Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Pekka Jäppinen is active.

Publication


Featured researches published by Pekka Jäppinen.


computational intelligence and security | 2008

Enhanced RFID Security Method with Ownership Transfer

Pekka Jäppinen; Harri Hämäläinen

The popularity of Radio Frequency Identification (RFID) has raised the interest towards its security. Threat concerns towards individuals privacy slows down the adoption of the technology in the new innovative application areas. In this paper we will describe simple and efficient security method for lightweight RFID tags with support for ownership transfer. It based on solution described by Osaka et al, which had some security flaws. Our solution fixes the security flaws while maintaining the simplicity and efficiency of the original method.


Journal of Network and Computer Applications | 2013

An applications perspective into the Future Internet

Pekka Jäppinen; Renata Guarneri; Luis M. Correia

The building of the Future Internet is well on its way with many research projects and experimental development activities in different parts of the works. However the debate over different approaches is still ongoing. Much of the comparison is concentrating on the different technical capabilities, however, very little effort has been put on finding out how such capabilities will actually be used by the different stakeholders and in particular by users and service providers. Decisions such as whether to take an evolutionary step with TCP/IP, start to use cellular protocols, or develop something new, should be based on realistic and validated user scenarios clearly highlighting what might be needed in the future and indicating a prioritised roadmap. As the Future Internet is needed for supporting new applications and services, it is natural that the requirements for Future Internet should come from the future applications. In this paper, we take a look at a likely future to see what kind of applications can be expected. We then analyse some potential future applications trying to understand the key features the Future Internet should support in order to meet key challenging requirements. Finally, we compare the requirements with the existing Future Internet research, in order to see how they match to each other.


international symposium on wireless communication systems | 2004

Personal trusted device in personal communications

Jari Porras; Pekka Jäppinen; Petri Hiirsalmi; Arto Hämäläinen; Sami Saalasti; Raine Koponen; Satu Keski-Jaskari

In this paper an approach to personal communications through the concept of personal trusted device is presented. The personal trusted device based architecture consists of separate layers, connectivity, middleware and applications. At the moment most of the effort has been put into the connectivity layer. The proposed architecture is verified through three applications: access control system, guidance system and fitness system.


ubiquitous computing | 2013

Usability study of ME2.0

Were Oyomno; Pekka Jäppinen; Esa Kerttula; Kari Heikkinen

Mobile context-aware applications execute in the background of hosts mobile devices. The applications source process and aggregate hosts’ contextual and personal information. This information is disclosed to ubiquitously pervasive services that adapt their offerings to individual preferences. Unfortunately, many developers continue to ignore the user perspective in context-aware application designs as they complicate their overall task and generate exponential requirements. The additional incorporation of privacy mechanisms in context-aware applications to safeguard context and personal information disclosures also complicates users’ tasks resulting to misconfigured or completely abandoned applications. Misconfigured applications give end-users a false assurance of privacy exposing them to comprising services. We present a usability study on Mobile Electronic Personality Version 2 a privacy enhanced context-aware mobile application for personalising ubiquitous services and adapting pervasive smart-spaces. We draw conclusions on key issues related to user needs, based on user interviews, surveys, prototypes and field evaluations. Users’ needs are evaluated against five themes, learn-ability, efficiency, memorability, errors, satisfaction and privacy contention. In addition, design layout preferences, privacy manageability and consensus design comprehension are also evaluated. Clarity of priorities in context-aware mobile applications shaped by usability studies effectively increases the acceptance of levels of potential users.


workshop on mobile computing systems and applications | 2006

Mobile Bicycle Monitoring System

Aki Honkasuo; Arto Hämäläinen; Pekka Jäppinen; Juha Jaaskelainen; Jari Porras

Mobile phones offer a viable alternative to the existing systems as both programming and communication interfaces have been opened for general usage. This paper presents a concept where the necessary information generated while cycling is collected by a bicycle sensor module and is then transmitted to the mobile phone. The mobile phone acts as a simple data analyser, data displaying device as well as a temporary storage location for the data


active media technology | 2014

The Challenges behind Independent Living Support Systems

Giampaolo Bella; Pekka Jäppinen; Jussi Laakkonen

Despite their crucial goal of assisting the elderly through their daily routine, Independent Living Support systems still are at their inception. This paper postulates that such systems be designed with a number of requirements in mind, and in particular with safety, security and privacy as fundamental ones. It then correspondingly articulates the three main challenges behind the development of Independent Living Support systems: requirement elicitation, design and correctness analysis. It is found that requirement elicitation will have to cope with a large variety of issues; that design will have to proceed from modularity; and, notably, that correctness analysis will have to be socio-technical. The last finding in particular emphasises that, for a system that prescribes vast interaction with the human, system correctness only makes sense if the system is analysed in combination with the human, rather than in isolation from the human. Building upon previous experience with the socio-technical analysis of Internet browsers, this paper identifies the specific socio-technical challenges that Independent Living Support systems pose, and indicates an approach to succeed in taking them.


computational intelligence and security | 2012

Probabilistic Authentication with Very Lightweight Short Hash

Pekka Jäppinen

As the communication capabilities are implemented in ever smaller devices with less and less computational capabilities and limited energy source, there is a need for lightweight cryptographic solutions. In this paper we describe lightweight solution for probabilistic authentication of computationally restricted devices. The solution relies on 4-bit lightweight hash, generated with help of substitution box of DESL. The security and weight of the described solutions are evaluated.


workshop on mobile computing systems and applications | 2006

PANS-Preference-Aware News Screen

Pekka Jäppinen; Jari Porras

The world we live in provides excessive amounts of information everywhere we go. Small walk on the downtown shows that streets are filled with advertisements, store windows contain data about products and a screen on broadcasting company building shows the latest news. To provide meaningful information for the people near the information screen, the contents of the news screen should be dynamic and take into account what type of information the users are interested in. This paper presents a concept of a news screen that is aware of the interests of the people in its proximity. The awareness is accomplished by fetching the preference information from the mobile devices of the people nearby the service. The information is used for deciding what kind of sport results are shown on the screen


international conference on social computing | 2013

Abstracted Architecture for Smart Grid Privacy Analysis

Jussi Laakkonen; Salla Annala; Pekka Jäppinen

Electricity companies have traditionally seen customers only as consumers but with the introduction of new metering technology the situation is about to change. As customer participation increases with the development of the Smart Grid environment, new concerns about privacy arise. In this article we introduce an architecture offering a clear, information-centered birds-eye overview to the Smart Grid environment for privacy analysis purposes. To do this, we first seek out commonalities in the environment by dividing the topic into smaller elements in order to gain deeper understanding and to form abstract and functional models. From these we form a reference architecture representing a real-world situation. Our approach permits identification of the use of private information in the environment without implementation-dependent issues. We also present the privacy issues related to the architecture. The implementation strategies can vary, and we conclude with a discussion of the effects of the varying approaches.


ambient intelligence | 2010

Privacy policy enforcement for ambient ubiquitous services

Were Oyomno; Pekka Jäppinen; Esa Kerttula

Ubiquitous service providers leverage miniaturised computing terminals equipped with wireless capabilities to avail new service models. These models are pivoted on personal and inexpensive terminals to customise services to individual preferences. Portability, small sizes and compact keyboards are few features popularising mobile terminals. Features enable storing and carrying of ever increasing proportions of personal data and ability to use them in service adaptations. Ubiquitous services automate deeper soliciting of personal data transparently without the need for user interactions. Transparent solicitations, acquisitions and handling of personal data legitimises privacy concerns regarding disclosures, retention and re-use of the data. This study presents a policy enforcement for ubiquitous services that safeguards handling of users personal data and monitors adherence to stipulated privacy policies. Enforcement structures towards usability and scalability are presented.

Collaboration


Dive into the Pekka Jäppinen's collaboration.

Top Co-Authors

Avatar

Jari Porras

Lappeenranta University of Technology

View shared research outputs
Top Co-Authors

Avatar

Esa Kerttula

Lappeenranta University of Technology

View shared research outputs
Top Co-Authors

Avatar

Were Oyomno

Lappeenranta University of Technology

View shared research outputs
Top Co-Authors

Avatar

Arto Hämäläinen

Lappeenranta University of Technology

View shared research outputs
Top Co-Authors

Avatar

Jussi Laakkonen

Lappeenranta University of Technology

View shared research outputs
Top Co-Authors

Avatar

Jouni Ikonen

Lappeenranta University of Technology

View shared research outputs
Top Co-Authors

Avatar

Mika Yrjölä

Lappeenranta University of Technology

View shared research outputs
Top Co-Authors

Avatar

Ahmed Seffah

Lappeenranta University of Technology

View shared research outputs
Top Co-Authors

Avatar

Aki Honkasuo

Lappeenranta University of Technology

View shared research outputs
Top Co-Authors

Avatar

Harri Hämäläinen

Lappeenranta University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge