Shravan Gaonkar, Jack Li, Romit Roy Choudhury, Landon Cox, Al Schmidt Presented by : Gregory Teodoro.

Slides:



Advertisements
Similar presentations
Review of Topology and Access Techniques / Switching Concepts BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Advertisements

I don't mind being logged, but want to remain in control: a field study of mobile activity and context logging Tuula Kärkkäinen, Tuomas Vaittinen, Kaisa.
1 Micro-Blog: Sharing and Querying Content through Mobile Phones and Social Participation Romit Roy Choudhury Asst. Prof. (Duke University) Co-authors:
Location Based Trust for Mobile User – Generated Content : Applications, Challenges and Implementations Presented By : Anand Dipakkumar Joshi USC.
Green Computing Energy in Location-Based Mobile Value-Added Services Maziar Goudarzi.
D u k e S y s t e m s Sensing Meets Mobile Social Networks: The Design, Implementation and Evaluation of the CenceMe Application Emiliano Miluzzo†, Nicholas.
Mobile Resource Manager v2. Core Pillars  Engine - High fuel costs, vehicle maintenance  Productivity - Customers expect increasing levels of service.
VxWorks Real-Time Kernel Connectivity
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
ICT Curriculum Evening – an introduction to Wizkid.
Company Confidential 1 © 2005 Nokia V1-Filename.ppt / yyyy-mm-dd / Initials Towards a mobile content delivery network with a P2P architecture Carlos Quiroz.
1 A study on Location Aware Computing Presenter : Narendiran Visvanathan Instructor : Dr. Chin-Chih Chang Course : CS 898T Mobile and Wireless Networks.
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
Multi-criteria infrastructure for location-based applications Shortly known as: Localization Platform Ronen Abraham Ido Cohen Yuval Efrati Tomer Sole'
Brent Dingle Marco A. Morales Texas A&M University, Spring 2002
© 2009 Research In Motion Limited Methods of application development for mobile devices.
Self-Management in Chaotic Wireless Deployments A. Akella, G. Judd, S. Seshan, P. Steenkiste Presentation by: Zhichun Li.
EnLoc: Energy-Efficient Localization for Mobile Phones Written By, Ionut Constandache (Duke), Shravan Gaonkar (UIUC), Matt Sayler (Duke), Romit Roy Choudhary.
Analysis of Privacy Jim McCann & Daniel Kuo EECS 598.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Urban Sensing Jonathan Yang UCLA CS194 Fall 2007 Jonathan Yang UCLA CS194 Fall 2007.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #13 Web Caching Protocols ICP, CARP.
Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Christina Pöpper, and Srdjan ˇCapkun Department of Computer Science, ETH Zurich Attacks on Public WLAN-based.
Electrical and Computer Engineering PeopleFinder Vitaly Gordievsky Alex Trefonas Scott Richard Matt Beckford Midway Design Review.
User studies. Why user studies? How do we know security and privacy solutions are really usable? Have to observe users! –you may be surprised by what.
CrowdSearch: Exploiting Crowds for Accurate Real-Time Image Search on Mobile Phones Original work by Yan, Kumar & Ganesan Presented by Tim Calloway.
Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph 1 Location Again Location API’s and Room-Size Location Feb 28, 2006 Larry Rudolph.
You can customize your privacy settings. The privacy page gives you control over who can view your content. At most only your friends, their friends and.
Social effect: Facebook is a site available to anyone. Many people use it in order to contact friends and relatives from all around the world, and to meet.
Starter for 10 Unit 10: Flickr & YouTube Transform IT SFT10_Flickr_YouTube.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Presented by: Z.G. Huang May 04, 2011 Did You See Bob? Human Localization using Mobile Phones Romit Roy Choudhury Duke University Durham, NC, USA Ionut.
Methods of communication
Life Logging Melekam Tsegaye Shaun Bangay Alfredo Terzoli Research area: Wearable, Pervasive and Ubiquitous Computing
P2P Systems Meet Mobile Computing A Community-Oriented Software Infrastructure for Mobile Social Applications Cristian Borcea *, Adriana Iamnitchi + *
INFORMATION TECHNOLOGY IN BUSINESS AND SOCIETY SESSION 21 – LOCATION-BASED SERVICES SEAN J. TAYLOR.
Micro-Blog : Sharing and Querying Content Through Mobile Phones and Social Participation Presented by: Muhammad S. Karim By S. Gaonkar, J. Li, R. Choudhury,
Micro-Blog: Sharing and Querying Content Through Mobile Phones and Social Participation Zhonglu Wang
Moodle (Course Management Systems). Assignments 1 Assignments are a refreshingly simple method for collecting student work. They are a simple and flexible.
An Overview of MPEG-21 Cory McKay. Introduction Built on top of MPEG-4 and MPEG-7 standards Much more than just an audiovisual standard Meant to be a.
An Integration Framework for Sensor Networks and Data Stream Management Systems.
1 Energy-efficient Localization Via Personal Mobility Profiling Ionut Constandache Co-authors: Shravan Gaonkar, Matt Sayler, Romit Roy Choudhury and Landon.
UMBC iConnect Audumbar Chormale, Dr. A. Joshi, Dr. T. Finin, Dr. Z. Segall.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
Designing & Testing Information Systems Notes Information Systems Design & Development: Purpose, features functionality, users & Testing.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
® IBM Software Group © 2007 IBM Corporation Best Practices for Session Management
The Second Life of a Sensor: Integrating Real-World Experience in Virtual Worlds using Mobile Phones Mirco Musolesi, Emiliano Miluzzo, Nicholas D. Lane,
CrowdSearch: Exploiting Crowds for Accurate Real-Time Image Search on Mobile Phones Original work by Tingxin Yan, Vikas Kumar, Deepak Ganesan Presented.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
1.Research Motivation 2.Existing Techniques 3.Proposed Technique 4.Limitations 5.Conclusion.
FriendFinder Location-aware social networking on mobile phones.
FriendFinder Location-aware social networking on mobile phones.
Chapter 5 Introduction To Form Builder. Lesson A Objectives  Display Forms Builder forms in a Web browser  Use a data block form to view, insert, update,
Sensing Meets Mobile Social Networks: The Design, Implementation and Evaluation of the CenceMe Application Emiliano Miluzzo†, Nicholas D. Lane†, Kristóf.
FriendFinder Location-aware social networking on mobile phones.
Chapter 8 System Management Semester 2. Objectives  Evaluating an operating system  Cooperation among components  The role of memory, processor,
Role Of Network IDS in Network Perimeter Defense.
START Application Spencer Johnson Jonathan Barella Cohner Marker.
Anytime, Anywhere Access Benefits Functionality Work Order Administration Dispatch Work Order Work Order Details New Work Order Additional Functionality.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Overview Issues in Mobile Databases – Data management – Transaction management Mobile Databases and Information Retrieval.
Authors – Johannes Krupp, Michael Backes, and Christian Rossow(2016)
Chapter 2: System Structures
Micro-Blog: Sharing and Querying Content through Mobile Phones and Social Participation [Based on slides by Romit Roy Choudhury Asst. Prof. (Duke University)]
Firewalls.
An Overview of MPEG-21 Cory McKay.
Phillipa Gill University of Toronto
Micro-Blog - CS546 - Anoop Nimkar
Presentation transcript:

Shravan Gaonkar, Jack Li, Romit Roy Choudhury, Landon Cox, Al Schmidt Presented by : Gregory Teodoro

A brief overview  Mobile Computing  Hardware is increasing in power, and decreasing in cost such that basic commodity devices will be able to perform work such as participatory sensing.  Mobile phones especially, can be used by leveraging their camera, GPS, accelerometers, and other such sensors to gather information.  Using a multitude of these phones over a large area it is possible to build a “virtual information telescope”. A visual large scale interface, that can quickly shift to small and more detailed specifics.  Combined with these sensors, participating users can record multimedia blogs (video, voice, pictures, ect.).  Deeper in, these blogs can be combined with a user-based query/answer. (ala services such as Cha-Cha, but less personal and more public/social)  Combined, all of these factors form…

…the Micro-Blog Service!  Micro-blog stands to combine all of this information  Idea being to create a network of easily accessible, localized information.

Services - Querying  Querying Service  The Micro-blogs main goal is to offer a querying services, through use of the influx of sensor information, a user can gather information about temperature, weather, available Wi-Fi services  Queries can also require human interaction.  Questions can be sent out to an area about nearby restaurants, locations, the weather, attractions ect… and then answered by people in the area.

Services – Location-Based  Queries and blogs can also be superimposed on a virtual space (map) or a physical space (a part of a city). “Float”.  Person A sends out micro-blog about Restaurant X in Area Y.  Person B comes to Area Y and has set an interest in information on “Restaurants”. Since he’s in Area Y, he’d receive Person A’s microblog about the Restaurant X.  Relies on social participation.

Potential Applications  Tourism  On the fly information about attractions in an area, either through blogs or audio/videos.  Can ask questions about services in an area (parking, hotels, ect)  News Services  Users send out and report events they see, or sensors information can create and offer weather announcements.  Spontaneity of capturing information and easier publishing means immediate news reports

Potential Applications (cont.)  Micro-Alerts  Location-aware alerts, an example being a college where microblogs can be placed directing users to specific buildings.  Comparable best to floating sticky notes.  Social Collaboration  Ability to offer on the fly services, ala Craigslist.  Car Pools and Healthcare Reports for example.  Can post queries and questions, and qualified users can answer them.

Architecture and Design  Location based Micro-blogs require a localization service.  GPS, GSM, WiFi, ect  Issue of potential power consumption and accuracy balance.  Blog are location-tagged then indexed by originator, access permissions, themes, ect.  Client contacts webserver to access and retrieve a micro-blog.  Users can also send queries to specific regions R.  Using the localization, the database can see if it has any serviceable blogs to send to the user, and attempts to match time, location, and permissions.  If it cannot find an answer, it will send a query to phones in the area that are declared available, and they may answer the query.  Any answers are placed onto the map as a new micro-blog, and may be deleted after a pre-specified lifetime.  Users will also automatically received micro-blogs pertaining to their interests and the region they are in, triggered when the phone updates its location.

Block-Diagram of Micro-Blog

Considerations  Energy Aware Localization  Constant running of GPS localization is a heavy drain on energy, and may not be required for acceptable accuracy.  Energy Aware Applications  Applications should adapt to energy needs and efficiency versus performance.  Incentives  Why would people answer queries if they don’t have to?  Location Privacy  Location-based blogging reveals the bloggers general location, security and privacy concerns.  Spam  Malicious users may use the service to spam other users.  Content Inaccuracy  Not all query answers might be correct, and malicious users may outright lie.

Energy Awareness  Rather than using a single localization scheme, we can use a mix.  Use GPS to find the general location once, then use the less expensive WiFi or GSM localizations to keep track.  We only use GPS if we have too, or if the user has traveled a distance above a certain threshold.  Using a technique called war-driving, a map of WiFi Aps can be created, and then used (by detecting if a user is in range) to device a users approximate location.

Interpolated Path

Problems with this…  Does not achieve optimal usage.  Sharp turns in a path may not trigger a change in the WiFi-estimated distances.  Will continue to extrapolate the original direction of movement, and not the sudden turns.  Will not correct itself until a new WiFi fingerprint is created.

Energy Aware Applications  Only updates by GPS when required, or when a blog is actually created and placed.  When not created a blog, it will only updated based on Wi-Fi or cell-based localizations, as exact location or accuracy may not be required.  Delay updating and uploading blogs if battery power is below a certain threshold.  Keeps power on the phone in case of an unforeseen emergency.

Incentives  Why should people answer queries if they don’t need to?  Queries can be restricted to social network  A user’s friends would be far more likely to answer than a stranger.  Alternatively a give and take approach  Users would be given “query credits” based on how often they participate and answer other user’s queries.  Issues with bogus queries, collusion, cliques, ect.  Malicious or misbehaving users can be found through use of a direction node with a cost representation how often the two nodes query each other.  Monetary costs for sending out queries and answers  Plan is to piggy-back on a value package offered by phone providers.

Locational Privacy  Location-based blogging reveals the bloggers location!  A trust is required between the users and the server administrators at Micro-Blog. A fundamental drawback.  They make the assumption that users are willing to trust Micro-Blog.  Offers a private, social, and a public mode as an alternative.

Spam  The network can be used send spam to users  Proposed solution is to limit the amount of queries a single user can receive from each group (private, social, public) during a time period.  Blocks any queries past this point  Does not solve the issue!  A user can be spammed to use up the number of queries they want to receive a day, preventing any future legitimate queries from being received.

Content Inaccuracy  Not all information will be correct.  Users will receive a reputation based on other user’s ratings.  Akin to other social services like Digg.  The higher a reputation, the more confidence the micro- blog will have that their query answer is correct.  Do not publish answers from sources that are not confident.  PROBLEMS!  A malicious user will be quickly locked out, as will unknowledgeable, but they will still be able to send out some disinformation  No methods to stop a malicious user from acting legitimate to gather a good reputation, and then abusing it  Ties into group/user collusion as well.

Implementation  The Micro-Blog program is placed onto a phone client.  Designed specifically to interrupt the normal operations of a phone as little as possible.  System State  System begins in Idle mode  User goes to send a blog  When finished, blog is sent out, phone is tagged with location, and then switches to Sync mode  Sync Mode  Phone syncs information with the webserver and receives any new, relevant Micro-blogs, then returns to Idle  Log State  Entered periodically where phone updates its status based on sensor data (signal strength, temperatures, cameras, WiFi/GSM IDs, ect), then returns to Idle  Query state  A query was receive and appears on the users phone and waits for an action. Either reply or ignore. Sends it out, then returns to Idle  This is also checked periodically.

State Machine for Micro-Blog

Web Infastructure  Phone data is send to a database via TCP, and uploading into a MySQL database server, then indexed into proper relational tables.  Blogs in response to an earlier query are sent out to the approriate users.  Apache 2.0 is used to offer HTTP access to the Micro-Blog over a web browser, where users can request blogs, create blogs, and browse a region map.  Server periodically checks all phones that have a live connection and their user-set constraints and send queries to them as appropriate.

Battery Life and Localization  A mix between localization techniques, and the use of battery must be found.  Findings were done using a Nokia N95 phone.  Main research was done through the use of localization trades off.  Localization schemes included using combinations of WiFi, GPS, and GSM.

Findings

Findings (cont.)  Battery life improved using a mix of the localization schemes as appropriate.  This still had a negative effect on locational accuracy  As far as the application is concerned the trade-off of accuracy is worth the improvement of battery life  Methods Attempted  Wifi with periodic GPS correction  GSM with periodic WiFi Corrections  Proposed accuracy error was a max of 125m, leading to a total of 25 hours of battery life.  GSM with periodic WiFi offered the best battery life vs. localization error, and is used in the Micro-Blog program.

Findings (Cont.)

Reception  Questionnaires were done on participants about the application and how they felt about it.  Great for idling periods, but needs a better GUI.  Privacy control is absolutely vital, and users appreciated the ability to control privacy.  Incentives may not be an issue if program is “fun”.  Strong correlation between voice blogs being personal, and text blogs being impersonal.  Best time of day is between 5:00-9:00 PM  Concerns about battery life minimal because recharging is easy or imminent.

Paper Strengths  Very good ideas about what the software should do, and some basic logistics behind it.  Highly concerned with battery and location accuracy, and answers the question about what should be used well.  Lots of future potential in the subject at hands.  Does attempt hands-on testing and user-base interaction.

Paper Weaknesses  Ignores a lot of potential networking issues, such as sorting through data, dealing with traffic, packet loss, congestion, among other things  Glazes over some of the privacy and malicious user issues, and does not fully solve them.  Though it was a user study, not many users were involved (only 12), nor were these users varied in location, culture, or age.  Needs a far more extensive study of a user-base  Paper does admit this as a fault of the study.

Future Work/Follow Ups  Location-Privacy in the General Public  A far broader audience needs to be approached with the software and tested.  Accelerometer usage  Accelerometers are not used in terms of gauging distance travel and localization techniques  Has potential to be integrated into social networking applications (Facebook, MySpace, Google+)  Methods of identifying and blocking false content need to be developed.

Questions?