Lecture 9 - Mobile and Ubiquitous Computing
Lecture 9 - Mobile and Ubiquitous Computing
Ubiquitous Computing
http://fit.hanu.vn
Lecturer: Mr. Nguyen Tat Ha Son
Course: [DSY]Distributed System
Objectives
Introduce the volatility of mobile and
ubiquitous systems
Software components associate and
interoperate with one another
Systems integrated with physical world
through sensing and context awareness
Security and privacy issues
Techniques for adapting to small devices
Main Content
Device model
Limited energy
Resource constraints
Sensors and actuators
Volatile connectivity
Disconnection:
Variable bandwidth and latency
Spontaneous interoperation
Lowered trust and privacy
Association
Association
Volatile components need to interoperate
– preferably without user intervention
Network bootstrapping:
• communication takes place over a local network
• device must first acquire an address on the local
network
Association
• associate to services in the smart space
• provide services to components
Association
Discovery services
Clients find out about the services provided in
a smart space using a discovery service
Design issues
• Low-effort, appropriate association
• Service description and query language
• Smart-space-specific discovery
• Directory implementation
• Service volatility
Association
Physical association
Human input to scope discovery
Sensing and physically constrained channels
to scope discovery
Direct association
• Address-sensing
• Physical stimulus
• Temporal or physical correlation
Sensing & context
awareness
Sensing & context awareness
Hardware-related issues
Portable devices can be more easily stolen
Devices do not have sufficient computing resources asymmetric
cryptography
Low energy
Disconnected operation
New types of resource-sharing require new security
designs. For example,
Admin of smart spaces sending slides in a meeting room
Employees exchange documents between mobiles and
portable devices
Wireless heart-rate monitoring associated to clinic data-logging
service
None is quite like the resource-sharing patterns normally
encountered within firewall-protected intranets or Internet
Security & Privacy
Some solutions
Secure spontaneous device association
• create a secure channel between two devices by
securely exchanging a session key between those
two devices and using it to encrypt their
communication
Location-based authentication
• base access control on the location of the
services’ clients, rather than their identity
Privacy protection
• Safeguard for previous solutions
Adaption
Adaption