Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Security and Services in Mobiquitous Computing Tim Finin University of Maryland, Baltimore County Mobiquitous ’04, 24 August 2004

Similar presentations


Presentation on theme: "1 Security and Services in Mobiquitous Computing Tim Finin University of Maryland, Baltimore County Mobiquitous ’04, 24 August 2004"— Presentation transcript:

1 1 Security and Services in Mobiquitous Computing Tim Finin University of Maryland, Baltimore County Mobiquitous ’04, 24 August 2004 http://ebiquity.umbc.edu/v2.1/event/html/id/45/ Joint work with Anupam Joshi, Yun Peng, Scott Cost & many students.  http://creativecommons.org/licenses/by-nc-sa/2.0/ This work was partially supported by DARPA contract F30602-97-1-0215, NSF grants CCR007080 and IIS9875433 and grants from IBM, Fujitsu and HP. tell register tell register

2 UMBC an Honors University in Maryland 2 The Question Is the service model right for Mobiquitous computing?

3 UMBC an Honors University in Maryland 3 The biquitous requirements The biquitous part of the Mobiquitous vision often (typically?) assumes or requires: (1) An open, heterogeneous and dynamic environment (2) A high degree of cooperation (3) Context sensitive functionality (4) Personalization driven by user models and data (5) AI like capabilities

4 UMBC an Honors University in Maryland 4 My Answer The service view is very appropriate The service view is very appropriate We can’t do all this stuff on a cell phone or wearable computer We can’t do all this stuff on a cell phone or wearable computer Even if we could, we need to interact with the other entities in the environment Even if we could, we need to interact with the other entities in the environment Ensuring security, privacy and trust is challenging in this environment and requires new ideas. Ensuring security, privacy and trust is challenging in this environment and requires new ideas.

5 UMBC an Honors University in Maryland 5 The biquitous requirements (1) An open, heterogeneous and dynamic environment Hosts, devices and people in motion Hosts, devices and people in motion The context is constantly changing The context is constantly changing Reasonable to model these as autonomous, self-interested agents Reasonable to model these as autonomous, self-interested agents Unreasonable to expect unique ontologies (data models) for most domains. Unreasonable to expect unique ontologies (data models) for most domains.

6 UMBC an Honors University in Maryland 6 The biquitous requirements (2) A high degree of cooperation Devices are simple but many tasks are complex – we will want to compose simple functions and services to accomplish our objectives Devices are simple but many tasks are complex – we will want to compose simple functions and services to accomplish our objectives Tasks may also require interaction (e.g., negotiation) between requester and provider Tasks may also require interaction (e.g., negotiation) between requester and provider Devices can fill multiple roles (requester Devices can fill multiple roles (requester

7 UMBC an Honors University in Maryland 7 The biquitous requirements (3) Context sensitive functionality Context can include location, time, ongoing activities, user’s intent, etc. Context can include location, time, ongoing activities, user’s intent, etc. This adds to the dynamism This adds to the dynamism And raises issues of recognition, anticipation and adaptation And raises issues of recognition, anticipation and adaptation That requires lots of information, some of which can only come from other entities in the environment That requires lots of information, some of which can only come from other entities in the environment

8 UMBC an Honors University in Maryland 8 The biquitous requirements (4) Personalization User profiles and models are a common theme User profiles and models are a common theme We want the environment to recognize or anticipate our interests, desires and preferences We want the environment to recognize or anticipate our interests, desires and preferences This gives rise to many privacy issues This gives rise to many privacy issues

9 UMBC an Honors University in Maryland 9 The biquitous requirements (5) AI like capabilities The pervasive environment will be (we think) large and complex, so we shouldn’t assume the end use will manage it all The pervasive environment will be (we think) large and complex, so we shouldn’t assume the end use will manage it all Desirable components (e.g., speech, NLP, vision, etc) are very sophisticated Desirable components (e.g., speech, NLP, vision, etc) are very sophisticated This has been there from the start, e.g., the Enterprise bridge, Mark Weiser’s seminal paper and in Apple’s Knowledge Navigator advert This has been there from the start, e.g., the Enterprise bridge, Mark Weiser’s seminal paper and in Apple’s Knowledge Navigator advert While this is a project for generations, the incremental results will pay for the work. While this is a project for generations, the incremental results will pay for the work.

10 UMBC an Honors University in Maryland 10 How do we approach this? Services are a good near term approach Services are a good near term approach New approaches to security, privacy and trust are required New approaches to security, privacy and trust are required Other components are needed, or at least useful Other components are needed, or at least useful

11 UMBC an Honors University in Maryland 11 Services are a good approach What do we mean by services? What do we mean by services? Not just uddi/wsdl/soap but also agent services, RMI services, etc. Not just uddi/wsdl/soap but also agent services, RMI services, etc. We need approaches that allow published APIs and protocols with “semantic” information We need approaches that allow published APIs and protocols with “semantic” information This will best support automated discovery, evaluation, composition, invocation and monitoring This will best support automated discovery, evaluation, composition, invocation and monitoring We require much more than syntactic interoperability – it’s not just about plumbing We require much more than syntactic interoperability – it’s not just about plumbing OWL and OWL-S are good starts OWL and OWL-S are good starts

12 UMBC an Honors University in Maryland 12 Security, trust and privacy In an open, dynamic and heterogeneous environment we must interact with agents we’ve never met before In an open, dynamic and heterogeneous environment we must interact with agents we’ve never met before This happens at all levels of the stack: ad hoc networking, P2P, services This happens at all levels of the stack: ad hoc networking, P2P, services Knowing their identity is also not enough Knowing their identity is also not enough We will have to make decisions based on verifiable attributes, endorsements, delegation of trust, etc. We will have to make decisions based on verifiable attributes, endorsements, delegation of trust, etc. Reputation is a promising approach Reputation is a promising approach

13 UMBC an Honors University in Maryland 13 Other components We make heavy use of software agents and semantic web languages We make heavy use of software agents and semantic web languages Agents provide a powerful process abstraction Agents provide a powerful process abstraction Underlying BDI model Underlying BDI model Rich agent communication languages Rich agent communication languages Semantic web languages provide an expressive knowledge sharing language Semantic web languages provide an expressive knowledge sharing language Designed for community development, use and maintenance Designed for community development, use and maintenance Supported by practical, open standards Supported by practical, open standards

14 UMBC an Honors University in Maryland 14 The Celebrity Couple SemanticWebSemanticWebSoftwareAgentsSoftwareAgents In 2002, Geek Gossip gushed “The semantic web will provide content for internet agents, and agents will make the semantic web “come alive”. Looks like a match made in Heaven!”

15 UMBC an Honors University in Maryland 15 TAGA: Travel Agent Game in Agentcities http://taga.umbc.edu/ Technologies FIPA (JADE, April Agent Platform) Semantic Web (RDF, OWL) Web (SOAP,WSDL,DAML-S) Internet (Java Web Start ) Features Open Market Framework Auction Services OWL message content OWL Ontologies Global Agent Community Motivation Market dynamics Auction theory (TAC) Semantic web Agent collaboration (FIPA & Agentcities) Travel Agents Auction Service Agent Customer Agent Bulletin Board Agent Market Oversight Agent Request Direct Buy Report Direct Buy Transactions Bid CFP Report Auction Transactions Report Travel Package Report Contract Proposal Web Service Agents Ontologies http://taga.umbc.edu/ontologies/ travel.owl – travel concepts travel.owl – travel concepts fipaowl.owl – FIPA content lang. fipaowl.owl – FIPA content lang. auction.owl – auction services auction.owl – auction services tagaql.owl – query language tagaql.owl – query language FIPA platform infrastructure services, including directory facilitators enhanced to use OWL-S for service discovery Owl for representation and reasoning Owl for service descriptions Owl for negotiation Owl as a content language Owl for publishing communicative acts Owl for contract enforcement Owl for modeling trust Owl for authorization policies Owl for protocol description

16 UMBC an Honors University in Maryland 16 What we learned OWL is a good KR language for a reasonably sophisticated MAS OWL is a good KR language for a reasonably sophisticated MAS Integrates well with FIPA standards Integrates well with FIPA standards OWL made it easy to mix content from different ontologies unambiguously OWL made it easy to mix content from different ontologies unambiguously Supporting partial understanding & extensibility Supporting partial understanding & extensibility The use of OWL supported web integration The use of OWL supported web integration Using information published on web pages and integrating with web services via WSDL and SOAP Using information published on web pages and integrating with web services via WSDL and SOAP OWL has limitations: no rules, no default reasoning, graph semantics, … OWL has limitations: no rules, no default reasoning, graph semantics, … Some of which are being addressed Some of which are being addressed

17 UMBC an Honors University in Maryland 17 A Love Triangle? Semantic Web Software Agents Pervasive Computing Even matches made in Heaven don’t always work out as planned.

18 UMBC an Honors University in Maryland 18

19 UMBC an Honors University in Maryland 19 Representing and Reasoning about Context CoBrA: a broker centric agent architecture for supporting pervasive context-aware systems Using SW ontologies for context modeling and reasoning about devices, space, time, people, preferences, meetings, etc. Using SW ontologies for context modeling and reasoning about devices, space, time, people, preferences, meetings, etc. Using logical inference to interpret context and to detect and resolve inconsistent knowledge Using logical inference to interpret context and to detect and resolve inconsistent knowledge Allowing users to define policies controlling how information about them is used and shared Allowing users to define policies controlling how information about them is used and shared

20 UMBC an Honors University in Maryland 20 A Bird’s Eye View of CoBrA

21 UMBC an Honors University in Maryland 21 Security in P2P Systems Peer-to-peer systems are manifest at multiple levels, such as ad hoc networking, file-sharing applications, and multiagent systems, Peer-to-peer systems are manifest at multiple levels, such as ad hoc networking, file-sharing applications, and multiagent systems, Recognizing “bad actors” in P2P systems is hard Recognizing “bad actors” in P2P systems is hard Bad actors might be having trouble, incompetent, uncooperative, or malicious Ad Hoc networks can be subverted by the introduction of malicious nodes Ad Hoc networks can be subverted by the introduction of malicious nodes E.g.: blackhole routers that do not forward packets MANETS offer additional challenges MANETS offer additional challenges

22 UMBC an Honors University in Maryland 22 Neighborhood Watch in ad hoc networks Node A sends packet destined for E, through B & D. Node A sends packet destined for E, through B & D. When B  D, B and C make snoop entry (A,E,Ck,B,D,E). When B  D, B and C make snoop entry (A,E,Ck,B,D,E). B and C check if D forwarded the packet or dropped, altered, or misrouted it. B and C check if D forwarded the packet or dropped, altered, or misrouted it. A B C D E

23 UMBC an Honors University in Maryland 23 T.T.T: things take time Prior to the 1890’s, papers were held together with straight pens. Prior to the 1890’s, papers were held together with straight pens. The development of “spring steel” allowed the invention of the paper clip in 1899. The development of “spring steel” allowed the invention of the paper clip in 1899. It took about 25 years (!) for the evolution of the modern “gem paperclip”, considered to be optimal for general use. It took about 25 years (!) for the evolution of the modern “gem paperclip”, considered to be optimal for general use.

24 UMBC an Honors University in Maryland 24 http://ebiquity.umbc.edu/ Annotated in OWL For more information


Download ppt "1 Security and Services in Mobiquitous Computing Tim Finin University of Maryland, Baltimore County Mobiquitous ’04, 24 August 2004"

Similar presentations


Ads by Google