Institute for Security Technology Studies Dartmouth College Digital Living 2010: Sensors, Privacy, and Trust David Kotz September 2005.

Slides:



Advertisements
Similar presentations
Mobile Computing and Commerce And Pervasive Computing
Advertisements

Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
1 The Ubiquitous Web Eunchae Yoon. School of Engineering, Eunchae Yoon 2 Contents What is Ubiquitous computing? What is Ubiquitous Web? Ubiquitous computing.
Beyond Prototypes: Challenges in Deploying Ubiquitous Systems N. Davies and H. Gellersen IEEE pervasive computing, 2002 Presenter: Min Zhang
Daniela Oliveira 1, Dhiraj Murthy 1, Henric Johnson 2, S. Felix Wu 3, Roozbeh Nia 3 and Jeff Rowe 3 1 Bowdoin College 2 Blekinge Institute of Technology.
Component-Based Software Engineering Oxygen Paul Krause.
Autonomous Mobile Mesh Networks and their Design Changes.
Ruhr University Bochum Cryptography in Heavily Constraint Environments Christof Paar EUROBITS Center for IT Security COmmunication SecuritY (COSY) Group.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
CS 239: Advanced Security Spring 04 Security in Pervasive and Ubiquitous Environments Sam Irvine
Mobile Commerce and Ubiquitous Computing
Cloud Usability Framework
Frequently asked questions about software engineering
Lecture 1.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
Barracuda Spam & Virus Firewall. Introduction to the Barracuda Spam & Virus Firewall Complete server protection –Spam Blocking (95+ percent) Extremely.
A Survey of Mobile Phone Sensing Michael Ruffing CS 495.
Personalized Medicine Research at the University of Rochester Henry Kautz Department of Computer Science.
Final Exam Part 1. Internet Regulation Internet regulation according to internet society states that it is about restricting or controlling certain pieces.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Chapter 1- Introduction
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
1 Introduction to Security Chapter 11 Information Technology (IT) Security.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
CCTV AND IT’S FUTURE SAMPLEPRESENTATION CCTV What are we doing with CCTV? What will CCTV be like in 10 Years? How about tomorrow?
Introduction to the Atlas Platform Mobile & Pervasive Computing Laboratory Department of Computer and Information Sciences and Engineering University of.
AtomPark Software is founded in The head office is located in Saint-Petersburg, Russia. Company is officially registered in the United States. AtomPark.
1 An Introduction to Software Engineering. 2 Objectives l To introduce software engineering and to explain its importance l To set out the answers to.
INTERNET- A BOON OR A CURSE AYUSHI PRADHAN. WHAT IS IT? Internet or INTERnational NETwork is a network of networks that crisscrosses the globe and even.
Software engineering. What is software engineering? Software engineering is an engineering discipline which is concerned with all aspects of software.
Security and Privacy in Smart Communities By: Dr. Tan Hanh, Dr. Hoang Xuan Dau Posts and Telecommunications Institute of Technology (PTIT), Hanoi, Vietnam.
Looking ahead in Pervasive Computing: Challenges, Opportunities in the era of Cyber Physical Convergence Authors : Marco Conti, Sajal K. Das, Chatschik.
Mobile Commerce (M-Commerce)
Chapter 1: Introduction Omar Meqdadi SE 2730 Lecture 1 Department of Computer Science and Software Engineering University of Wisconsin-Platteville.
© 2008 Pearson Prentice Hall, Electronic Commerce 2008, Efraim Turban, et al. Chapter 9 Mobile Computing and Commerce and Pervasive Computing.
Usability in Pervasive Computing Environment Advance Usability October 18, 2004 Anuj A. Nanavati.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
ECEN “Internet Protocols and Modeling”, Spring 2012 Slide 2.
An Introduction to Software Engineering. Communication Systems.
FOREWORD By: Howard Shrobe MIT CS & AI Laboratory
1 Software Engineering Ian Sommerville th edition Instructor: Mrs. Eman ElAjrami University Of Palestine.
The IP-enabled grid – more than just smart meters Henning Schulzrinne Department of Computer Science Columbia University.
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
Telecom and Informatics 1 Security and Privacy in Distributed Services Trial lecture: Security and Privacy in Distributed Services Richard Torbjørn Sanders.
REU 2004 Computer Science and Engineering Department The University of Texas at Arlington Research Experiences for Undergraduates in Distributed Rational.
1. Nortel Confidential Information BUSINESS MADE SIMPLE 2 The Future of Telecommunications John A. Phillips Nortel, ETSI General Assembly Chairman 2007.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Software Engineering Chapter 1- Introduction. Topics covered  Professional software development  What is meant by software engineering.  Software engineering.
Computer Science and Engineering 1 Mobile Computing and Security.
REU 2007 Computer Science and Engineering Department The University of Texas at Arlington Research Experiences for Undergraduates in Information Processing.
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
Making a History of the Internet in South Korea : A Users' Perspective Myungkoo Kang Professor of Communication Studies College of Social Sciences Seoul.
Computer Science and Engineering Department The University of Texas at Arlington MavHome: An Intelligent Home Environment.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 1 Slide 1 An Introduction to Software Engineering.
REU 2009 Computer Science and Engineering Department The University of Texas at Arlington Research Experiences for Undergraduates in Information Processing.
Big Data Quality Challenges for the Internet of Things (IoT) Vassilis Christophides INRIA Paris (MUSE team)
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
Business Challenges in the evolution of HOME AUTOMATION (IoT)
Computer Science and Engineering Department The University of Texas at Arlington MavHome: An Intelligent Home Environment.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Chapter 1- Introduction
CS281 – Introduction to Software Engineering Chapter1: Introduction
Chapter 1- Introduction
Frequently asked questions about software engineering
Mobile Commerce and the Internet of Things
What are the attributes of good software?
CS281 – Introduction to Software Engineering Chapter1: Introduction
Physical Design and Implementation with Emerging Environment INFS 360
Abhishek Bhola Bharati Vidyapeeth University, College of Engineering
Chapter 1 Introduction.
Presentation transcript:

Institute for Security Technology Studies Dartmouth College Digital Living 2010: Sensors, Privacy, and Trust David Kotz September 2005

I S T S Dartmouth College Digital Living 2005 User Home computer PDA Cell phone Internet Today’s user can barely keep their home computer secure from spam, spyware, viruses, phishing, … let alone properly protect personal data on the PC and increasingly pervasive devices.

I S T S Dartmouth College Digital Living 2010 User Home computer PDA telephone Tomorrow’s users will be surrounded by pervasive devices, embedded sensors and systems… all connected to the Internet. Entertainment systems Car Surveillance and security at home, work, or in public building automation Banking and commerce Photography Home appliances Games Inventory/sales tracking Health/medical Communications User

I S T S Dartmouth College DL2010: Challenges How will users cope in 2010? …manage security of their systems? …manage privacy of their information? …make informed trust decisions? How do we design usable pervasive systems that support users’ security and respect users’ privacy?

I S T S Dartmouth College Research Challenges Can normal users cope? –Easy configuration, management, and maintenance. –What trade-offs will they make? Convenience vs. privacy. –What interfaces allow them to control these trade-offs? Can you trust the system? –Secure sensing and aggregation of sensitive information. –To produce valid results, or indicate when results are uncertain? –Detect or resist attacks to discover secrets or disrupt service? Imagine malicious insider, with access to a trusted device? What role do organizations play? –Schools, employers, landlords, governments: differing interests. –Yet people work at home, and do personal things at work. Long-term embedded devices last a decade or more –System evolution with heterogeneous systems and old devices The ultimate in homeland security –DoS on your home infrastructure: no more heat? –Spyware exposes the most intimate details of your home life

I S T S Dartmouth College Interdisciplinary problem Computer Science Engineering Sociology Psychology Ethics and law Economics and business

I S T S Dartmouth College Thank you Key message: how can we help the average person cope with the coming digitally mediated lifestyle, yet maintaining privacy of their information and making informed trust decisions?

I S T S Dartmouth College Pervasive systems are different Unprecedented coverage Invisible data collection Data is more intimate New motivations for data collection Unprecedented amount of data sharing Pervasive systems may –sense the physical world –communicate invisibly –interact autonomously –be managed by multiple administrators From Lahlou et al., “Privacy and trust issues with invisible computers”, CACM March From Kumar Ranganathan, “Trustworthy Pervasive Computing: The Hard Security Problems”, 2004.

I S T S Dartmouth College The ISTS PLACE project Privacy in Location-Aware Computing Environments Focus on sensor networks –Specifically, for sensing location Focus on location-aware applications –In the home and work environment Interdisciplinary approach –Computer Science –Sociology Funded by ISTS (Department of Justice)