Lecture 9 - Mobile and Ubiquitous Computing
Lecture 9 - Mobile and Ubiquitous Computing
Ubiquitous Computing
Objectives
❖ Introduce the volatility of mobile and
ubiquitous systems
❖ Software components associate and
interoperate with one another
❖ Systems integrated with physical world
through sensing and context awareness
❖ Security and privacy issues
❖ Techniques for adapting to small devices
Main Content
❖ Device model
▪ Limited energy
▪ Resource constraints
▪ Sensors and actuators
❖ Volatile connectivity
▪ Disconnection:
▪ Variable bandwidth and latency
❖ Spontaneous interoperation
❖ Lowered trust and privacy
Association
Association
❖ Volatile components need to interoperate
– preferably without user intervention
▪ Network bootstrapping:
• communication takes place over a local network
• device must first acquire an address on the local
network
▪ Association
• associate to services in the smart space
• provide services to components
Association
❖ Discovery services
▪ Clients find out about the services provided in
a smart space using a discovery service
▪ Design issues
• Low-effort, appropriate association
• Service description and query language
• Smart-space-specific discovery
• Directory implementation
• Service volatility
Association
❖ Physical association
▪ Human input to scope discovery
▪ Sensing and physically constrained channels
to scope discovery
▪ Direct association
• Address-sensing
• Physical stimulus
• Temporal or physical correlation
Sensing & context
awareness
Sensing & context awareness
❖ Hardware-related issues
▪ Portable devices can be more easily stolen
▪ Devices do not have sufficient computing resources asymmetric
cryptography
▪ Low energy
▪ Disconnected operation
❖ New types of resource-sharing require new security
designs. For example,
▪ Admin of smart spaces sending slides in a meeting room
▪ Employees exchange documents between mobiles and portable
devices
▪ Wireless heart-rate monitoring associated to clinic data-logging
service
➢ None is quite like the resource-sharing patterns normally
encountered within firewall-protected intranets or Internet
Security & Privacy
❖ Some solutions
▪ Secure spontaneous device association
• create a secure channel between two devices by
securely exchanging a session key between those
two devices and using it to encrypt their
communication
▪ Location-based authentication
• base access control on the location of the
services’ clients, rather than their identity
▪ Privacy protection
• Safeguard for previous solutions
Adaption
Adaption