Context-Aware & Yet Another service Hiromitsu Kato Systems Development Lab. Hitachi, Ltd. UBICOMP2002 W7: Security in Ubiquitous.

Slides:



Advertisements
Similar presentations
OneM2M Technical Requirements - Driven by EU BUTLER and IEEE PAC - Group Name: WG1 (REQ) Source: Friedbert Berens, FBConsulting Sarl,
Advertisements

Contextualized Information-Centric Home Networking (draft-ravindran-cibus-01.txt) IRTF/ICN-RG (IETF-89) Ravi Ravindran, Asit Chakraborti, G.Q.Wang.
Introduction to Pervasive and Ubiquitous Computing Dr. Tarek Sheltami COE 482.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 9 Communications and Networks.
VITP and CARS: A Distributed Service Model and Rate Adaptation for VANETs Liviu Iftode Department of Computer Science Rutgers University.
Mobile Commerce and Ubiquitous Computing
Telecommunications and Networks
Security and Privacy in Ubiquitous Computing. Agenda Project issues? Project issues? Ubicomp quick overview Ubicomp quick overview Privacy and security.
Building an Application Server for Home Network based on Android Platform Yi-hsien Liao Supervised by : Dr. Chao-huang Wei Department of Electrical Engineering.
Enhanced Collaboration and other benefits of Sharepoint Technologies Kern Sutton Business Productivity Group Microsoft Corporation.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
2020 Ubiquitous Computing of/videos/popscis-future-of-ubiquitous-computing.htm Ubiquitous Computing,
COnvergence of fixed and Mobile BrOadband access/aggregation networks Work programme topic: ICT Future Networks Type of project: Large scale integrating.
Not only Safe but Competitive Presentation to Copy Protection Technical Working Group October 22, 2003 Far East Engineering Corp, Tokyo Japan Makoto Saito/Rie.
January THE ISSUE Launch Event. Leicester. THE ISSUE Traffic- Health- Environment. Intelligent Solutions Sustaining Urban Economies. Professor.
CS 580 chapter 4 paradigms.
I5310 : Part II Context-Aware Computing [Introduction to the course] Yun-Maw Kevin Cheng 鄭穎懋 Context-Aware Interactive Systems Lab.
Robot Autonomous Perception Model For Internet-Based Intelligent Robotic System By Sriram Sunnam.
4G-LTE: Enhancing Efficiency in Organizations. Factors Impacting Digitization Processes and Systems January Powerful Platforms and Devices Storage.
Innovative ITS services thanks to Future Internet technologies ITS World Congress Orlando, SS42, 18 October 2011.
Microsoft and Community Tour 2011 – Infrastrutture in evoluzione Community Tour 2011 Infrastrutture in evoluzione.
10/2/2004Copyright Osborne Associates (Scotland) Ltd 1 Scenario Thinking in Industrial Innovation Ian Osborne Principal, Osborne Associates
IoT, Big Data and Emerging Technologies
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
IGERT: Graduate Program in Computational Transportation Science Ouri Wolfson (Project Director) Peter Nelson, Aris Ouksel, Robert Sloan Piyushimita Thakuriah.
$20 billion business 230 million printers sold  170 million inkjet  60 million laserjet #1 in ink, laser, scanners, designjet, print servers Consistent.
4 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Computer Software Chapter 4.
Master Course /11/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
Intelligent Environments1 Conclusions and Future Directions.
Computer Architecture and Embedded Systems Paul Havinga University of Twente.
Two trends that will change the Internet
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
The ERA of API in the World of IoT Jing Zhang-Lee November, 2015.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Chapter 1 Software Installation and Creating a New Company Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
Ubiquitous, Domestic and Tangible Computing A new way of thinking Saul Greenberg University of Calgary CPSC
March 2004 At A Glance The AutoFDS provides a web- based interface to acquire, generate, and distribute products, using the GMSEC Reference Architecture.
Third International Workshop on Networked Appliance 2001 SONA: Applying Mobile Agent to Networked Appliance Control S.Aoki, S.Makino, T.Okoshi J.Nakazawa.
Education – Partnership – Solutions Information Security Office of Budget and Finance Christopher Giles Governance Risk Compliance Specialist The Internet.
IDB-1394 Real-Time System Lab. Mar Contents TELEMATICS IVN (In-Vehicle Network) Technical Trend of IVN IDB-1394 IDB-1394 Vs. MOST 1.
Gaia Ubiquitous Computing Directions Roy Campbell University of Illinois at Urbana-Champaign.
Internet of Things – Getting Started
NIPS ‘97 Sofia, October Broadband Network Architectures: Evolution towards Distributed Intelligence Broadband Network Architectures: Network.
Innovative ICT Building a Better Smart City. Agenda 1. Why focus on Smart City 2. What is a Smart City 3. References.
1 © Nokia 2016 An innovation leader in the technologies that connect people and things.
Building a Better Connected World
CS 580 chapter 4 paradigms.
Scalable Web Apps Target this solution to brand leaders responsible for customer engagement and roll-out of global marketing campaigns. Implement scenarios.
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
Ubiquitous Networking in support of UNIOT
Forefront Security ISA
Scalable Web Apps Target this solution to brand leaders responsible for customer engagement and roll-out of global marketing campaigns. Implement scenarios.
Objectives Overview Explain why computer literacy is vital to success in today's world Describe the five components of a computer Discuss the advantages.
Ramy Ahmed Fathy ITU-T SG20 Vice Chairman
Mobile Commerce and the Internet of Things
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
Ambient Intelligence -by Internal Guide: M.Preethi(10C91A0563)
IS4680 Security Auditing for Compliance
Mobile Agents M. L. Liu.
AI Stick Easy to learn and use, accelerate the industrialization of artificial intelligence, and let the public become an expert in AI.
Internet of Things.
Unit# 5: Internet and Worldwide Web
KNOWLEDGE MANAGEMENT (KM) Session # 34
Mobile Commerce and Ubiquitous Computing
5G as a Social Infrastructure Chaesub LEE, Director, ITU
Principles of Information Technology
OU BATTLECARD: Oracle WebCenter Training
Presentation transcript:

Context-Aware & Yet Another service Hiromitsu Kato Systems Development Lab. Hitachi, Ltd. UBICOMP2002 W7: Security in Ubiquitous Computing

Copyright (C) 2002 Systems Development Laboratory, Hitachi, Ltd., All Rights Reserved. 2 Contents Our Future Vision – Super Distribution and Coordination System concept, AYA – Autonomous networking idea over Super Distributed Objects – Town Management Application Security Issues – Agility and Fragility – Direct access Our attempts – Secure Tele-operation Protocol – Ongoing works – Demo video

Copyright (C) 2002 Systems Development Laboratory, Hitachi, Ltd., All Rights Reserved. 3 Contents Our Future Vision – Super Distribution and Coordination System concept, AYA – Autonomous networking idea over Super Distributed Objects – Town Management Application Security Issues – Agility and Fragility – Direct access Our attempts – Secure Tele-operation Protocol – Ongoing works – Demo video

Copyright (C) 2002 Systems Development Laboratory, Hitachi, Ltd., All Rights Reserved. 4 Future Vision Super Distributed Intelligence Ubiquitous Networking Industry -Virtual line: Line organization according to individual product -Channel Assembly: Product customization in logistics -Recycling: Classification based on specification and used history Transportation -Smart ways: Roads memorizing accidents and advising safety drive -Smart cars: Cars cooperatively driving with each other to reduce accidents and improve traffic speed and density e-Life(Human Body) -Wearable Tools: Digital fabrics, computer ring, and other information tools receive various services such as safety, entertainment, business, etc. -Silicon Surgeons: Robots travel through body and monitor the health problem. Home/Office -Borderless operation: Appliances accessible from everywhere -Cooperative energy saving: Appliances autonomously work together for peak power shift

Copyright (C) 2002 Systems Development Laboratory, Hitachi, Ltd., All Rights Reserved. 5 Paradigm Shift From “Resource-Centric” to “User-Centric” Past Super Distribution Are the clients satisfied? Please give me… Servants for human and society. Java I like… -Logic-aware -Resource centered -Context-aware -Resource distributed Resource

Copyright (C) 2002 Systems Development Laboratory, Hitachi, Ltd., All Rights Reserved. 6 Contents Our Future Vision – Super Distribution and Collaboration Basic concept, AYA – Autonomous networking idea over Super Distributed Objects – Town Management Application Security Issues – Agility and Fragility – Direct Access Our attempts – Secure Tele-operation Protocol – Ongoing works – Demo video

Copyright (C) 2002 Systems Development Laboratory, Hitachi, Ltd., All Rights Reserved. 7 Basic Concept AYA: context-Aware & Yet Another service 綾 (AYA): A twill weave, a fabric with a twill weave Towards the woven and twilled intelligence system – The warp = Connection between Information and physical presence – The woof = Link between physical presences [Nishijin brocade]

Copyright (C) 2002 Systems Development Laboratory, Hitachi, Ltd., All Rights Reserved. 8 Target Application Town Management Support System – Goal: Area value augmentation Creating a real-world portal site attracting many people to come, by using IT – Requirements Service is highly situation-dependent – Various users, events, timing, devices, … Service consistency support …and more…

Copyright (C) 2002 Systems Development Laboratory, Hitachi, Ltd., All Rights Reserved. 9 Contents Our Future Vision – Super Distribution and Collaboration Basic concept, AYA – Autonomous networking idea over Super Distributed Objects – Town Management Application Security Issues – Agility and Fragility – Direct access Our attempts – Secure Tele-operation Protocol – Ongoing works – Demo video

Copyright (C) 2002 Systems Development Laboratory, Hitachi, Ltd., All Rights Reserved. 10 Security Issue (1) Easy come, easy go – Flexibility is likely to lead to fragility – The malicious user would easily realize the DoS (Denial of Service) attack. – Even the normal users could interrupt the service for another person.

Copyright (C) 2002 Systems Development Laboratory, Hitachi, Ltd., All Rights Reserved. 11 Security Issue (2) Ubiquitous direct access – The firewall cannot always be a premise in the ubicomp environment. – Self-protection is needed. But, how?

Copyright (C) 2002 Systems Development Laboratory, Hitachi, Ltd., All Rights Reserved. 12 Contents Our Future Vision – Super Distribution and Collaboration Basic concept, AYA – Autonomous networking idea over Super Distributed Objects – Town Management Application Security Issues – Agility and Fragility – Direct Access Our attempts – Secure Tele-operation Protocol – Ongoing works – Demo video

Copyright (C) 2002 Systems Development Laboratory, Hitachi, Ltd., All Rights Reserved. 13 Our first idea Operation-Privilege (O.P.) Management – Remote Controller (RC) Metaphor – Device access is allowed after acquiring the RC. – Malicious access can be stopped by taking away the RC.

Copyright (C) 2002 Systems Development Laboratory, Hitachi, Ltd., All Rights Reserved. 14 Secure Tele-operation Protocol Three-tier model approach – The secure procedure is arranged as the STP spec. P STP server Remote Operator’s Terminal Operation target UHA OHA External systemInternal system O.P. Remote Operator’s Terminal Operation target Requester Provider Mediator (User-Hosting Agent)(Object-Hosting Agent)

Copyright (C) 2002 Systems Development Laboratory, Hitachi, Ltd., All Rights Reserved. 15 Ongoing works Three-tier model is a firewall approach. Not suitable for ubiquitous direct access environment. Some ongoing works – Embedded STP Each active device would have the STP server functions for self-protection. – Adapter dispatch approach O.P. mgt. with secure manager and adapter dispatch – Privacy policy handling O.P. transfer vs. Privacy transfer

Copyright (C) 2002 Systems Development Laboratory, Hitachi, Ltd., All Rights Reserved. 16 Sample Application Scenario Smart Town Navigation Demo [Video] Station Theater Shopping Mall Home/Office

Copyright (C) 2002 Systems Development Laboratory, Hitachi, Ltd., All Rights Reserved. 17 Standardization Activity SDO SIG is organized in OMG – SDO = Super Distributed Objects – Members: U. of Tokyo, Hitachi SDL, FhG/FOCUS, UC Irvine/NTT, … RFP had issued in Feb 2002 – “PIM and PSM for SDO” – For the unified management model for devices and related software agents – First submission in Oct 2002 From tomorrow(!), it will be discussed in Helsinki…

Copyright (C) 2002 Systems Development Laboratory, Hitachi, Ltd., All Rights Reserved. 18 Summary Vision: Super Distributed World AYA: Enabling the surrounding embedded systems to support for human life flexibly Security issues – Fragility problem about ad-hoc systems – Ubiquitous direct access – … Our trials – OP Mgt., STP, Adapter dispatch, Privacy,...

Thank you Q&A: I appreciate if you would speak slowly.