)>sztofPawlikowski
DAD-Less MIPv6 for Reduced Handover Latency 353
Yu-xuan Hong, KrzysztofPawlikowski, andHarsha Sirisena
CoLib: Client Library for Effective Development ofWebDAV-based
Collaborative Application 361
Hong-Chang Lee, Bo-Hyeon Kim, and Myung-Joon Lee
Session 1: Internet Security (IFSN 2011)
Gregex: GPU Based High Speed Regular Expression Matching Engine 366
Lei Wang, Shuhui Chen, Yong Tang, andJinshu Su
A Network Security Evaluation Method Framework Based on Multiple
Criteria Decision Making Theory 371
Zhao Jinjing, Wen Yan, and Wang Dongxia
A Framework of Network Security Situation Analysis Based on
the Technologies ofEvent Correlation and Situation Assessment 376
FengXuewei, Wang Dongxia, Ke Shanwen, Ma Guoqing, andLi Jin
Session 2: Wireless Networks (IFSN 2011)
Energy Optimal Selection ofAccess Points in Wireless Sensor Networks 381
Qin Xin, Xiaolan Yao, and Wei He
Building Practical Self Organization Networks on Heterogeneous Wireless
Modems 388
Zhu Tang, Bo Liu, Baokang Zhao, Wanrong Yu, Chunqing Wu, Wei Peng, Bin Bai,
and Yanpeng Ma
Session 3: System Security (IFSN 2011)
Snail Crawling: An Enhanced Method for DTNs Routing 394
BingBai, Jinshu Su, Baokang Zhao, Wanrong Yu, and Ling Wen
xi
Towards Practical IPSec over Challenged Networks 398
Jing Tao andBaosheng Wang
Aquarius: A Tiny Hypervisor to Introspect Commodity OSes in
a Non-bypassable Way 403
Yan Wen, Jinjing Zhao, Minhuan Huang, andHua Chen
Session 1: Wireless Networks (ITAUC 2011)
Performance of Energy Efficient Relay and Minimum Distance Clustering
for Wireless Sensor Networks 408
Yung-Fa Huang, Hsing-Chung Chen, Li-Ming Wang, andJhao-Wei Guo
Impact of Broadcasting Directions in SDLS for Wireless Sensor Networks 414
Chia-Hsin Cheng, Hsirrying Liang, Yung-Fa Huang, andTian-Yue Wu
A Role-Oriented Routing Algorithm Applied for Wireless Heterogeneous
Networks 420
Hsing-Chung Chen and Kanoksak Wattanachote
TOA Estimation with DLC Receivers for IEEE 802.15.4a UWB Systems 424
Hsi-Chou Hsu, Jyh-Horng Wen, Chia-Hsin Cheng, Yi-Shiang Chen, and Tian-Yue Wu
Session 2: Intelligent Systems and Algorithms (ITAUC 2011)
A Generalized Associated Temporal and Spatial Role-Based Access Control
Model for Wireless Heterogeneous Networks 429
Hsing-Chung Chen, Yung-Fa Huang, and Syuan-Zong Lin
A Minimal Fuzzy Gain Scheduling Speed Controller and Torque
Compensation for the Variable Sampling System of BLDC Motors 434
Chung-Wen Hung, Jhih-Han Chen, andHsuan T. Chang
A Fuzzy-Based Reliability System for JXTA-Overlay P2P Platform 438
Kouhei Umezaki, Evjola Spaho, Yuichi Ogata, Hironori Ando, Leonard Barolli,
andFatos Xhafa
Session 1: Performance Modeling of Vehicular Mobility (MoMoPE 2011)
SaMob: A Social Attributes Based Mobility Model for Ad Hoc Networks 444
Jingxin Wang, Jian Yuan, Xiuming Shan, Zhenming Feng, Junwei Geng, andllsun You
NAVOPT: Navigator Assisted Vehicular Route OPTimizer 450
Wooseong Kim and Mario Gerla
A Secure and Location Assurance Protocol for Location-Aware Services
in VANETs 456
Youngho Park, Kyung-Hyune Rhee, and Chul Sur
xii
Session 2: Performance Modeling of Mobility Protocols (MoMoPE 2011)
Analysis of Optimal Query, Fairness and Replication for DHT-based Mobility
Management 462
YujiaZhai, Yue Wang, Jian Yuan, Yong Ren, Xiuming Shan, and Ilsun You
Joint Uplink/Downlink Connection Admission Control in WLAN/Cellular
Integrated Systems 470
Hyung-Taig Lim, Younghyun Kim, Sangheon Pack, and Chul-Hee Kang
PMlPv6-based Flow Mobility Simulation in NS-3 475
Hyon-Young Choi, Sung-Gi Min, and Youn-Hee Han
Mobility Management Research of Internet Based on the Splitting Mechanism 481
Huachun Zhou, Fei Song, and Hongke Zhang
Session 3: Performance Modeling of Security Protocols (MoMoPE 2011)
Enhance IPv6 Dynamic Host Configuration with Cryptographically Generated
Addresses 487
Sean Shen, Xiaodong Lee, Zhili Sun, and Sheng Jiang
Mobility Modeling and Security Validation of a Mobility Management
Scheme Based on ECC for IP-based Wireless Sensor Networks (6L0WPAN) 491
Antonio J. Jara, Leandro Marin, Antonio F.G. Skarmeta, Dhananjay Singh,
Gohel Bakul, and Daeyeoul Kim
Analysis of Multi-path Random Key Pre-distribution for Wireless Sensor
Networks 497
Chun-Wei Tsai, Wei-Shuo Li, Min Chen, Wen-Shyong Hsieh, and Chu-Sing Yang
Session 1: Steganography and Signature (MCNCS 2011)
E-mail-Based Covert Channels for Asynchronous Message Steganography 503
Aniello Castiglione, Alfredo de Santis, Ugo Fiore, andFrancesco Palmieri
Improvement of Strong Designated Verifier Signatures 509
Fuw-Yi Yang, Ling-Ren Liang, and Su-Hui Chiu
Identity-Based Concurrent Signature Scheme with Improved Accountability 514
Chih-Hung Wang and Chao Chuan Chen
Session 2: Network and System Security (MCNCS 2011)
SECR3T: Secure End-to-End Communication over 3G Telecommunication
Networks 520
Aniello Castiglione, Giuseppe Cattaneo, Giancarlo De Maio, and Fabio Petagna
xiii
Integrating Security Considerations in Client Server Architectures of Health
Information Systems Development 527
Chih-Cheng Lien, Chang-Wu Liu, and YI-An Chen
A Novel Stream Cipher with Hash Function for the RFID Device ..532
Sung-Shiou Shen, Horng-Ru Liao, Shen-Ho Lin, andJung-Hui Chiu
Use Double Check Priority Queue to Alleviate Malicious Packet Flows
from Distributed DoS Attacks 537
Chu-Hsing Lin, Jung-Chun Liu, Gucm-Han Chen, Ying-Hsuan Chen,
and Chien-Hua Huang
Session 3: System Security and Reliability (MCNCS 2011)
A Study on Digital Forensics Standard Operation Procedure for Wireless
Cybercrime 543
I-LongLin, Yun-Sheng Yen, andAnnie Chang
A TOA Based Location Estimation Incorporating the Reliability Information 549
Chin-Tseng Huang, Hwa-Lu Jhi, andRu-Chi Ni
Session 4: Cloud Computing and Security (MCNCS 2011)
An Improvement of Chen Et al.'s Scheme for Mobile Pay-TV 555
Chin-Ling Chen, Yu-Fan Lin, andFang-Yie Leu
Constructing a Private Cloud for Government IT Services Consolidation:
Taiwan's Experence 561
Chi-Fu Hung, Chiu-Ching Tuan, and Yu-Chi Chu
The Use of Cloud Speech Recognition Technology in Vehicle Diagnosis
Applications 567
Shi-Huang Chen, Jun-Yu Chen, andKuo-Yuan Lu
Session 5: Wireless Network and Communication (MCNCS 2011)
A Location-Based Handoff Scheme Based on IEEE 802.21 in Heterogeneous
Wireless Networks 571
Fang-Yie Leu andKuo-Chi Liang
A Semi-preemptive Ad Hoc Computational Service System with Limited
Resources 577
Fang-Yie Leu and Keng-Yen Chao
Maximizing Throughput for Delay-Constraint Transmissions with Smart
Antenna Systems in WLANs 583
Li-Ling Hung, Sheng-Han Wu, and Chao-Tsun Chang
xiv
An AC LED Smart Lighting System with Visible Light Time-Division
Multiplexing Free Space Optical Communication 589
Fenq-Lin Jenq, Tang-Jen Liu, and Fang-Yie Leu
Session 1: Security Systems and Algorithms (WAIS 2011)
Time Estimation of Cheon's Algorithm over Elliptic Curves on Finite Fields
with Characteristic 3 594
Tetsuya Jzu, Masahiko Takenaka, and Masaya Yasuda
Identity Continuance in Single Sign-On with Authentication Server Failure 597
Kakizaki Yoshio, Maeda Kazunari, and Iwamura Keiichi
A Multiplicative Extension for Discrete Logarithms on Ordinary
Pairing-Friendly Curves of Embedding Degree 603
Yasuyuki Nogami, Erika Yanagi, Taichi Sumo, Tomoko Matsushima, and Satoshi Uehara
Design and Implementation of a Forced Encryption Kernel Module 607
Jun Furukawa, Akihira Sakai, TakashiNishi.de, Yoshiaki Hori, andKouichi Sakurai
Session 2: Information Security (WAIS 2011)
Identifier Migration in OpenID 612
Maeda Kazunari, Kakizaki Yoshio, andIwamura Keiichi
Pvho Method with Period k on Non-symmetric Ordinary Pairings
of Embedding Degree k - Especially for Barreto-Naehrig Curves 618
Yasuyuki Nogami, Yusuke Takai, Tomoko Matsushima, and Satoshi Uehara
Distributed Collaborative Filtering Protocol Based on Quasi-homomorphic
Similarity 622
Hiroaki Kikuchi, Yoshiki Aoki, Masayuki Terada, Kazuhiko Ishii, and Kimihiko Sekino
Session 3: Secure Schemes and Frameworks (WAIS 2011)
32-bit as Number Based IP Traceback : 628
Masayuki Okada, Yasuharu Katsuno, Akira Kanaoka, and Eiji Okamoto
Optimal Constructions ofVisual Secret Sharing Schemes for the Graph Access
Structure 634
Yuji Suga
Traceback Framework against Botmaster by Sharing Network Communication
Pattern Information 639
Seiichiro Mizoguchi, Keisuke Takemori, Yulaka Miyake, Yoshiaki Hori,
andKouichi Sakurai
Author Index .645