scispace - formally typeset
Search or ask a question

Showing papers by "Emiliano De Cristofaro published in 2007"


Book ChapterDOI
25 Nov 2007
TL;DR: In this paper, the authors describe an implementation of a novel framework named JXBT (JXME over Bluetooth), which allows the JXME infrastructure to use Bluetooth as the communication channel.
Abstract: Over the last years, research efforts have led the way to embed computation into the environment. Much attention is drawn to technologies supporting dynamicity and mobility over small devices which can follow the user anytime, anywhere. The Bluetooth standard particularly fits this idea, by providing a versatile and flexible wireless network technology with low power consumption. In this paper, we describe an implementation of a novel framework named JXBT (JXME over Bluetooth), which allows the JXME infrastructure to use Bluetooth as the communication channel. By exploiting the JXME functionalities we can overcome Bluetooth limitations, such as the maximum number of interconnectable devices (7 according to the Bluetooth standard) and the maximum transmission range (10 or 100 meters depending on the version). To test the lightness of JXBT, we designed and evaluated BlueIRC, an application running on top of JXBT. This application enables the set up of a chat among Bluetooth-enabled mobile devices, without requiring them to be within transmission range.

11 citations


Proceedings ArticleDOI
18 Jun 2007
TL;DR: This paper proposes a novel aggregation scheme which provides data integrity and privacy-protection and guarantees efficiency with respect to data transmissions, congestion, and memory overhead and tested its performance to verify its feasibility and evaluate the computation and power required to ensure security.
Abstract: Wireless sensor networks are emerging as a practical and powerful solution to monitoring problems. However, their use in real world scenarios faces several issues. In fact, sensor nodes are tiny devices with very limited resources, and thus it is important to optimize the battery consumption. For instance, aggregation operations are widely used to minimize transmission operations, that are the most power-consuming operations for the devices. In addition, since sensor nodes operate in open and often hostile environments, security issues must be taken into account. In this paper, we propose a novel aggregation scheme which provides data integrity and privacy-protection and guarantees efficiency with respect to data transmissions, congestion, and memory overhead. To test performance of the scheme, we implemented it within a simulation software environment. We tested its performance to verify its feasibility and we evaluated the computation and power required to ensure security. Simulation results confirmed that our scheme is to be considered efficient enough to being used in real world scenarios.

2 citations


Book ChapterDOI
01 Jan 2007
TL;DR: This paper proposes an implementation, based on WS- security, of an existing framework for authenticated Web metering, and compares it with an ad-hoc implementation, showing that WS-Security is mature enough to provide a flexible and dynamic layer to underlie complex and interactive applications which require security management.
Abstract: Web Services technology provides software developers with a wide range of tools and models to produce innovative distributed applications. After the initial diffusion of the standard technology the attention of the developers has focused on the ways to secure the information flows between clients and service providers. For this purpose several standards have been proposed and adopted. Another important issue is how to count the number of accesses to a given service in order to develop standard business models, in which the providers get paid for the offered resources. In this paper we propose an implementation, based on WS-Security, of an existing framework for authenticated Web metering, and compare it with an ad-hoc implementation. Our analysis shows that WS-Security is mature enough to provide a flexible and dynamic layer to underlie complex and interactive applications which require security management, without the need of developing ad-hoc solutions for each provided feature