Roy Bahian, Sean Maxon, Brian Seo, Michael Rojas, Daniel Sherry, Nor Rabi’ah Mohd Nawawi Client: Dr. Ali Mostashari.

Slides:



Advertisements
Similar presentations
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Advertisements

Active response for the modern first responder. How it works: Step 1 ● 99% of CAD systems can do this without modification ● is sent to a unique.
Page 1 of 29 Net-Scale Technologies, Inc. Network Based Personal Information and Messaging Services Urs Muller Beat Flepp
Real-Time Authentication Using Digital Signature Schema Marissa Hollingsworth BOISECRYPT ‘09.
Location based social networking on Android phones – integrated with Facebook. Simple and easy to use.
Front and Back End: Webpage and Database Management Prepared by Nailya Galimzyanova and Brian J Kapala Supervisor: Prof. Adriano Cavalcanti, PhD College.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
SOCIAL NETWORK INFORMATION CONSOLIDATION Developers:  Klasquin Tomer  Nisimov Yaron  Rabih Erez Advisors:  Academic: Prof. Elovici Yuval  Technical:
Microsoft Passport Waldemar Swiercz.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
CRYPTOGRAPHY PROGRAMMING ON ANDROID Jinsheng Xu Associate Professor North Carolina A&T State University.
Finding Nearby Wireless Hotspots CSE 403 LCA Presentation Team Members: Chris Scoville Tessa MacDuff Matt Mohebbi Aiman Erbad Khalil El Haitami.
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
Microsoft ® Lync ™ 2010 IM and Presence Training.
Location-Based API 1. 2 Location-Based Services or LBS allow software to obtain the phone's current location. This includes location obtained from the.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Design Extensions to Google+ CS6204 Privacy and Security.
Microsoft Office Communicator A General Introduction.
UICC UICC is a smart card used in mobile terminals in GSM and UMTS networks It provides the authentication with the networks secure storage crypto algorithms.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
1 Thomas Lippert Senior Product Manager - Mobile What’s new in SMC 5.0.
Office of Educational Technology School District of Philadelphia Introduction to Sites Google Sites This presentation is available at
Roy Bahian, Sean Maxon, Brian Seo, Michael Rojas, Daniel Sherry, Nor Rabi’ah Mohd Nawawi Client: Dr. Ali Mostashari.
Authentication Key HMAC(MK, “auth”) Server Encryption Key HMAC(MK, “server_enc”) User Password Master Key (MK) Client Encryption Key HMAC(MK, “client_enc”)
Presentation. Recap A multi layer architecture powered by Spring Framework, ExtJS, Spring Security and Hibernate. Taken advantage of Spring’s multi layer.
SPAM Settings. The ExchangeDefender Admin Site is a powerful tool that gives you access to all of the benefits ExchangeDefender has to offer, from the.
Leveraging UICC with Open Mobile API for Secure Applications and Services.
Roy Bahian, Sean Maxon, Brian Seo, Michael Rojas, Daniel Sherry, Nor Rabi’ah Mohd Nawawi Client: Dr. Ali Mostashari.
MAKANI ANDROID APPLICATION Prepared by: Asma’ Hamayel Alaa Shaheen.
.  A multi layer architecture powered by Spring Framework, ExtJS, Spring Security and Hibernate.  Taken advantage of Spring’s multi layer injection.
Smart Parking System PREPARED BY : GHADEER AQRAA AND MARAH JABER.
Case Study.  Client needed to build data collection agents for various mobile platform  This needs to be integrated with the existing J2ee server 
Mtivity Client Support System Quick start guide. Mtivity Client Support System We are very pleased to announce the launch of a new Client Support System.
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
 Architectural overview  Main APIs. getGames.php getGroupsLocations.php getGroupsScores.php getMessage.php getStreet.php getTime.php login.php sendMessage.php.
Louisa Lambregts, Louisa Lambregts
FriendFinder Location-aware social networking on mobile phones.
FriendFinder Location-aware social networking on mobile phones.
1 State and Session Management HTTP is a stateless protocol – it has no memory of prior connections and cannot distinguish one request from another. The.
Integrated Mobile Marketing Platform Emergic mConnector Integrated -Mobile Marketing Platform Presented By: Sales Person Name ID: Mobile:
Project Retrospective Team FancyPants. What is CyteSee? Idea.
IBM - ČVUT Student Research Projects Mobile Public Transportation Timetables Petr Podhorský Jakub Zahradník
Cleveland Clinic Supplier Registration. Existing Supplier Registration Select the “Existing Supplier” registration link.
The overview How the open market works. Players and Bodies  The main players are –The component supplier  Document  Binary –The authorized supplier.
SQL Server 2012 Session: 1 Session: 4 SQL Azure Data Management Using Microsoft SQL Server.
Project Description MintTrack is a mobile application built for the Android OS that will help keep track of where a user’s money is being spent via expense.
EBay Searcher Brian Payton, Jason Nowakoski, Justin Szeluga, Salvatore Siragusa, David Wolkiser.
1 (c) 2013 FabSoft. MOST Cloud Service What is a Cloud Service? A cloud service is internet-based, meaning that MOST is hosted on a server farm on the.
Mary Ganesan and Lora Strother Campus Tours Using a Mobile Device.
ICE Integrated Cloud Environment Cloud Scanning and Mobile Printing
Cloud Faxing for Law Firms
Web Programming Language
Mobile App.
Mobile App.
Online password manager By: Anthony diveronica
Ubiquitous Computing and Augmented Realities
Mobile App.
Home Automation System
How it works: Step 1 99% of CAD systems can do this without modification is sent to a unique address for your agency Example:
File Transfer Protocol
Iteration 1 Presentation
Chapter 2: System Structures
Setting up and using secure and document transfer
INFORMATION TECHNOLOGY NEW USER ORIENTATION
Scalable Encrypted Verifiable Search
This presentation document has been prepared by Vault Intelligence Limited (“Vault") and is intended for off line demonstration, presentation and educational.
Exercise: Hashing, Password security, And File Integrity
MyLion Registration Website | Mobile device
COMPLETE BUSINESS TEXTING SOLUTION
Presentation transcript:

Roy Bahian, Sean Maxon, Brian Seo, Michael Rojas, Daniel Sherry, Nor Rabi’ah Mohd Nawawi Client: Dr. Ali Mostashari

Project Overview SmartCity Hoboken is a multiyear research initiative between Stevens and the City of Hoboken. If the project is successful, Hoboken will become the first ‘Smart City’ in the United States.

Project Overview As CS students in the first year of the project, our goals were to 1. Develop the infrastructure for a SmartCity mobile application. 2. Implement a variety of widgets to give the infrastructure some basic functionality. 3. Implement security protecting the infrastructure. 4. Have a mobile application which is ready to release on the Android market as version 1.0.

Terminology Widget – Refers to an individual feature or service provided by the SmartCity mobile application. Query – Refers to information requests from a particular widget of the SmartCity mobile application to the server. Response – Refers to the information sent back to the application from the server after a query.

Widgets Developed Parking Availability Finder Emergency Management Energy Consumption Hoboken311

User Interface Design The Goal of our UI was to create a simple navigation process for the user. Horizontal Navigation Tabs were used to accomplish this goal. Tabs separated into categories. (Home, Commute, Emergency, Energy, Environment, MyCity, MyGov)

User Interface Design Widgets added into the categorized tabs. Much easier to find Widgets when they are categorized. Lowered the amount of clicks. Made Navigation Intuitive.

Challenge With Tabs ActionBar is not supported for Android Versions below Android 3.0. Requirements – Android 2.2 and Up. Solved with ActionBarSherlock – Allows use of ActionBar for Android below 3.0. Uses Google’s ActionBar when version is above 3.0. Allowed Seamless Integration of Tabs.

Voice Commands Tabs reduced number of selections. Searched for ways to reduce even more. Voice Commands added as navigation feature. Users who already know their widget can speak the name of the widget. Then transported to the widget without any selections.

Data Flow Although the data being utilized in each widget varies, the architecture is the same set of client-server interactions for every widget. 1. The user’s mobile device sends a query to the SmartCity server. 2. The server interprets the query and constructs a response. 3. The server sends the response to the user’s mobile device. 4. The mobile device parses the response to construct viewable output in the form of a map, list, text, or confirmation message, depending on the widget. 5. The output is displayed for the user to view.

Data Sources Although it depends on the widget, data used to construct query responses can come from a variety of sources. Crowdsourcing – Information provided by SmartCity users in aggregate. Historical Electronic Records – Such as Parking Meter usage. Sensors – Such as those tracking noise, air pollution, and other things (sensors are not relevant to the widgets we developed, but will be in future development).

Widgets - Parking The ‘Parking Near Me’ widget is designed to help users find available metered parking. Using the GPS coordinates of the user, the server finds parking meters in which it is probable the user can find parking. Utilize GoogleMaps API to display information in an easy to interpret way. Pins on the map colored in accordance to probability.

Widgets - Parking

Widgets – Hoboken311 The purpose of this widget is to serve as a mobile version of the Hoboken311 problem reporting system. Simplified UI compared to the website Voice commands to skip bulky menu navigation. Ability to report via GPS or Map

Widgets – Hoboken 311

Widgets – Emergency The ‘Emergency Management’ widget consists of several pieces. It utilizes crowdsourcing to help the city respond to the needs of the citizens in an intelligent way in the case of a disaster response scenario. User Reporting Forms City Overview

Widgets – Emergency

Widgets - Energy The ‘Energy Consumption’ widget is built with the simple purpose of making users more energy-conscious. Users enter electricity/gas readings AChartEngine API utilized to create graphs according to compare the daily usage of the user to their peers (SmartCity users, Hoboken, and Nationally)

Widgets - Energy

Security It is our obligation to protect our users. Protect and hide personally identifiable information (PII) PII can include: name, address, , GPS location, energy consumption, etc Aggregate user-submitted reports to protect individual users Encrypt data stored on both mobile device and server Protect their user account Encrypt network traffic Store credentials in as little places as possible Keep password and data safe if mobile device is stolen

Security Authentication Key HMAC(MK, “auth”) Server Encryption Key HMAC(MK, “server_enc”) User Password Master Key (MK) Client Encryption Key HMAC(MK, “client_enc”) A hash that is computed from the user password using PBKDF2 (SHA-256, iterated 10,000 times) is used as the master key. The master key is never stored or transferred to the client or server. The master key is used to derive additional keys for different functions. MK = PBKDF2(salt, password) Derived keys are computed using the HMAC (SHA-256) of the master key and a designated string. With derived keys, we are able to use multiple keys for different functions, but only require the user to keep track of one password. The derived keys are stored on the server, and may be transferred to the client or server when requested. Why this approach? The HKDF approach allows greater security for a few reasons: Both the master key and the password are not stored on the server or client The password is not sent over network traffic between the client and the server The master key is only sent over during registration and password resets Only the salt that the server computed, the authentication key, and the client encryption key may be sent over the network during login Only the authentication key is stored on the client.

Future Development As mentioned before, this is a multi-year initiative. Future CS senior design groups will build on top of our infrastructure. Groups from other disciplines will be working on other aspects of the project as well.

Questions?