15 research outputs found

    Mobile agent platforms in ubiquitous computing applications and systems (a literature review)

    Get PDF
    Technology revolution has been occurred rapidly over the last past thirty years According to the moor’s law power of microprocessors double every eighteen months. And also a parallel increase can be observed in some other technological sectors such as network communication, bandwidth, storage, capacity. These remarkable trends make us to predict that in future computer will become considerably smaller, cheaper and more pervasive. These result a creation of small things that can access the internet in order to optimize their intended purpose. It gives birth to new technology trend called “Ubiquitous computing”. Ubiquitous computing is an emerging technology that brings new dimensions to distributed computing. It uses a wide variety of smart, ubiquitous devices throughout an individual’s working and living environment. When it comes to ubiquitous computing, mobile objects and mobile agents are forerunners. Mobile agents are considered a very interesting and emerging technology to develop applications for mobile and distributed computing. Since they present a combination of unique features, such as their autonomy and capability to move to remote computers to process data there and save remote communications, they can be widely used in ubiquitous computing. Many mobile agent platforms have been developed since the late nineties. In this millennium era they are now influenced in many aspects of technology such as localization of technology, internet connection, voice recognition etc. This literature review focuses on Mobile agent platforms in ubiquitous computing applications and systems

    Towards an integrated formal analysis for security and trust

    Get PDF
    We aim at defining an integrated framework for the (automated) analysis for security and trust in complex and dynamic scenarios. In particular, we show how the same machinery used for the formal verification of security protocols may be used to analyze access control policies based on trust management

    Surfing the Next Wave: Design and Implementation Challenges of Ubiquitous Computing

    Get PDF
    As computing becomes more mobile and pervasive, designing and implementing ubiquitous computing environments emerge as key challenges for information systems research and practice. The four short papers in this article report the highlights of the second Ubiquitous Computing Workshop at Case Western Reserve University in October 2003. The objectives of the papers are to set up a research agenda in this emerging interdisciplinary field, to share current level of understanding of leading edge research topics, and to create cumulative research streams in this field. Note: This paper consists of an overview of the second Ubiquitous Computing Workshop by its organizers, Kalle Lyytinen and Youngjin Yoo, followed by four papers summarizing its four major working groups. The four papers were prepared and can be read independently. They are not integrated

    Ubicomp: Using iStuff

    Get PDF
    Ubiquitous computing, ubicomp, represents a scenario where computer devices are omnipresent usually with a look like not traditional computers. For this, is also known with the term "disappearing computer". There exists also a close relation between ubicomp and human to computer interaction. With the appearing of new computer devices spread along the environment, new interfaces to resolve human to computer interaction. This master thesis presents a ubiquitous computing scenario that uses iStuff toolkit as communication path. Nintendo's WiiRemote, known as wiiMote, is used as new human to computer device to allow user's interaction. WiiMote is communicated with a computer using WiiGee java libraries that incorporates an iStuff proxy that lets communicating with the scenario. The scenario also includes a collaborative application, called Collaborative Tetris, to interact with. The first chapter presents technical concepts and tools: Starting with definitions of terms ubiquitous computing and human to computer interaction concept and then the main tools used to develop this master thesis: iStuff toolkit, WiiMote and WiiGee java libraries The second chapter describes the start up of mentioned tools and the description of test scenarios. Third chapter summarizes the test results of the scenarios: iStuff start up scenario, communication between iStuff and WiiMote using wiiGee and a possible ubiquitous computing environment with a collaborative application: collaborative Tetris. Finally the conclusions of tests, possible effects over environment in a green study and personal conclusions are present

    Solution analysis of universal wireless joint point technologies for heterogeneous tactical networks

    Get PDF
    The scope of this thesis is to analyze the feasibility of having different wireless mesh network architectures transfer data to a wired network via a joint (universal) access point (UAP). Additionally this thesis analyzes the feasibility of using similar joint (universal) access point technology to allow heterogeneous wireless mesh network devices in close proximally to the UAP transmit data to/from each other via the UAP. This research also includes evaluating COTS tools for possible implementation of a joint access point as well as seeking partnership with private industry to assist in research efforts and/or the development or joint (universal) access point solution(s). The thesis concludes with a recommendation on application of universal joint point technology, to include recommendations for implementation of such technology in the Tactical Network Topology (TNT) environment.http://archive.org/details/solutionnalysiso109452951Approved for public release; distribution is unlimited

    Ubicomp: Using iStuff

    Get PDF
    Ubiquitous computing, ubicomp, represents a scenario where computer devices are omnipresent usually with a look like not traditional computers. For this, is also known with the term "disappearing computer". There exists also a close relation between ubicomp and human to computer interaction. With the appearing of new computer devices spread along the environment, new interfaces to resolve human to computer interaction. This master thesis presents a ubiquitous computing scenario that uses iStuff toolkit as communication path. Nintendo's WiiRemote, known as wiiMote, is used as new human to computer device to allow user's interaction. WiiMote is communicated with a computer using WiiGee java libraries that incorporates an iStuff proxy that lets communicating with the scenario. The scenario also includes a collaborative application, called Collaborative Tetris, to interact with. The first chapter presents technical concepts and tools: Starting with definitions of terms ubiquitous computing and human to computer interaction concept and then the main tools used to develop this master thesis: iStuff toolkit, WiiMote and WiiGee java libraries The second chapter describes the start up of mentioned tools and the description of test scenarios. Third chapter summarizes the test results of the scenarios: iStuff start up scenario, communication between iStuff and WiiMote using wiiGee and a possible ubiquitous computing environment with a collaborative application: collaborative Tetris. Finally the conclusions of tests, possible effects over environment in a green study and personal conclusions are present

    Desarrollo de un esquema de autenticación basado en la identidad para clientes Android

    Full text link
    Con el gran crecimiento de las Tecnologías de la Información y de la Comunicación (TIC), la criptografía ocupa una posición de vital importancia para asegurar la seguridad en las comunicaciones. Uno de los desafíos de la criptografía actual se encuentra en la gestión de identidades digitales, problema cuya solución más empleada suele ser la Public Key Infrastructure (PKI) o Infraestructura de Clave Pública, en la que una Entidad certificadora emite certificados para las claves públicas de los usuarios registrados. Sin embargo, esta solución presenta unos inconvenientes que se podrían solucionar con la llamada Identity-Based Cryptography (IBC) o Criptografía Basada en la Identidad. En este TFG se presenta un breve repaso sobre las distintas soluciones al problema de la gestión de identidades centrándose en la Criptografía Basada en la Identidad, además de discutir sus beneficios y exponer la descripción formal del proyecto software realizado para este trabajo. Dicho proyecto lleva a cabo un Cliente de mensajería instantánea para dispositivos móviles Android que se conecta con un Servidor desarrollado en Flask para Python y que hace las veces de Servidor de aplicaciones y de Private Key Generator (PKG), implementando un esquema de autenticación basado en la identidad. Para la implementación de la Seguridad Basada en la Identidad se ha utilizado la biblioteca Charm de Python. La descripción detallada del proyecto incluye el análisis, diseño, implementación y plan de pruebas llevados a cabo para su desarrollo. Dicha descripción, además, viene acompañada de una serie de anexos con Información complementaria, como la planificación temporal del proyecto o la creación de certificados SSL.As a consequence of the leading role of Information and Communication Technologies (ICT) in today's econcomic activity, cryptography has become of the utmost importance to ensure the security of online communication. One of the biggest challenges of current cryptography lies in digital identity management. Public Key Infrastructure (PKI) is the most commonly used to handle this problem. In PKI, the Certi cation Authority (CA) issues certi cates for the public keys of registered users. However, this solution has a few problems which could be solved by using Identity- Based Cryptography (IBC). This document gives a brief review over the di erent ways of solving the digital identity management problem, focusing on Identity-Based Cryptography and its advantages. It also presents the formal description of the developed software project. This project implements an instant messaging app for an Android Client which connects with a Server developed in the Flask microframework for Python. The Server is made by di erent components, and it works as Private Key Generator (PKG) and as an Application Server. All in all, it implements an authentication schema based in Identity-Based Cryptography using Charm library for Python for the IBE functionality. The detailed description of the project includes its analysis, design, implementation and test plan. It also includes some complementary information in the form of annexes like the plani cation of the project and the guide for the creation of SSL certi cates

    A privacy-aware and secure system for human memory augmentation

    Get PDF
    The ubiquity of digital sensors embedded in today's mobile and wearable devices (e.g., smartphones, wearable cameras, wristbands) has made technology more intertwined with our life. Among many other things, this allows us to seamlessly log our daily experiences in increasing numbers and quality, a process known as ``lifelogging''. This practice produces a great amount of pictures and videos that can potentially improve human memory. Consider how a single photograph can bring back distant childhood memories, or how a song can help us reminisce about our last vacation. Such a vision of a ``memory augmentation system'' can offer considerable benefits, but it also raises new security and privacy challenges. Maybe obviously, a system that captures everywhere we go, and everything we say, see, and do, is greatly increasing the danger to our privacy. Any data breach of such a memory repository, whether accidental or malicious, could negatively impact both our professional and private reputation. In addition, the threat of memory manipulation might be the most worrisome aspect of a memory augmentation system: if an attacker is able to remove, add, or change our captured information, the resulting data may implant memories in our heads that never took place, or, in turn, accelerate the loss of other memories. Starting from such key challenges, this thesis investigates how to design secure memory augmentation systems. In the course of this research, we develop tools and prototypes that can be applied by researchers and system engineers to develop pervasive applications that help users capture and later recall episodic memories in a secure fashion. We build trusted sensors and protocols to securely capture and store experience data, and secure software for the secure and privacy-aware exchange of experience data with others. We explore the suitability of various access control models to put users in control of the plethora of data that the system captures on their behalf. We also explore the possibility of using in situ physical gestures to control different aspects regarding the capturing and sharing of experience data. Ultimately, this thesis contributes to the design and development of secure systems for memory augmentation

    Secure, Efficient and Privacy-aware Framework for Unstructured Peer-to-Peer Networks

    Get PDF
    Recently, the advances in Ubiquitous Computing networks and the increased computational power of network devices have led designers to create more flexible distributed network models using decentralised network management systems. Security, resilience and privacy issues within such distributed systems become more complicated while important tasks such as routing, service access and state management become increasingly challenging. Low-level protocols over ubiquitous decentralised systems, which provide autonomy to network nodes, have replaced the traditional client-server arrangements in centralised systems. Small World networks represent a model that addresses many existing challenges within Ubiquitous Computing networks. Therefore, it is imperative to study the properties of Small World networks to help understanding, modelling and improving the performance, usability and resiliency of Ubiquitous Computing networks. Using the network infrastructure and trusted relationships in the Small World networks, this work proposes a framework to enhance security, resilience and trust within scalable Peer-to-Peer (P2P) networks. The proposed framework consists of three major components namely network-aware topology construction, anonymous global communication using community trust, and efficient search and broadcasting based on granularity and pro-active membership management. We utilise the clustering co-efficient and conditional preferential attachment to propose a novel topology construction scheme that organises nodes into groups of trusted users to improve scalability. Network nodes communicate locally without advertising node identity at a global scale, which ensures user anonymity. The global communication is organised and facilitated by Service Centres to maintain security, privacy and integrity of member nodes. Service Centres are allocated using a novel leader election mechanism within unstructured scalable P2P networks. This allows providing fair and equitable access for existing and new nodes without having to make complex changes to the network topology. Moreover, the scale-free and clustering co-efficient characteristics of Small World networks help organising the network layout to maintain its balance in terms of the nodes distribution. Simulation results show that the proposed framework ensures better scalability and membership management in unstructured P2P networks, and improves the performance of the search and broadcasting in terms of the average shortest path and control overhead while maintaining user anonymity and system resiliency
    corecore