Tam Vu - Academia.edu (original) (raw)

Papers by Tam Vu

Research paper thumbnail of Tracking vehicular speed variations by warping mobile phone signal strengths

IEEE International Conference on Pervasive Computing and Communications, 2011

In this paper, we consider the problem of tracking fine-grained speeds variations of vehicles usi... more In this paper, we consider the problem of tracking fine-grained speeds variations of vehicles using signal strength traces from GSM enabled phones. Existing speed estimation techniques using mobile phone signals can provide longer-term speed averages but cannot track short-term speed variations. Understanding short-term speed variations, however, is important in a variety of traffic engineering applications-for example, it may help distinguish slow speeds due to traffic lights from traffic congestion when collecting real time traffic information. Using mobile phones in such applications is particularly attractive because it can be readily obtained from a large number of vehicles.

Research paper thumbnail of DMap: A Shared Hosting Scheme for Dynamic Identifier to Locator Mappings in the Global Internet

International Conference on Distributed Computing Systems, 2012

This paper presents the design and evaluation of a novel distributed shared hosting approach, DMa... more This paper presents the design and evaluation of a novel distributed shared hosting approach, DMap, for managing dynamic identifier to locator mappings in the global Internet. DMap is the foundation for a fast global name resolution service necessary to enable emerging Internet services such as seamless mobility support, content delivery and cloud computing. Our approach distributes identifier to locator mappings amongst Autonomous Systems (ASs) by directly applying K>1 consistent hash functions on the identifier to produce network addresses of the AS gateway routers at which the mapping will be stored. This direct mapping technique leverages the reachability information of the underlying routing mechanism which is already available at the network layer, and achieves low lookup latencies through a single overlay hop without additional maintenance overheads. The proposed DMap technique is described in detail and specific design problems such as address space fragmentation, reducing latency through replication, taking advantage of spatial locality, as well as coping with inconsistent entries are individually addressed. Evaluation results are presented from a large-scale discrete event simulation of the Internet with ∼26,000 ASs using real-world traffic traces from the DIMES repository. The results show that the proposed method evenly balances storage load across the global network while achieving lookup latencies with a mean value of ∼50 ms and 95 th percentile value of ∼100 ms, considered adequate for support of dynamic mobility across the global Internet.

Research paper thumbnail of Demo: user identification and authentication with capacitive touch communication

Today's identification and authentication mechanisms for touchscreen-enabled devices are cumberso... more Today's identification and authentication mechanisms for touchscreen-enabled devices are cumbersome and do not support brief usage and device sharing. To address this challenge, this work explores a novel form of "wireless" communication that exploits the capacitive touchscreens which are now used in laptops, phones, and tablets, as a signal receiver. Using a custom built hardware token, in the form of a wearable ring, we show a proof-of-concept system that transmits a user identification code to the mobile device through the touchscreen. This mechanism works without any modification to the hardware or the firmware of the mobile device.

Research paper thumbnail of Phantom: Physical layer cooperation for location privacy protection

IEEE INFOCOM, 2012

Localization techniques that allow inferring the location of wireless devices directly from recei... more Localization techniques that allow inferring the location of wireless devices directly from received signals have exposed mobile users to new threats. Adversaries can easily collect required information (such as signal strength) from target users, however, techniques securing location information at the physical layer of the wireless communication systems have not received much attention. In this paper, we propose Phantom, a novel approach to allow mobile devices thwart unauthorized adversary's location tracking by creating forged locations. In particular, Phantom leverages cooperation among multiple mobile devices in close vicinity and utilizes synchronized transmissions among those nodes to obfuscate localization efforts of adversary systems. Through an implementation on software-defined radios (GNU Radios) and extensive simulation with real location traces, we see that Phantom can improve location privacy.

Research paper thumbnail of Ask, don't search: A social help engine for online social network mobile users

Sarnoff Symposium, IEEE, 2012

In this paper, we present the architectural details of Odin Help Engine, a novel social search en... more In this paper, we present the architectural details of Odin Help Engine, a novel social search engine that leverages online social networks and sensing data from mobile devices to find targeted answers for subjective queries and recommendation requests. In Odin, users' queries are routed to those connections in their social network who (i) are most likely to help answer the question and (ii) can do so with a high level of confidence. Specifically, we first apply a link-based latent variable model to infer social relationships between users from their social network data to form a strength-weighted relationship graph. We then infer users' expertise by context mining from social network data as well as from their mobile device sensor data. Lastly we apply pagerank-like algorithm that takes both relationship strength and user expertise into account to find a person that is most likely willing to answer the question posted by the user. We present the general design of the architecture and outline a location-related query example for detailed illustration.

Research paper thumbnail of Comparing alternative approaches for networking of named objects in the future Internet

IEEE Conference on Computer Communications Workshops, INFOCOM Wksps, 2012

This paper describes and compares alternative architectures for achieving the functional goals of... more This paper describes and compares alternative architectures for achieving the functional goals of name oriented networking. The CCN (content-centric network) scheme proposed by Van Jacobson is contrasted with hybrid name and address based routing proposed in conjunction with the MobilityFirst (MF) future Internet architecture. In a CCN network, routers forward data directly on content names (such as URNs), achieving elegant and efficient retrieval of content files; the framework can also be extended to other communications services such as VoIP. The MF scheme supports name-based communication services by introducing the concept of a flat 'globally unique identifier (GUID)', which is used as the authoritative header for routing. Further, the GUID is dynamically mapped to one or more topological network addresses using a global name resolution service (GNRS). This leads to a hybrid GUID and network address based routing (HGN) scheme in which routers operate with both flat names (GUIDs) and network addresses, reducing routing table size and overhead at the cost of a fast distributed service for dynamic mapping of names to addresses. Protocol operations for both CCN and HGN are outlined in context of specific services including content retrieval, unicast and mobility. Preliminary evaluations of scalability and performance for both schemes are given using simple analytical models and selected results from Internet-scale simulations for GNRS and BGP.

Research paper thumbnail of Detecting driver phone use leveraging car speakers

This work addresses the fundamental problem of distinguishing between a driver and passenger usin... more This work addresses the fundamental problem of distinguishing between a driver and passenger using a mobile phone, which is the critical input to enable numerous safety and interface enhancements. Our detection system leverages the existing car stereo infrastructure, in particular, the speakers and Bluetooth network. Our acoustic approach has the phone send a series of customized high frequency beeps via the car stereo. The beeps are spaced in time across the left, right, and if available, front and rear speakers. After sampling the beeps, we use a sequential change-point detection scheme to time their arrival, and then use a differential approach to estimate the phone's distance from the car's center. From these differences a passenger or driver classification can be made. To validate our approach, we experimented with two kinds of phones and in two different cars. We found that our customized beeps were imperceptible to most users, yet still playable and recordable in both cars. Our customized beeps were also robust to background sounds such as music and wind, and we found the signal processing did not require excessive computational resources. In spite of the cars' heavy multi-path environment, our approach had a classification accuracy of over 90%, and around 95% with some calibrations. We also found we have a low false positive rate, on the order of a few percent.

Research paper thumbnail of Enabling Vehicular Networking in the MobilityFirst Future Internet Architecture ⋆

Workshop on Wireless Mobile Multimedia, 2013

Vehicular networking, both vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I), is an in... more Vehicular networking, both vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I), is an increasingly important usage scenario for future mobile Internet services. Radio technologies such as 3G/4G and WAVE/802.11p now enable vehicles to communicate with each other and connect to the Internet, but there is still the lack of a unifying network protocol architecture for delivery of services across both V2V and V2I modes. The MobilityFirst future Internet architecture, discussed in this paper, is a clean-slate protocol design in which the requirements of untethered nodes and dynamically formed networks are considered from the ground-up, making it particularly suitable for vehicular applications. Here we describe the vehicular networking specific features and protocol design details of the architecture and present evaluation results on performance and scalability.

Research paper thumbnail of Detecting driver phone use leveraging car speakers

Proceedings of the 17th annual international conference on Mobile computing and networking - MobiCom '11, 2011

This work addresses the fundamental problem of distinguishing between a driver and passenger usin... more This work addresses the fundamental problem of distinguishing between a driver and passenger using a mobile phone, which is the critical input to enable numerous safety and interface enhancements. Our detection system leverages the existing car stereo infrastructure, in particular, the speakers and Bluetooth network. Our acoustic approach has the phone send a series of customized high frequency beeps via the car stereo. The beeps are spaced in time across the left, right, and if available, front and rear speakers. After sampling the beeps, we use a sequential change-point detection scheme to time their arrival, and then use a differential approach to estimate the phone's distance from the car's center. From these differences a passenger or driver classification can be made. To validate our approach, we experimented with two kinds of phones and in two different cars. We found that our customized beeps were imperceptible to most users, yet still playable and recordable in both cars. Our customized beeps were also robust to background sounds such as music and wind, and we found the signal processing did not require excessive computational resources. In spite of the cars' heavy multi-path environment, our approach had a classification accuracy of over 90%, and around 95% with some calibrations. We also found we have a low false positive rate, on the order of a few percent.

Research paper thumbnail of Enabling vehicular networking in the MobilityFirst future internet architecture

2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM), 2013

Vehicular networking, both vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I), is an in... more Vehicular networking, both vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I), is an increasingly important usage scenario for future mobile Internet services. Radio technologies such as 3G/4G and WAVE/802.11p now enable vehicles to communicate with each other and connect to the Internet, but there is still the lack of a unifying network protocol architecture for delivery of services across both V2V and V2I modes. The MobilityFirst future Internet architecture, discussed in this paper, is a clean-slate protocol design in which the requirements of untethered nodes and dynamically formed networks are considered from the ground-up, making it particularly suitable for vehicular applications. Here we describe the vehicular networking specific features and protocol design details of the architecture and present evaluation results on performance and scalability.

Research paper thumbnail of Demo

Proceedings of the 10th international conference on Mobile systems, applications, and services - MobiSys '12, 2012

Research paper thumbnail of Tracking vehicular speed variations by warping mobile phone signal strengths

2011 IEEE International Conference on Pervasive Computing and Communications (PerCom), 2011

In this paper, we consider the problem of tracking fine-grained speeds variations of vehicles usi... more In this paper, we consider the problem of tracking fine-grained speeds variations of vehicles using signal strength traces from GSM enabled phones. Existing speed estimation techniques using mobile phone signals can provide longer-term speed averages but cannot track short-term speed variations. Understanding short-term speed variations, however, is important in a variety of traffic engineering applications-for example, it may help distinguish slow speeds due to traffic lights from traffic congestion when collecting real time traffic information. Using mobile phones in such applications is particularly attractive because it can be readily obtained from a large number of vehicles.

Research paper thumbnail of Comparing alternative approaches for networking of named objects in the future Internet

2012 Proceedings IEEE INFOCOM Workshops, 2012

This paper describes and compares alternative architectures for achieving the functional goals of... more This paper describes and compares alternative architectures for achieving the functional goals of name oriented networking. The CCN (content-centric network) scheme proposed by Van Jacobson is contrasted with hybrid name and address based routing proposed in conjunction with the MobilityFirst (MF) future Internet architecture. In a CCN network, routers forward data directly on content names (such as URNs), achieving elegant and efficient retrieval of content files; the framework can also be extended to other communications services such as VoIP. The MF scheme supports name-based communication services by introducing the concept of a flat 'globally unique identifier (GUID)', which is used as the authoritative header for routing. Further, the GUID is dynamically mapped to one or more topological network addresses using a global name resolution service (GNRS). This leads to a hybrid GUID and network address based routing (HGN) scheme in which routers operate with both flat names (GUIDs) and network addresses, reducing routing table size and overhead at the cost of a fast distributed service for dynamic mapping of names to addresses. Protocol operations for both CCN and HGN are outlined in context of specific services including content retrieval, unicast and mobility. Preliminary evaluations of scalability and performance for both schemes are given using simple analytical models and selected results from Internet-scale simulations for GNRS and BGP.

Research paper thumbnail of Phantom: Physical layer cooperation for location privacy protection

2012 Proceedings IEEE INFOCOM, 2012

Localization techniques that allow inferring the location of wireless devices directly from recei... more Localization techniques that allow inferring the location of wireless devices directly from received signals have exposed mobile users to new threats. Adversaries can easily collect required information (such as signal strength) from target users, however, techniques securing location information at the physical layer of the wireless communication systems have not received much attention. In this paper, we propose Phantom , a novel approach to allow mobile devices thwart unauthorized adversary's location tracking by creating forged locations. In particular, Phantom leverages cooperation among multiple mobile devices in close vicinity and utilizes synchronized transmissions among those nodes to obfuscate localization efforts of adversary systems. Through an implementation on software-defined radios (GNU Radios) and extensive simulation with real location traces, we see that Phantom can improve location privacy.

Research paper thumbnail of Sensing Driver Phone Use with Acoustic Ranging through Car Speakers

IEEE Transactions on Mobile Computing, 2000

This work addresses the fundamental problem of distinguishing between a driver and passenger usin... more This work addresses the fundamental problem of distinguishing between a driver and passenger using a mobile phone, which is the critical input to enable numerous safety and interface enhancements. Our detection system leverages the existing car stereo infrastructure, in particular, the speakers and Bluetooth network. Our acoustic approach has the phone send a series of customized high frequency beeps via the car stereo. The beeps are spaced in time across the left, right, and if available, front and rear speakers. After sampling the beeps, we use a sequential change-point detection scheme to time their arrival, and then use a differential approach to estimate the phone's distance from the car's center. From these differences a passenger or driver classification can be made. To validate our approach, we experimented with two kinds of phones and in two different cars. We found that our customized beeps were imperceptible to most users, yet still playable and recordable in both cars. Our customized beeps were also robust to background sounds such as music and wind, and we found the signal processing did not require excessive computational resources. In spite of the cars' heavy multipath environment, our approach had a classification accuracy of over 90 percent, and around 95 percent with some calibrations. We also found, we have a low false positive rate, on the order of a few percent.

Research paper thumbnail of Capacitive Touch Communication: A Technique to Input Data through Devices' Touch Screen

IEEE Transactions on Mobile Computing, 2000

ABSTRACT As we are surrounded by an ever-larger variety of post-PC devices, the traditional metho... more ABSTRACT As we are surrounded by an ever-larger variety of post-PC devices, the traditional methods for identifying and authenticating users have become cumbersome and time consuming. In this paper, we present a capacitive communication method through which a device can recognize who is interacting with it. This method exploits the capacitive touchscreens, which are now used in laptops, phones, and tablets, as a signal receiver. The signal that identifies the user can be generated by a small transmitter embedded into a ring, watch, or other artifact carried on the human body. We explore two example system designs with a low-power continuous transmitter that communicates through the skin and a signet ring that needs to be touched to the screen. Experiments with our prototype transmitter and tablet receiver show that capacitive communication through a touchscreen is possible, even without hardware or firmware modifications on a receiver. This latter approach imposes severe limits on the data rate, but the rate is sufficient for differentiating users in multiplayer tablet games or parental control applications. Controlled experiments with a signal generator also indicate that future designs may be able to achieve data rates that are useful for providing less obtrusive authentication with similar assurance as PIN codes or swipe patterns commonly used on smartphones today.

Research paper thumbnail of Personal Touch-Identification Tokens

IEEE Pervasive Computing, 2000

ABSTRACT Touch-based personal tokens would let devices unobtrusively identify who is interacting ... more ABSTRACT Touch-based personal tokens would let devices unobtrusively identify who is interacting with the device at any given time. Devices could then tailor services to users and control access to sensitive information and online services. The authors present an approach for using a wearable personal token, in the form of a ring, to send an identification code to devices through touch.

Research paper thumbnail of Distinguishing users with capacitive touch communication

As we are surrounded by an ever-larger variety of post-PC devices, the traditional methods for id... more As we are surrounded by an ever-larger variety of post-PC devices, the traditional methods for identifying and authenticating users have become cumbersome and time-consuming. In this paper, we present a capacitive communication method through which a device can recognize who is interacting with it. This method exploits the capacitive touchscreens, which are now used in laptops, phones, and tablets, as a signal receiver. The signal that identifies the user can be generated by a small transmitter embedded into a ring, watch, or other artifact carried on the human body. We explore two example system designs with a low-power continuous transmitter that communicates through the skin and a signet ring that needs to be touched to the screen. Experiments with our prototype transmitter and tablet receiver show that capacitive communication through a touchscreen is possible, even without hardware or firmware modifications on a receiver. This latter approach imposes severe limits on the data rate, but the rate is sufficient for differentiating users in multiplayer tablet games or parental control applications. Controlled experiments with a signal generator also indicate that future designs may be able to achieve datarates that are useful for providing less obtrusive authentication with similar assurance as PIN codes or swipe patterns commonly used on smartphones today.

Research paper thumbnail of Sectoral Analysis of Foreign Investment and Growth In the Developed Countries

Empirical studies on FDI and growth in developed countries have yielded conflicting results using... more Empirical studies on FDI and growth in developed countries have yielded conflicting results using crosscountry regressions. We use sectoral data for a group of six country members of the Organization for Economic Cooperation and Development. Our paper is the first to identify the sector-specific impact of FDI on growth in the developed countries. Our results show that FDI might have positive or negative effect on economic growth operating directly and through its interaction with labor. Moreover, we find the effects seem to be very different across countries and economic sectors.

Research paper thumbnail of The Economics of Natural Disasters in a Developing Country: The Case of Vietnam

We examine impact of natural disasters on annual output and output growth in Vietnam. Using provi... more We examine impact of natural disasters on annual output and output growth in Vietnam. Using provincial data for primary and secondary industries in Vietnam, we employ the Blundell-Bond System GMM procedure to estimate the impact of disasters on the macroeconomy. Results show that more lethal disasters result in lower output growth but that more costly disasters (in terms of destroyed capital) actually appear to boost the economy in the short-run. This result is consistent with the 'creative destruction' hypothesis that we outline. However we find that disasters have different macroeconomic impact in different geographical regions; and these differences are potentially related to the ability to generate transfers from the central government.

Research paper thumbnail of Tracking vehicular speed variations by warping mobile phone signal strengths

IEEE International Conference on Pervasive Computing and Communications, 2011

In this paper, we consider the problem of tracking fine-grained speeds variations of vehicles usi... more In this paper, we consider the problem of tracking fine-grained speeds variations of vehicles using signal strength traces from GSM enabled phones. Existing speed estimation techniques using mobile phone signals can provide longer-term speed averages but cannot track short-term speed variations. Understanding short-term speed variations, however, is important in a variety of traffic engineering applications-for example, it may help distinguish slow speeds due to traffic lights from traffic congestion when collecting real time traffic information. Using mobile phones in such applications is particularly attractive because it can be readily obtained from a large number of vehicles.

Research paper thumbnail of DMap: A Shared Hosting Scheme for Dynamic Identifier to Locator Mappings in the Global Internet

International Conference on Distributed Computing Systems, 2012

This paper presents the design and evaluation of a novel distributed shared hosting approach, DMa... more This paper presents the design and evaluation of a novel distributed shared hosting approach, DMap, for managing dynamic identifier to locator mappings in the global Internet. DMap is the foundation for a fast global name resolution service necessary to enable emerging Internet services such as seamless mobility support, content delivery and cloud computing. Our approach distributes identifier to locator mappings amongst Autonomous Systems (ASs) by directly applying K>1 consistent hash functions on the identifier to produce network addresses of the AS gateway routers at which the mapping will be stored. This direct mapping technique leverages the reachability information of the underlying routing mechanism which is already available at the network layer, and achieves low lookup latencies through a single overlay hop without additional maintenance overheads. The proposed DMap technique is described in detail and specific design problems such as address space fragmentation, reducing latency through replication, taking advantage of spatial locality, as well as coping with inconsistent entries are individually addressed. Evaluation results are presented from a large-scale discrete event simulation of the Internet with ∼26,000 ASs using real-world traffic traces from the DIMES repository. The results show that the proposed method evenly balances storage load across the global network while achieving lookup latencies with a mean value of ∼50 ms and 95 th percentile value of ∼100 ms, considered adequate for support of dynamic mobility across the global Internet.

Research paper thumbnail of Demo: user identification and authentication with capacitive touch communication

Today's identification and authentication mechanisms for touchscreen-enabled devices are cumberso... more Today's identification and authentication mechanisms for touchscreen-enabled devices are cumbersome and do not support brief usage and device sharing. To address this challenge, this work explores a novel form of "wireless" communication that exploits the capacitive touchscreens which are now used in laptops, phones, and tablets, as a signal receiver. Using a custom built hardware token, in the form of a wearable ring, we show a proof-of-concept system that transmits a user identification code to the mobile device through the touchscreen. This mechanism works without any modification to the hardware or the firmware of the mobile device.

Research paper thumbnail of Phantom: Physical layer cooperation for location privacy protection

IEEE INFOCOM, 2012

Localization techniques that allow inferring the location of wireless devices directly from recei... more Localization techniques that allow inferring the location of wireless devices directly from received signals have exposed mobile users to new threats. Adversaries can easily collect required information (such as signal strength) from target users, however, techniques securing location information at the physical layer of the wireless communication systems have not received much attention. In this paper, we propose Phantom, a novel approach to allow mobile devices thwart unauthorized adversary's location tracking by creating forged locations. In particular, Phantom leverages cooperation among multiple mobile devices in close vicinity and utilizes synchronized transmissions among those nodes to obfuscate localization efforts of adversary systems. Through an implementation on software-defined radios (GNU Radios) and extensive simulation with real location traces, we see that Phantom can improve location privacy.

Research paper thumbnail of Ask, don't search: A social help engine for online social network mobile users

Sarnoff Symposium, IEEE, 2012

In this paper, we present the architectural details of Odin Help Engine, a novel social search en... more In this paper, we present the architectural details of Odin Help Engine, a novel social search engine that leverages online social networks and sensing data from mobile devices to find targeted answers for subjective queries and recommendation requests. In Odin, users' queries are routed to those connections in their social network who (i) are most likely to help answer the question and (ii) can do so with a high level of confidence. Specifically, we first apply a link-based latent variable model to infer social relationships between users from their social network data to form a strength-weighted relationship graph. We then infer users' expertise by context mining from social network data as well as from their mobile device sensor data. Lastly we apply pagerank-like algorithm that takes both relationship strength and user expertise into account to find a person that is most likely willing to answer the question posted by the user. We present the general design of the architecture and outline a location-related query example for detailed illustration.

Research paper thumbnail of Comparing alternative approaches for networking of named objects in the future Internet

IEEE Conference on Computer Communications Workshops, INFOCOM Wksps, 2012

This paper describes and compares alternative architectures for achieving the functional goals of... more This paper describes and compares alternative architectures for achieving the functional goals of name oriented networking. The CCN (content-centric network) scheme proposed by Van Jacobson is contrasted with hybrid name and address based routing proposed in conjunction with the MobilityFirst (MF) future Internet architecture. In a CCN network, routers forward data directly on content names (such as URNs), achieving elegant and efficient retrieval of content files; the framework can also be extended to other communications services such as VoIP. The MF scheme supports name-based communication services by introducing the concept of a flat 'globally unique identifier (GUID)', which is used as the authoritative header for routing. Further, the GUID is dynamically mapped to one or more topological network addresses using a global name resolution service (GNRS). This leads to a hybrid GUID and network address based routing (HGN) scheme in which routers operate with both flat names (GUIDs) and network addresses, reducing routing table size and overhead at the cost of a fast distributed service for dynamic mapping of names to addresses. Protocol operations for both CCN and HGN are outlined in context of specific services including content retrieval, unicast and mobility. Preliminary evaluations of scalability and performance for both schemes are given using simple analytical models and selected results from Internet-scale simulations for GNRS and BGP.

Research paper thumbnail of Detecting driver phone use leveraging car speakers

This work addresses the fundamental problem of distinguishing between a driver and passenger usin... more This work addresses the fundamental problem of distinguishing between a driver and passenger using a mobile phone, which is the critical input to enable numerous safety and interface enhancements. Our detection system leverages the existing car stereo infrastructure, in particular, the speakers and Bluetooth network. Our acoustic approach has the phone send a series of customized high frequency beeps via the car stereo. The beeps are spaced in time across the left, right, and if available, front and rear speakers. After sampling the beeps, we use a sequential change-point detection scheme to time their arrival, and then use a differential approach to estimate the phone's distance from the car's center. From these differences a passenger or driver classification can be made. To validate our approach, we experimented with two kinds of phones and in two different cars. We found that our customized beeps were imperceptible to most users, yet still playable and recordable in both cars. Our customized beeps were also robust to background sounds such as music and wind, and we found the signal processing did not require excessive computational resources. In spite of the cars' heavy multi-path environment, our approach had a classification accuracy of over 90%, and around 95% with some calibrations. We also found we have a low false positive rate, on the order of a few percent.

Research paper thumbnail of Enabling Vehicular Networking in the MobilityFirst Future Internet Architecture ⋆

Workshop on Wireless Mobile Multimedia, 2013

Vehicular networking, both vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I), is an in... more Vehicular networking, both vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I), is an increasingly important usage scenario for future mobile Internet services. Radio technologies such as 3G/4G and WAVE/802.11p now enable vehicles to communicate with each other and connect to the Internet, but there is still the lack of a unifying network protocol architecture for delivery of services across both V2V and V2I modes. The MobilityFirst future Internet architecture, discussed in this paper, is a clean-slate protocol design in which the requirements of untethered nodes and dynamically formed networks are considered from the ground-up, making it particularly suitable for vehicular applications. Here we describe the vehicular networking specific features and protocol design details of the architecture and present evaluation results on performance and scalability.

Research paper thumbnail of Detecting driver phone use leveraging car speakers

Proceedings of the 17th annual international conference on Mobile computing and networking - MobiCom '11, 2011

This work addresses the fundamental problem of distinguishing between a driver and passenger usin... more This work addresses the fundamental problem of distinguishing between a driver and passenger using a mobile phone, which is the critical input to enable numerous safety and interface enhancements. Our detection system leverages the existing car stereo infrastructure, in particular, the speakers and Bluetooth network. Our acoustic approach has the phone send a series of customized high frequency beeps via the car stereo. The beeps are spaced in time across the left, right, and if available, front and rear speakers. After sampling the beeps, we use a sequential change-point detection scheme to time their arrival, and then use a differential approach to estimate the phone's distance from the car's center. From these differences a passenger or driver classification can be made. To validate our approach, we experimented with two kinds of phones and in two different cars. We found that our customized beeps were imperceptible to most users, yet still playable and recordable in both cars. Our customized beeps were also robust to background sounds such as music and wind, and we found the signal processing did not require excessive computational resources. In spite of the cars' heavy multi-path environment, our approach had a classification accuracy of over 90%, and around 95% with some calibrations. We also found we have a low false positive rate, on the order of a few percent.

Research paper thumbnail of Enabling vehicular networking in the MobilityFirst future internet architecture

2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM), 2013

Vehicular networking, both vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I), is an in... more Vehicular networking, both vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I), is an increasingly important usage scenario for future mobile Internet services. Radio technologies such as 3G/4G and WAVE/802.11p now enable vehicles to communicate with each other and connect to the Internet, but there is still the lack of a unifying network protocol architecture for delivery of services across both V2V and V2I modes. The MobilityFirst future Internet architecture, discussed in this paper, is a clean-slate protocol design in which the requirements of untethered nodes and dynamically formed networks are considered from the ground-up, making it particularly suitable for vehicular applications. Here we describe the vehicular networking specific features and protocol design details of the architecture and present evaluation results on performance and scalability.

Research paper thumbnail of Demo

Proceedings of the 10th international conference on Mobile systems, applications, and services - MobiSys '12, 2012

Research paper thumbnail of Tracking vehicular speed variations by warping mobile phone signal strengths

2011 IEEE International Conference on Pervasive Computing and Communications (PerCom), 2011

In this paper, we consider the problem of tracking fine-grained speeds variations of vehicles usi... more In this paper, we consider the problem of tracking fine-grained speeds variations of vehicles using signal strength traces from GSM enabled phones. Existing speed estimation techniques using mobile phone signals can provide longer-term speed averages but cannot track short-term speed variations. Understanding short-term speed variations, however, is important in a variety of traffic engineering applications-for example, it may help distinguish slow speeds due to traffic lights from traffic congestion when collecting real time traffic information. Using mobile phones in such applications is particularly attractive because it can be readily obtained from a large number of vehicles.

Research paper thumbnail of Comparing alternative approaches for networking of named objects in the future Internet

2012 Proceedings IEEE INFOCOM Workshops, 2012

This paper describes and compares alternative architectures for achieving the functional goals of... more This paper describes and compares alternative architectures for achieving the functional goals of name oriented networking. The CCN (content-centric network) scheme proposed by Van Jacobson is contrasted with hybrid name and address based routing proposed in conjunction with the MobilityFirst (MF) future Internet architecture. In a CCN network, routers forward data directly on content names (such as URNs), achieving elegant and efficient retrieval of content files; the framework can also be extended to other communications services such as VoIP. The MF scheme supports name-based communication services by introducing the concept of a flat 'globally unique identifier (GUID)', which is used as the authoritative header for routing. Further, the GUID is dynamically mapped to one or more topological network addresses using a global name resolution service (GNRS). This leads to a hybrid GUID and network address based routing (HGN) scheme in which routers operate with both flat names (GUIDs) and network addresses, reducing routing table size and overhead at the cost of a fast distributed service for dynamic mapping of names to addresses. Protocol operations for both CCN and HGN are outlined in context of specific services including content retrieval, unicast and mobility. Preliminary evaluations of scalability and performance for both schemes are given using simple analytical models and selected results from Internet-scale simulations for GNRS and BGP.

Research paper thumbnail of Phantom: Physical layer cooperation for location privacy protection

2012 Proceedings IEEE INFOCOM, 2012

Localization techniques that allow inferring the location of wireless devices directly from recei... more Localization techniques that allow inferring the location of wireless devices directly from received signals have exposed mobile users to new threats. Adversaries can easily collect required information (such as signal strength) from target users, however, techniques securing location information at the physical layer of the wireless communication systems have not received much attention. In this paper, we propose Phantom , a novel approach to allow mobile devices thwart unauthorized adversary's location tracking by creating forged locations. In particular, Phantom leverages cooperation among multiple mobile devices in close vicinity and utilizes synchronized transmissions among those nodes to obfuscate localization efforts of adversary systems. Through an implementation on software-defined radios (GNU Radios) and extensive simulation with real location traces, we see that Phantom can improve location privacy.

Research paper thumbnail of Sensing Driver Phone Use with Acoustic Ranging through Car Speakers

IEEE Transactions on Mobile Computing, 2000

This work addresses the fundamental problem of distinguishing between a driver and passenger usin... more This work addresses the fundamental problem of distinguishing between a driver and passenger using a mobile phone, which is the critical input to enable numerous safety and interface enhancements. Our detection system leverages the existing car stereo infrastructure, in particular, the speakers and Bluetooth network. Our acoustic approach has the phone send a series of customized high frequency beeps via the car stereo. The beeps are spaced in time across the left, right, and if available, front and rear speakers. After sampling the beeps, we use a sequential change-point detection scheme to time their arrival, and then use a differential approach to estimate the phone's distance from the car's center. From these differences a passenger or driver classification can be made. To validate our approach, we experimented with two kinds of phones and in two different cars. We found that our customized beeps were imperceptible to most users, yet still playable and recordable in both cars. Our customized beeps were also robust to background sounds such as music and wind, and we found the signal processing did not require excessive computational resources. In spite of the cars' heavy multipath environment, our approach had a classification accuracy of over 90 percent, and around 95 percent with some calibrations. We also found, we have a low false positive rate, on the order of a few percent.

Research paper thumbnail of Capacitive Touch Communication: A Technique to Input Data through Devices' Touch Screen

IEEE Transactions on Mobile Computing, 2000

ABSTRACT As we are surrounded by an ever-larger variety of post-PC devices, the traditional metho... more ABSTRACT As we are surrounded by an ever-larger variety of post-PC devices, the traditional methods for identifying and authenticating users have become cumbersome and time consuming. In this paper, we present a capacitive communication method through which a device can recognize who is interacting with it. This method exploits the capacitive touchscreens, which are now used in laptops, phones, and tablets, as a signal receiver. The signal that identifies the user can be generated by a small transmitter embedded into a ring, watch, or other artifact carried on the human body. We explore two example system designs with a low-power continuous transmitter that communicates through the skin and a signet ring that needs to be touched to the screen. Experiments with our prototype transmitter and tablet receiver show that capacitive communication through a touchscreen is possible, even without hardware or firmware modifications on a receiver. This latter approach imposes severe limits on the data rate, but the rate is sufficient for differentiating users in multiplayer tablet games or parental control applications. Controlled experiments with a signal generator also indicate that future designs may be able to achieve data rates that are useful for providing less obtrusive authentication with similar assurance as PIN codes or swipe patterns commonly used on smartphones today.

Research paper thumbnail of Personal Touch-Identification Tokens

IEEE Pervasive Computing, 2000

ABSTRACT Touch-based personal tokens would let devices unobtrusively identify who is interacting ... more ABSTRACT Touch-based personal tokens would let devices unobtrusively identify who is interacting with the device at any given time. Devices could then tailor services to users and control access to sensitive information and online services. The authors present an approach for using a wearable personal token, in the form of a ring, to send an identification code to devices through touch.

Research paper thumbnail of Distinguishing users with capacitive touch communication

As we are surrounded by an ever-larger variety of post-PC devices, the traditional methods for id... more As we are surrounded by an ever-larger variety of post-PC devices, the traditional methods for identifying and authenticating users have become cumbersome and time-consuming. In this paper, we present a capacitive communication method through which a device can recognize who is interacting with it. This method exploits the capacitive touchscreens, which are now used in laptops, phones, and tablets, as a signal receiver. The signal that identifies the user can be generated by a small transmitter embedded into a ring, watch, or other artifact carried on the human body. We explore two example system designs with a low-power continuous transmitter that communicates through the skin and a signet ring that needs to be touched to the screen. Experiments with our prototype transmitter and tablet receiver show that capacitive communication through a touchscreen is possible, even without hardware or firmware modifications on a receiver. This latter approach imposes severe limits on the data rate, but the rate is sufficient for differentiating users in multiplayer tablet games or parental control applications. Controlled experiments with a signal generator also indicate that future designs may be able to achieve datarates that are useful for providing less obtrusive authentication with similar assurance as PIN codes or swipe patterns commonly used on smartphones today.

Research paper thumbnail of Sectoral Analysis of Foreign Investment and Growth In the Developed Countries

Empirical studies on FDI and growth in developed countries have yielded conflicting results using... more Empirical studies on FDI and growth in developed countries have yielded conflicting results using crosscountry regressions. We use sectoral data for a group of six country members of the Organization for Economic Cooperation and Development. Our paper is the first to identify the sector-specific impact of FDI on growth in the developed countries. Our results show that FDI might have positive or negative effect on economic growth operating directly and through its interaction with labor. Moreover, we find the effects seem to be very different across countries and economic sectors.

Research paper thumbnail of The Economics of Natural Disasters in a Developing Country: The Case of Vietnam

We examine impact of natural disasters on annual output and output growth in Vietnam. Using provi... more We examine impact of natural disasters on annual output and output growth in Vietnam. Using provincial data for primary and secondary industries in Vietnam, we employ the Blundell-Bond System GMM procedure to estimate the impact of disasters on the macroeconomy. Results show that more lethal disasters result in lower output growth but that more costly disasters (in terms of destroyed capital) actually appear to boost the economy in the short-run. This result is consistent with the 'creative destruction' hypothesis that we outline. However we find that disasters have different macroeconomic impact in different geographical regions; and these differences are potentially related to the ability to generate transfers from the central government.