Towards Security and Privacy for Pervasive Computing Author : Roy Campbell,Jalal Al-Muhtadi, Prasad Naldurg,Geetanjali Sampemane M. Dennis Mickunas.(2002)

Slides:



Advertisements
Similar presentations
1 From Grids to Service-Oriented Knowledge Utilities research challenges Thierry Priol.
Advertisements

Context-Aware Security Gleneesha Johnson
1 The Ubiquitous Web Eunchae Yoon. School of Engineering, Eunchae Yoon 2 Contents What is Ubiquitous computing? What is Ubiquitous Web? Ubiquitous computing.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
Ubiquitous Computing Definitions Ubiquitous computing is the method of enhancing computer use by making many computers available throughout the physical.
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments Yitao Duan and John Canny UC Berkeley.
ICT 1 “Putting Context in Context: The Role and Design of Context Management in a Mobility and Adaptation Enabling Middleware” Marius Mikalsen Research.
User Managed Privacy Using Distributed Trust Privacy and Security Research Workshop Carnegie Mellon University May 29-30, 2002 Lark M. Allen / Wave Systems.
Gaia Context and Location-Aware Encryption for Pervasive Computing Environments Jalal Al-MuhtadiRaquel Hill Roy Campbell Dennis Mickunas University of.
RCSM, David Buchmann Seminar Ubicomp, Uni Fribourg Reconfigurable Context Sensitive Middleware Smart Classroom Tasks RCSM Parts Critics Presentation.
1 Security and Privacy in Sensor Networks: Research Challenges Radha Poovendran University of Washington
Smart Space & Oxygen CIS 640 Project By Usa Sammpun
ECDL 2002 Employing Smart Browsers to Support Flexible Information Presentation in Petri net-based Digital Libraries Unmil P. Karadkar, Richard Furuta.
Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European.
NETWORK SECURITY.
Cloud Usability Framework
報告日期 :2012/03/07 指導教授 : 蔡亮宙 報 告 者 : 吳烱華 自製率 :100%.
Public Key Infrastructure Ammar Hasayen ….
Key Action II - Objectives Support the development and adoption of novel IST solutions for eCommerce & eWork aimed at enhancing: Support the development.
An Intelligent Broker Architecture for Context-Aware Systems A PhD. Dissertation Proposal in Computer Science at the University of Maryland Baltimore County.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Intranet, Extranet, Firewall. Intranet and Extranet.
1 Autonomic Computing An Introduction Guenter Kickinger.
Lessons Learned in Smart Grid Cyber Security
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Presenter - Bob Kinicki Internet of Things Fall 2015
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Presented by: Chaitanya K. Sambhara Paper by: Karl Mayer and Wolfgang Fritsche IABG mbH Germany - Instructor : Dr Yingshu Li.
An Analysis of Bluetooth Security
Looking ahead in Pervasive Computing: Challenges, Opportunities in the era of Cyber Physical Convergence Authors : Marco Conti, Sajal K. Das, Chatschik.
Ubiquitous Computing Software Systems.
PERVASIVE COMPUTING MIDDLEWARE BY SCHIELE, HANDTE, AND BECKER A Presentation by Nancy Shah.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Cerberus: A Context-Aware Security Scheme for Smart Spaces presented by L.X.Hung u-Security Research Group The First IEEE International Conference.
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
Master Course /11/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
Application of Operating System Concepts to Coordination in Pervasive Sensing and Computing Systems Benjamin J. Ewy, Larry M. Sanders Ambient Computing,
By Jared.  Under the terms of the alliance, epals this fall will add Microsoft’s
A policy-based per-flow mobility management system design
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
1 Service Sharing with Trust in Pervasive Environment: Now it’s Time to Break the Jinx Sheikh I. Ahamed, Munirul M. Haque and Nilothpal Talukder Ubicomp.
July 14 th SAM 2008 Las Vegas, NV An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing Danfeng (Daphne) Yao Rutgers University,
Enterprise Cybersecurity Strategy
INSA LYON1 Security Policy Configuration Issues in Grid Computing Environments George Angelis, Stefanos Gritzalis, and Costas Lambrinoudakis Presentation.
From Information Assurance to Trusted Systems – A Strategic Shift Patricia A. Muoio Chief, NSA Trusted Systems Research (formerly known as National Information.
Security Vulnerabilities in A Virtual Environment
Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Environments V. Ramakrishna, Kevin Eustice, Matthew Schnaider Laboratory.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
1 My Dream of Jini Fabio Kon Jalal Al-Muhtadi Roy Campbell M. Dennis Mickunas Department of Computer Science University of Illinois at.
SelfCon Foil no 1 Variability in Self-Adaptive Systems.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Semantic Web in Context Broker Architecture Presented by Harry Chen, Tim Finin, Anupan Joshi At PerCom ‘04 Summarized by Sungchan Park
Towards ‘Ubiquitous’ Ubiquitous Computing: an alliance with ‘the Grid’ Oliver Storz, Adrian Friday, and Nigel Davies Computing Department, Lancaster University,
Gaia Ubiquitous Computing Directions Roy Campbell University of Illinois at Urbana-Champaign.
System Software for Ubiquitous Computing Pervasive Computing 2002 Tim Kindberg, Armando Fox 2003 년 11 월 26 일 박준호.
AUTONOMIC COMPUTING B.Akhila Priya 06211A0504. Present-day IT environments are complex, heterogeneous in terms of software and hardware from multiple.
MetaOS Concept MetaOS developed by Ambient Computing to coordinate the function of smart, networked devices Smart networked devices include processing.
Impact of IT Consumerisation on Enterprise Security
Internet of Things: State of the Art
Seraphim : A Security Architecture for Active Networks
Broad Emerging Themes in CPS/IoT
Ambient Intelligence -by Internal Guide: M.Preethi(10C91A0563)
Ambient Intelligence.
Jalal Al-Muhtadi, Roy Campbell, Apu Kapadia, M
How to Mitigate the Consequences What are the Countermeasures?
Internet of Things (IoT) for Industrial Development and Automation
IOT Acronym as “Internet Of Things”
Themes for the future... Simple complex systems Well behaved systems
ISO Open system Requirements and IT Needs
Presentation transcript:

Towards Security and Privacy for Pervasive Computing Author : Roy Campbell,Jalal Al-Muhtadi, Prasad Naldurg,Geetanjali Sampemane M. Dennis Mickunas.(2002) Presented by Shih Yu Chen

2 Pervasive Computing SensorsProcessors Computers

3 Features of pervasive computing Extending Computing Boundaries *Hardware and software → physical and virtual *Dull → interactive, dynamic, programmable Invisibility *Computers → blend in the background *Computerize → boost productivity Creating smart and sentient spaces *Embedded devices and sensors → sense

4 Features of pervasive computing Context awareness *Capture the different context and situation information *Tailoring itself to meet their preferences Mobility and adaptability *As mobile as its users *Be able to adapt itself to environments

5 Security Challenges The Extended Computing Boundary *Information and physical security become interdependent *Traditional mechanisms become inadequate Privacy Issues *Active sensors and computing capabilities↑→ threat↑ User Interaction Issues *Richer user-interface *Cannot easily be prevented from seeing and hearing

6 Security Challenges Security Policies *Flexible and convenient method for defining and managing security policies *Heterogeneous interfaces↑ → difficult to manage Info Ops ( Information Operations ) *Actions taken that affect adversary information and information systems while defending one’s own information and information systems *Electronic information, digital communication

7 Suggest solutions Authentication *Strike a balance between authentication strength and non- intrusiveness *Context decide how strong the authentication needs to be *Confidence values : 0~1 *Employ multiple authentication → confidence value↑ *Access control decisions can now become more flexible by utilizing confidence information

8 Suggest solutions Mist-Privacy Communication *Route packets using a hop-by-hop, handle-based routing protocol *Employ public key cryptography *Incoming handle ; outgoing handle Bob Mist router

9 Security Requirements Transparency and unobtrusiveness Multilevel Context-Awareness Flexibility and customizability Interoperability Extended boundaries

10 Conclusion Pervasive computing brings new challenges to security and privacy, which cannot be addressed by mere adaptation of existing security and privacy mechanisms. Unless security concerns are accommodated early in the design phase, pervasive computing environments will be rife with vulnerabilities.