Pekka Jäppinen
Lappeenranta University of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Pekka Jäppinen.
computational intelligence and security | 2008
Pekka Jäppinen; Harri Hämäläinen
The popularity of Radio Frequency Identification (RFID) has raised the interest towards its security. Threat concerns towards individuals privacy slows down the adoption of the technology in the new innovative application areas. In this paper we will describe simple and efficient security method for lightweight RFID tags with support for ownership transfer. It based on solution described by Osaka et al, which had some security flaws. Our solution fixes the security flaws while maintaining the simplicity and efficiency of the original method.
Journal of Network and Computer Applications | 2013
Pekka Jäppinen; Renata Guarneri; Luis M. Correia
The building of the Future Internet is well on its way with many research projects and experimental development activities in different parts of the works. However the debate over different approaches is still ongoing. Much of the comparison is concentrating on the different technical capabilities, however, very little effort has been put on finding out how such capabilities will actually be used by the different stakeholders and in particular by users and service providers. Decisions such as whether to take an evolutionary step with TCP/IP, start to use cellular protocols, or develop something new, should be based on realistic and validated user scenarios clearly highlighting what might be needed in the future and indicating a prioritised roadmap. As the Future Internet is needed for supporting new applications and services, it is natural that the requirements for Future Internet should come from the future applications. In this paper, we take a look at a likely future to see what kind of applications can be expected. We then analyse some potential future applications trying to understand the key features the Future Internet should support in order to meet key challenging requirements. Finally, we compare the requirements with the existing Future Internet research, in order to see how they match to each other.
international symposium on wireless communication systems | 2004
Jari Porras; Pekka Jäppinen; Petri Hiirsalmi; Arto Hämäläinen; Sami Saalasti; Raine Koponen; Satu Keski-Jaskari
In this paper an approach to personal communications through the concept of personal trusted device is presented. The personal trusted device based architecture consists of separate layers, connectivity, middleware and applications. At the moment most of the effort has been put into the connectivity layer. The proposed architecture is verified through three applications: access control system, guidance system and fitness system.
ubiquitous computing | 2013
Were Oyomno; Pekka Jäppinen; Esa Kerttula; Kari Heikkinen
Mobile context-aware applications execute in the background of hosts mobile devices. The applications source process and aggregate hosts’ contextual and personal information. This information is disclosed to ubiquitously pervasive services that adapt their offerings to individual preferences. Unfortunately, many developers continue to ignore the user perspective in context-aware application designs as they complicate their overall task and generate exponential requirements. The additional incorporation of privacy mechanisms in context-aware applications to safeguard context and personal information disclosures also complicates users’ tasks resulting to misconfigured or completely abandoned applications. Misconfigured applications give end-users a false assurance of privacy exposing them to comprising services. We present a usability study on Mobile Electronic Personality Version 2 a privacy enhanced context-aware mobile application for personalising ubiquitous services and adapting pervasive smart-spaces. We draw conclusions on key issues related to user needs, based on user interviews, surveys, prototypes and field evaluations. Users’ needs are evaluated against five themes, learn-ability, efficiency, memorability, errors, satisfaction and privacy contention. In addition, design layout preferences, privacy manageability and consensus design comprehension are also evaluated. Clarity of priorities in context-aware mobile applications shaped by usability studies effectively increases the acceptance of levels of potential users.
workshop on mobile computing systems and applications | 2006
Aki Honkasuo; Arto Hämäläinen; Pekka Jäppinen; Juha Jaaskelainen; Jari Porras
Mobile phones offer a viable alternative to the existing systems as both programming and communication interfaces have been opened for general usage. This paper presents a concept where the necessary information generated while cycling is collected by a bicycle sensor module and is then transmitted to the mobile phone. The mobile phone acts as a simple data analyser, data displaying device as well as a temporary storage location for the data
active media technology | 2014
Giampaolo Bella; Pekka Jäppinen; Jussi Laakkonen
Despite their crucial goal of assisting the elderly through their daily routine, Independent Living Support systems still are at their inception. This paper postulates that such systems be designed with a number of requirements in mind, and in particular with safety, security and privacy as fundamental ones. It then correspondingly articulates the three main challenges behind the development of Independent Living Support systems: requirement elicitation, design and correctness analysis. It is found that requirement elicitation will have to cope with a large variety of issues; that design will have to proceed from modularity; and, notably, that correctness analysis will have to be socio-technical. The last finding in particular emphasises that, for a system that prescribes vast interaction with the human, system correctness only makes sense if the system is analysed in combination with the human, rather than in isolation from the human. Building upon previous experience with the socio-technical analysis of Internet browsers, this paper identifies the specific socio-technical challenges that Independent Living Support systems pose, and indicates an approach to succeed in taking them.
computational intelligence and security | 2012
Pekka Jäppinen
As the communication capabilities are implemented in ever smaller devices with less and less computational capabilities and limited energy source, there is a need for lightweight cryptographic solutions. In this paper we describe lightweight solution for probabilistic authentication of computationally restricted devices. The solution relies on 4-bit lightweight hash, generated with help of substitution box of DESL. The security and weight of the described solutions are evaluated.
workshop on mobile computing systems and applications | 2006
Pekka Jäppinen; Jari Porras
The world we live in provides excessive amounts of information everywhere we go. Small walk on the downtown shows that streets are filled with advertisements, store windows contain data about products and a screen on broadcasting company building shows the latest news. To provide meaningful information for the people near the information screen, the contents of the news screen should be dynamic and take into account what type of information the users are interested in. This paper presents a concept of a news screen that is aware of the interests of the people in its proximity. The awareness is accomplished by fetching the preference information from the mobile devices of the people nearby the service. The information is used for deciding what kind of sport results are shown on the screen
international conference on social computing | 2013
Jussi Laakkonen; Salla Annala; Pekka Jäppinen
Electricity companies have traditionally seen customers only as consumers but with the introduction of new metering technology the situation is about to change. As customer participation increases with the development of the Smart Grid environment, new concerns about privacy arise. In this article we introduce an architecture offering a clear, information-centered birds-eye overview to the Smart Grid environment for privacy analysis purposes. To do this, we first seek out commonalities in the environment by dividing the topic into smaller elements in order to gain deeper understanding and to form abstract and functional models. From these we form a reference architecture representing a real-world situation. Our approach permits identification of the use of private information in the environment without implementation-dependent issues. We also present the privacy issues related to the architecture. The implementation strategies can vary, and we conclude with a discussion of the effects of the varying approaches.
ambient intelligence | 2010
Were Oyomno; Pekka Jäppinen; Esa Kerttula
Ubiquitous service providers leverage miniaturised computing terminals equipped with wireless capabilities to avail new service models. These models are pivoted on personal and inexpensive terminals to customise services to individual preferences. Portability, small sizes and compact keyboards are few features popularising mobile terminals. Features enable storing and carrying of ever increasing proportions of personal data and ability to use them in service adaptations. Ubiquitous services automate deeper soliciting of personal data transparently without the need for user interactions. Transparent solicitations, acquisitions and handling of personal data legitimises privacy concerns regarding disclosures, retention and re-use of the data. This study presents a policy enforcement for ubiquitous services that safeguards handling of users personal data and monitors adherence to stipulated privacy policies. Enforcement structures towards usability and scalability are presented.