skip to main content
10.1145/2222436.2222443acmotherconferencesArticle/Chapter ViewAbstractPublication PagesarmorConference Proceedingsconference-collections
research-article

AMORES: an architecture for mobiquitous resilient systems

Published: 08 May 2012 Publication History

Abstract

We present the AMORES project, which aims to provide an architecture for the provision of privacy preserving and resilient collaborative services in "mobiquitous" (i.e., mobile and ubiquitous) systems. The project is built around three use-cases from the area of public transportation: (1) dynamic carpooling, (2) real-time computation of multimodal transportation itineraries and (3) mobile social networking. Four main research tasks are presented in this paper. The first task deals with use-cases, prototypes and privacy assessment. The second task addresses geo-communication primitives: verified positioning, locanyms and geo-services. The third task deals with privacy-preserving communication means such as anonymous routing and geo-cryptography. Finally, the last task is devoted to collaborative behaviors.

References

[1]
E. Anceaume and A. Ravoaja. STORM: A secure overlay for p2p reputation management. In IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO 2007), 2007.
[2]
P. Bellavista and A. Corradi. The Handbook of Mobile Middleware. Auerbach Publications, 2006.
[3]
A. R. Beresford and F. Stajano. Location privacy in pervasive computing. IEEE Pervasive Computing, 3(1):46--55, 2003.
[4]
S. Brands and D. Chaum. Distance-bounded protocols (extended abstract). In EUROCRYPT'93, pages 244--359, 1993.
[5]
L. Bussard. Trust establishment protocols for communicating devices. PhD thesis, Eurecom, 2004.
[6]
S. Capkun, M. Cagalj, and S. M. Secure localization with hidden and mobile base stations. In Proc. of IEEE INFOCOM, 2006, 2006.
[7]
N. Chandran, V. Goyal, R. Moriarty, and R. Ostrovsky. Position based cryptography. In CRYPTO'09, pages 391--407, 2009.
[8]
T. Clausen and P. Jacquet. Optimized link state routing protocol (OLSR). IETF mobile ad hoc networking Working Group, RCF 3626, 2003.
[9]
L. Courtès, O. Hamouda, M. Kaaniche, M. Killijian, and D. Powell. Dependability evaluation of cooperative backup strategies for mobile devices. In 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC'07), 2007.
[10]
J. Douceur. The sybil attack. Peer-to-peer Systems, pages 251--260, 2002.
[11]
K. El Defrawy and G. Tsudik. Alarm: Anonymous location aided routing in suspicious manets. In Proc. of the 2007 IEEE International Conference of Network Protocols (ICNP'07), 2007.
[12]
K. El Defrawy and G. Tsudik. Prism: Privacy-friendly routing in suspicious manets (and vanets). In Proc. of the 2008 IEEE International Conference of Network Protocols (ICNP'08), October 2008.
[13]
M. S. Fallah and M. Mouzarani. A game-based sybil-resistant strategy for reputation systems in self-organizing MANETs. The Computer Journal, 2011.
[14]
E. Freeman, S. Hupfer, and K. Arnold. JavaSpaces: Principles, Patterns, and Practice. Addison-Wesley, 1999.
[15]
S. Gambs, M. Killijian, and M. Prado Cortez. Show me how you move and i will tell you who you are. In ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, 2010.
[16]
S. Gambs, M.-O. Killijian, M. Roy, and M. Traore. Locanyms: Towards privacy-preserving location-based services. Technical Report 12032, LAAS-CNRS, 2012.
[17]
E. Gudes, N. Gal-Oz, and A. Grubshtein. Methods for computing trust and reputation while preserving privacy. In Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII, pages 291--298, 2009.
[18]
H. Hsieh and R. Sivakumar. On using peer-to-peer communication in cellular wireless data networks. IEEE Trans. Mobile Comput., 3(1):57--72, 2004.
[19]
S. Kamvar, M. Schlosser, and H. Garcia-Molina. The eigentrust algorithm for reputation management in p2p networks. In Proc. of the Int'l Conference on World Wide Web (WWW), 2003.
[20]
M.-O. Killijian, R. Cunningham, R. Meier, L. Mazare, and V. Cahill. Towards group communication for mobile participants. In Proc. of Principles of Mobile Computing, POMC-2001, page 8, 2001.
[21]
M.-O. Killijian and M. Roy. Data backup for mobile nodes: a cooperative middleware and an experimentation platform. Architecting Dependable Systems, 7, 2009.
[22]
S. Marti and H. Garcia-Molina. Taxomany of trust: Categorizing p2p reputation systems. Computer Networks Journal, 50(4):472--484, 2006.
[23]
C. Mascolo, L. Capra, S. Zachariadis, and W. Emmerich. Xmiddle: a data-sharing middleware for mobile computing. Int. Journal on Wireless Personal Communication, 21(1):77--103, 2002.
[24]
B. Nitzberg and V. Lo. Distributed shared memory: a survey of issues and algorithms. IEEE Computer, 24:52--60, 1991.
[25]
C. Perkins, E. Belding-Royer, and S. Das. Ad hoc on-demand distance vector (AODV) routing. IETF mobile ad hoc networking WG, RFC 3561, 2003.
[26]
D. Quercia and S. Hailes. Sybil attacks against mobile users: friends and foes to the rescue. In Proc. of IEEE INFOCOM, 2010, pages 336--340, 2010.
[27]
M. Roy, F. Bonnet, L. Querzoni, S. Bonomi, M. Killijian, and D. Powell. Geo-registers: an abstraction for spatial-based distributed computing. In OPODIS'08, 2008.
[28]
N. Sastry, U. Shankar, and D. Wagner. Secure verification of location claims. In WiSe03, pages 1--10, 2003.
[29]
M. Satyanarayanan, J. Kistler, P. Kumar, M. Okasaki, E. Siegel, and D. Steere. CODA: a highly available file system for a distributed work- station environment. IEEE Trans. Comput., 39(4):447--459, 1990.
[30]
S. Seys and B. Preneel. ARM: Anonymous routing protocol for mobile ad hoc networks. In 20th International Conference on Advanced Information Networking and Applications, 2006.
[31]
S. Steinbrecher. Enhancing multilateral security in and by reputation systems. IFIP International Federation for Information Processing, 298, 2009.
[32]
P. Wyckoff, S. Mclaughry, T. Lehman, and F. D. TSpaces. IBM Syst. J., 37:454--474, 1998.
[33]
Y. Yu, B. Krishnamachari, and V. Prasanna. Issues in designing middleware for wireless sensor networks. IEEE Network, 1:15--21, 2004.
[34]
Y. Zhang, W. Liu, W. Lou, and Y. Fang. MASK: Anonymous on-demand routing in mobile ad hoc networks. IEEE Transactions on Wireless Communications, 5(9), 2006.
[35]
S. Zhong, J. Chen, and Y. R. Yang. Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In INFOCOM, 2003.

Cited By

View all
  • (2016)“Connected Car”-Based Customised On-Demand Tours: The Concept and Underlying TechnologiesInternet of Things, Smart Spaces, and Next Generation Networks and Systems10.1007/978-3-319-46301-8_11(131-140)Online publication date: 20-Sep-2016
  • (2014)Proactive Recommendation System for m-Tourism ApplicationPerspectives in Business Informatics Research10.1007/978-3-319-11370-8_9(113-127)Online publication date: 2014

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ARMOR '12: Proceedings of the 1st European Workshop on AppRoaches to MObiquiTous Resilience
May 2012
42 pages
ISBN:9781450311502
DOI:10.1145/2222436
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 May 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. geo-privacy
  2. mobility
  3. mobiquitous
  4. privacy

Qualifiers

  • Research-article

Funding Sources

Conference

ARMOR '12

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 08 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2016)“Connected Car”-Based Customised On-Demand Tours: The Concept and Underlying TechnologiesInternet of Things, Smart Spaces, and Next Generation Networks and Systems10.1007/978-3-319-46301-8_11(131-140)Online publication date: 20-Sep-2016
  • (2014)Proactive Recommendation System for m-Tourism ApplicationPerspectives in Business Informatics Research10.1007/978-3-319-11370-8_9(113-127)Online publication date: 2014

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media