24
IEEE CCNC 2013
DEMONSTRATIONS
Saturday, January 12, 2013
12:30 – 13:30 • 15:30 – 16:00
19:00 – 20:00
Room:
Scenic Room
Sunday, January 13, 2013
13:00 – 14:00 • 15:30 – 16:30
WeatherPlay
Authors: Arlene Ducao, Yuzhao Ni, Henry Holtzman,
Robert Hemsley
(MIT, USA)
In this paper, we examine the implementation and usage scenarios
for WeatherPlay, a web site that collects weather and travel TV clips,
microblog entries, amateur videos, and outdoor data. In order to
present a comprehensive picture of people's outdoor experiences,
WeatherPlay geo-locates this media and places it in both a map and
video gallery context.
LLCPS: A New Security Framework Based on
TLS For NFC P2P Applications in the Internet
of Things
Authors: Pascal Urien
(Télécom ParisTech, France)
The NFC (Near Field Communication) is a promising emerging
technology for the Internet of Things (IoT). It enables short range
communications (a few centimeters) with modest throughputs (a few
hundred Kbit/s) and low power consumption (a few mW). Although
this technology is deployed for payment, access control, or data
transfer applications, it is not today secure. This demonstration
presents the first implementation of the TLS protocol for NFC P2P
mode, according to a new framework, named LLCPS described by an
IETF draft. LLCPS should enable a wide range of secure services for
the IoT.
Prototype for Design-time Secure and
Trustworthy Service Composition
Authors: Bo Zhou, David Llewellyn-Jones, Qi Shi, Muhammad Asim,
Madjid Merabti
(Liverpool John Moores University, UK)
Service-oriented environments provide the opportunity for services
from different providers to work together, forming new composite
services via composition of existing services. However, in addition to
the intended outcomes, composition also introduces the potential for
unexpected or emergent behaviour, resulting in new uncertainties,
especially in the area of security. Funded by the European FP7
programme, our research focusses on providing a service
composition platform that is secure and trustworthy. We will
demonstrate the design-time prototype that show how to create
service compositions, verify them against security policies and make
sensible recommendations based on a user's security preferences.
EVANS3: Home Appliance Control System
with Appliance Authentication Framework
Using Augmented Reality Technology
Authors: Shinya Mihara, Kohei Kawai, Hideki Shimada,
Kenya Sato
(Doshisha University, Japan)
The popularity of network home appliances increases. However,
operation of such devices are complex, and are difficult for users to
identify the network home appliances they want to operate, since the
appliances' placed locations are not represented within the operating
system. For these problems, obvious and intuitive operations are
needed, and thus we have presented EVANS2 (Embodied Visualization
with Augmented Reality for Networked System 2) in our past proposal,
which implements augmented reality technology. We have also
implemented our proposed LED Marker as the AR marker to identify
the network home appliance's location in any altering light
environments. We propose an EVANS3 system, which is an LED
Marker installed framework of the EVANS2. By dynamically operating
the LED Marker, we achieve a comfortable and effective appliance
authentication environment for a suitable user's operating conditions,
and allow us to actually control the real home appliance through the
AR interface.
Prototypes of Opportunistic Wireless Sensor
Networks Supporting Indoor Air Quality
Monitoring
Authors: Petros Spachos, Liang Song, Dimitrios Hatzinakos
(University of Toronto, Canada)
In this demonstration proposal, we describe a prototype of a Wireless
Sensor Network (WSN) for monitoring the air quality of an arbitrary
indoor infrastructure environment. Specifically, the proposed
demonstration deals with an application of wireless mesh networks for
monitoring the carbon dioxide levels of an indoor environment,
supporting guaranteed real-time data acquisition and display. In the
proposed demonstration we will illustrate a number of advantages of
opportunistic routing, including dynamic node deployment and
dynamic routing path selection, opportunistic resource utilization,
robustness to interference and guaranteed multi-hop QoS (Quality of
Service) for an indoor gas concentration monitoring network.
TrafficCam: Sharing Traffic Information based
on Dynamic IPv6 Multicast Group Assignment
using Smartphone Sensors
Authors: Yohei Kanemaru, Satoru Noguchi, Atsuo Inomata,
Kazutoshi Fujikawa
(Nara Institute of Science and Technology, Japan)
Exchanging traffic information among nearby vehicles is one of
communication scenarios in the field of intelligent transport systems
(ITS). An important question in this scenario is ''How to deliver traffic
information only to a subsets of nearby vehicles in an identical road
traffic event?'', e.g., traffic congestion in a certain lane. In this paper,
we propose a dynamic IPv6 multicast group assignment mechanism
using GPS, accelerometer and magnetometer embedded in
smartphones. Our mechanism enables each node to determine a
relevant vehicle, and to compose a temporary IPv6 multicast address.
Our mechanism can deliver traffic information to a group of vehicles
sharing a particular situation. This demonstration shows a pseudo-
traffic congestion detection scenario using a prototype of the proposed
mechanism, implemented as an Android application called TrafficCam.
Our application demonstrates the validity of the proposed mechanism.
GEMS: SMS-based App Store for Growth
Economies
Authors: Daniel Risi, Mauro Ricardo da S Teófilo, Thomaz Silva
(Nokia Institute of Technology, Brazil)
Mobile applications have become one of the main pillars in the current
mobile industry ecosystems. But regardless of their unquestionable
popularity in the smartphone domain, a great challenge is still to be
faced in the feature phone arena: data connection is far from
ubiquitous among that segment. Besides the prohibitive cost of
mobile Internet plans for many users, especially in developing
1...,14,15,16,17,18,19,20,21,22,23 25,26,27,28,29,30