This document summarizes research challenges in mobile computing. It discusses fields like data management, security, data mining, and distributed databases. For each area, it identifies challenges like limited resources, dynamic connectivity, and lack of centralization. It proposes solutions like context-aware and collaborative systems, distributed intrusion detection, and algorithms for trust and authentication in mobile environments. The goal is to develop intelligent systems that can adapt to challenges in mobile and pervasive computing domains.
SeaCat: SDN End-to-End Application ContainmentUS-Ignite
This demonstration shows how the SeaCat Application Containment Architecture secures a medical record system applications (OPENMRS) in an end-to-end manner. Using this framework, medical personal can securely access patient medial records from mobile devices without fear that patients/ medical records will accidentally be exposed/compromised by malware. Junguk Cho, David Johnson, Makito Kano and Kobus Van der Merwe, University of Utah
learn how to protect the data center from dangerous attacks including advanced malware, APTs, insider threats and DDoS. Leverage your existing network resources to:
• Obtain in-depth visibility into the data center, including virtual systems
• Quickly detect and address anomalies that could signify risks
• Prevent devastating data loss
• Improve incident response, forensics and compliance
For more information visit www.lancope.com
Network Connected Medical Devices - A Case StudySophiaPalmira
In this session, we welcome Shankar Somasundaram, CEO of Asimily, Priyanka Upendra, Quality Compliance Director at Banner Health, and Carrie Whysall. Director of Managed Security Services at CynergisTek.
Together, they will discuss medical device security, covering all you need to know from medical device assessments to remediation efforts. Attendees will leave this session knowing how to apply what they have learned about medical device security in real life.
SeaCat: SDN End-to-End Application ContainmentUS-Ignite
This demonstration shows how the SeaCat Application Containment Architecture secures a medical record system applications (OPENMRS) in an end-to-end manner. Using this framework, medical personal can securely access patient medial records from mobile devices without fear that patients/ medical records will accidentally be exposed/compromised by malware. Junguk Cho, David Johnson, Makito Kano and Kobus Van der Merwe, University of Utah
learn how to protect the data center from dangerous attacks including advanced malware, APTs, insider threats and DDoS. Leverage your existing network resources to:
• Obtain in-depth visibility into the data center, including virtual systems
• Quickly detect and address anomalies that could signify risks
• Prevent devastating data loss
• Improve incident response, forensics and compliance
For more information visit www.lancope.com
Network Connected Medical Devices - A Case StudySophiaPalmira
In this session, we welcome Shankar Somasundaram, CEO of Asimily, Priyanka Upendra, Quality Compliance Director at Banner Health, and Carrie Whysall. Director of Managed Security Services at CynergisTek.
Together, they will discuss medical device security, covering all you need to know from medical device assessments to remediation efforts. Attendees will leave this session knowing how to apply what they have learned about medical device security in real life.
Due to diversity, heterogeneity and complexity of the existing healthcare structure, providing suitable
healthcare services is a complicated process. This work describes the conceptual design of an e-healthcare
system, which implements integration strategies and suitable technologies that will handle the
interoperability problem among its essential components. The proposed solution combines intelligent agent
technology and case based reasoning for highly distributed applications in healthcare environment.
Intelligent agents play a critical role in providing correct information for diagnostic, treatment, etc. They
work on behalf of human agents taking care of routine tasks, thus increasing speed and reliability of the
information exchanges. CBR is used to generate advices to a certain e-healthcare problems by analyzing
solutions given to previously solved problems and to build intelligent systems for disease diagnostics and
prognosis. Preliminary experimental simulation based on Agent Development Framework (JADE)
demonstrated the feasibility of this model.
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Leonardo ENERGY
This Cybersecurity webinar addresses issues of importance to executive, technical, and academic professionals involved with managing and protecting Electric Utilities and Smart Grids. Cyber threats and vulnerabilities, including cyber attacks, will be addressed; as well as Smart Grid trends, and privacy and data integrity issues. United States, European, and International organizations and initiatives to address cybersecurity for utilities will be discussed. The webinar will conclude with strategies to improve cybersecurity. A second cybersecurity webinar (programmed in September 2017) will address best practices, case studies, and legal and regulatory constraints for architecting smart grids in a secure way.
The Internet of Things (IoT) integrates various sensors, objects and smart nodes that are capable of communicating with each other without human intervention.
The IoT Forensics could be perceived as a subdivision of the Digital Forensics. IoT Forensics is a relatively new and unexplored area. The purpose of the IoT Forensics is similar to the one of the Digital Forensics, which is to identify and extract digital information in a legal and forensically sound manner.
Medical Device Security: State of the Art -- NoConName, Barcelona, 2011 shawn_merdinger
High level overview of current security issues in medical device security, what is being hacked by security researchers, who are the major security players, hacking predictions, FUD vs. Reality.
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityLeonardo ENERGY
This Cybersecurity webinar, the second in a series, addresses issues of importance to executive, technical, and academic professionals involved with managing and protecting Electric Utilities and Smart Grids worldwide. Technology and market challenges will be addressed, followed by cybersecurity approaches (including those used in Europe and US) and best practices. Three case studies, and legal and regulatory constraints, for architecting smart grids in a secure way also will be presented.
The Next Generation Internet (NGI) is a European Commission initiative that aims to shape the development and evolution of the Internet into an Internet of Humans.
Due to diversity, heterogeneity and complexity of the existing healthcare structure, providing suitable
healthcare services is a complicated process. This work describes the conceptual design of an e-healthcare
system, which implements integration strategies and suitable technologies that will handle the
interoperability problem among its essential components. The proposed solution combines intelligent agent
technology and case based reasoning for highly distributed applications in healthcare environment.
Intelligent agents play a critical role in providing correct information for diagnostic, treatment, etc. They
work on behalf of human agents taking care of routine tasks, thus increasing speed and reliability of the
information exchanges. CBR is used to generate advices to a certain e-healthcare problems by analyzing
solutions given to previously solved problems and to build intelligent systems for disease diagnostics and
prognosis. Preliminary experimental simulation based on Agent Development Framework (JADE)
demonstrated the feasibility of this model.
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Leonardo ENERGY
This Cybersecurity webinar addresses issues of importance to executive, technical, and academic professionals involved with managing and protecting Electric Utilities and Smart Grids. Cyber threats and vulnerabilities, including cyber attacks, will be addressed; as well as Smart Grid trends, and privacy and data integrity issues. United States, European, and International organizations and initiatives to address cybersecurity for utilities will be discussed. The webinar will conclude with strategies to improve cybersecurity. A second cybersecurity webinar (programmed in September 2017) will address best practices, case studies, and legal and regulatory constraints for architecting smart grids in a secure way.
The Internet of Things (IoT) integrates various sensors, objects and smart nodes that are capable of communicating with each other without human intervention.
The IoT Forensics could be perceived as a subdivision of the Digital Forensics. IoT Forensics is a relatively new and unexplored area. The purpose of the IoT Forensics is similar to the one of the Digital Forensics, which is to identify and extract digital information in a legal and forensically sound manner.
Medical Device Security: State of the Art -- NoConName, Barcelona, 2011 shawn_merdinger
High level overview of current security issues in medical device security, what is being hacked by security researchers, who are the major security players, hacking predictions, FUD vs. Reality.
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityLeonardo ENERGY
This Cybersecurity webinar, the second in a series, addresses issues of importance to executive, technical, and academic professionals involved with managing and protecting Electric Utilities and Smart Grids worldwide. Technology and market challenges will be addressed, followed by cybersecurity approaches (including those used in Europe and US) and best practices. Three case studies, and legal and regulatory constraints, for architecting smart grids in a secure way also will be presented.
The Next Generation Internet (NGI) is a European Commission initiative that aims to shape the development and evolution of the Internet into an Internet of Humans.
Keynote address at the Sixth Annual Virginia IRB Consortium Conference: "Research Review Challenges:
From the Small IRB to the Age of Technology" October 12, 2012
http://www.virginia.edu/vpr/irb/sbs/events_conference.html
Many technical communities are vigorously pursuing
research topics that contribute to the Internet of Things (IoT).
Nowadays, as sensing, actuation, communication, and control become
even more sophisticated and ubiquitous, there is a significant
overlap in these communities, sometimes from slightly different
perspectives. More cooperation between communities is encouraged.
To provide a basis for discussing open research problems in
IoT, a vision for how IoT could change the world in the
distant future is first presented. Then, eight key research topics
are enumerated and research problems within these topics are
discussed.
Data Mesh is the decentralized architecture where your units of architecture is a domain driven data set that is treated as a product owned by domains or teams that most intimately know that data either creating it or they are consuming it and re-sharing it and allocated specific roles that have the accountability and the responsibility to provide that data as a product abstracting away complexity into infrastructure layer a self-serve infrastructure layer so that create these products more much more easily.
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
The introduction of Internet of Things (IoT) applications into daily life has raised serious privacy concerns
among consumers, network service providers, device manufacturers, and other parties involved. This paper
gives a high-level overview of the three phases of data collecting, transmission, and storage in IoT systems
as well as current privacy-preserving technologies. The following elements were investigated during these
three phases:(1) Physical and data connection layer security mechanisms(2) Network remedies(3)
Techniques for distributing and storing data. Real-world systems frequently have multiple phases and
incorporate a variety of methods to guarantee privacy. Therefore, for IoT research, design, development,
and operation, having a thorough understanding of all phases and their technologies can be beneficial. In
this Study introduced two independent methodologies namely generic differential privacy (GenDP) and
Cluster-Based Differential privacy ( Cluster-based DP) algorithms for handling metadata as intents and
intent scope to maintain privacy and security of IoT data in cloud environments. With its help, we can
virtual and connect enormous numbers of devices, get a clearer understanding of the IoT architecture, and
store data eternally. However, due of the dynamic nature of the environment, the diversity of devices, the
ad hoc requirements of multiple stakeholders, and hardware or network failures, it is a very challenging
task to create security-, privacy-, safety-, and quality-aware Internet of Things apps. It is becoming more
and more important to improve data privacy and security through appropriate data acquisition. The
proposed approach resulted in reduced loss performance as compared to Support Vector Machine (SVM) ,
Random Forest (RF) .
Multi-Agent systems (Autonomous agents or agents) and knowledge discovery (or data mining) are two active
areas in information technology. A profound insight of bringing these two communities together has unveiled a tremendous
potential for new opportunities and wider applications through the synergy of agents and data mining. Multi-agent systems
(MAS) often deal with complex applications that require distributed problem solving. In many applications the individual and
collective behavior of the agents depends on the observed data from distributed data sources. Data mining technology has
emerged, for identifying patterns and trends from large quantities of data. The increasing demand to scale up to massive data sets
inherently distributed over a network with limited band width and computational resources available motivated the development of
distributed data mining (DDM).Distributed data mining is originated from the need of mining over decentralized data
sources. DDM is expected to perform partial analysis of data at individual sites and then to send the outcome as partial result
to other sites where it sometimes required to be aggregated to the global result
In this Chapter, we focus on dealing with data originating from sensor data streams, in order to materialize an intelligent, semantically-enabled data layer. First, we introduce the concepts that are covered in this Section: real-time, context-awareness, windowing, information fusion. Next, we mention the difficulties associated with the attempt of creating a semantic sensor network, we note our architectural concerns by presenting a number of issues that have to be dealt with when designing a system for the real-time information integration from distributed data sources and sensors. Finally, the anatomy of a system for the end-to-end data multi-sensor data fusion and semantic enrichment is illustrated, while the end-to-end information flow and respective steps are analyzed.
Adopting a Logical Data Architecture for Today's Data and Analytics RequirementsDenodo
Watch full webinar here: https://bit.ly/3y4yMPU
It’s almost impossible to find any organization that does not have data and analytics as one of their top priorities to further their business objectives. At the same time the data and analytics landscape is evolving faster than ever, making the data management ecosystem more complex than ever before. As data gets increasingly distributed across systems and locations, every forward looking organization should adopt a logical architecture to be future ready.
Watch On-Demand and Learn:
- Key priorities of data and analytics leaders for business transformation
- Why a monolithic and physical data architecture is not suitable for such transformation
- How a logical data architecture can help organizations in their business transformation
2. UMBC Spring 2012
05/05/2012 Mobile Computing: Research Survey 2
Agenda
• Introduction
• Mobile Computing Fields of Challenge
• Data Management
• Security
• Data Mining
• Distributed Databases
• Conclusion & Potential Future Research
3. UMBC Spring 2012
05/05/2012 Mobile Computing: Research Survey 3
Introduction
The Uniqueness of the mobile environment
• Constrained Communications Capability
• Limited Power Resources
• Frequent Disconnects
• Asymmetric Communications
• Dynamic System Topology
• Limited Node Capabilities
4. 05/05/2012
UMBC Spring 2012
4Mobile Computing: Research Survey
Knowledge Discovery in ubiquitous
environments
• Ubiquitous Technologies used
• Resource Awareness
• Ubiquities data collection
• Ubiquities data computing
5. 05/05/2012
UMBC Spring 2012
5Mobile Computing: Research Survey
Knowledge Discovery in ubiquitous
environments
• Security and Privacy
• Human Computer Interface (HCI)
• Application Area
6. 05/05/2012
UMBC Spring 2012
6Mobile Computing: Research Survey
Data Management challenges
In distributed computing three main
architectures are defined for exchanging data
between system elements:
• Client-server interaction model
• Client-proxy-server interaction model
• Peer-to-peer interaction model
7. 05/05/2012
UMBC Spring 2012
7Mobile Computing: Research Survey
Data Management challenges
• Networking Challenges
• Device discovery
• Routing
• RF and wireless links
8. 05/05/2012
UMBC Spring 2012
8Mobile Computing: Research Survey
Data Management challenges
• Context Awareness Challenges
• Service and Data Discovery
• Mobile location maintenance of network nodes.
• User context and profiling
9. 05/05/2012
UMBC Spring 2012
9Mobile Computing: Research Survey
Data Management challenges
• Distributed Systems Data Management
Challenges
• Distributed Processing and threading
• Distributed systems messaging and communication
• Naming name spaces, and name resolution
• Synchronization
• Consistency and Replication
• Fault tolerance
10. 05/05/2012
UMBC Spring 2012
10Mobile Computing: Research Survey
Developing intelligent Mobile Data
Management systems
• Cross layer intelligent collaboration
• Collaborative intelligence
• Context aware intelligence
11. 05/05/2012
UMBC Spring 2012
11Mobile Computing: Research Survey
Security challenges
• No prior knowledge of participating nodes due to the dynamic
mature of the system.
• At any given point, the composition of the system can be
diverse enough that a centralized node identification, and
authentication is not feasible.
• The possibly fragmentary nature of the system also makes it
harder to perform security tasks as monitoring, intrusion
detection, etc.
• Mobile Systems wireless communications technologies are
broadcast in nature.
12. 05/05/2012
UMBC Spring 2012
12Mobile Computing: Research Survey
Security challenges
• Wireless communications physical characteristics of such
networks make them vulnerable to security threats such as
intrusion, denial of service, masquerading, and tampering.
• Limited processing, memory, storage and power resources
make it harder to implement resource intensive security
processes and functions.
• The collaborative nature of these systems forces them to
disseminate valuable information about system components
and data, without central routing control, or monitoring.
13. 05/05/2012
UMBC Spring 2012
13Mobile Computing: Research Survey
Intrusion Detection in Mobile Systems
• Traditionally intrusion detection techniques fall short in such
environment due to:
• Higher rates of false positives or vice versa due to the unreliable RF
communications environment
• Lack of consistent tracking mechanisms due to the dynamic nature of
the system.
• Lack of a solid definition of a misbehaving node, or fixing a reputation
associated with a given node, due to the heterogeneous nature of the
system, its communications mechanisms and protocols.
• Lake of definition or the existence of a single administrative domain.
• No global view of the networked system, and the reliance on
approximate and localized observations on making intrusion detection
mechanisms.
14. 05/05/2012
UMBC Spring 2012
14Mobile Computing: Research Survey
Intrusion Detection in Mobile Systems
• There is a need for a Distributed Intrusion Detection Systems
(DIDS) that fits the mobile environment.
• Security system is envisioned to use light weight collaborative
data mining of various network and distributed system
communications stack.
• Mining activities will produce, enhance, and match patterns of
attacks, intrusions, misbehavior of particulate nodes.
• These patterns will be fed into machine learning intelligent
agents that will reason, adapt, and enhance, and ask for more
mining activities for a system, or a system segment security.
15. 05/05/2012
UMBC Spring 2012
15Mobile Computing: Research Survey
Node identification, authentication &
privileges
• The assumption of an existing central authentication, and
resource privilege granting entity that does not suffer from
communication reachability issues is not valid.
• Research performed for devices to compute trust and beliefs
about neighboring peers and share them to produce a global
trust and belief picture.
• Research performed in implementing an authentication
framework of where a delegation scheme of authentications,
privileges and roles can be done in a mobile environment to
accommodate nodes joining a system, or a system segment.
16. 05/05/2012
UMBC Spring 2012
16Mobile Computing: Research Survey
Node identification, authentication &
privileges
“ We believe that both trust modeling and authentication
distribution activities can be rolled up in a coherent framework
where both segments can interact to provide a back and forth
credentials, and trust metrics feedback based on the ongoing
member nodes dynamics.
The intrusion detection activities described above can enhance
the proposed framework to offer and intelligent and adaptable
security solution based on mobile data mining, autonomous
machine learning, and a distributed credentials and
authentication engines.”
17. 05/05/2012
UMBC Spring 2012
17Mobile Computing: Research Survey
Data Mining Challenges
• Data mining combines techniques from a variety of field that
includes:
• Statistics
• Machine Learning
• Pattern Recognition
• Database Systems
• Information Retrieval
• World-Wide Web
• Visualization
• Application Specific Domains related to the data being mined
18. 05/05/2012
UMBC Spring 2012
18Mobile Computing: Research Survey
Data Mining Challenges
• Data mining techniques includes:
• Summarization
• Sampling
• Approximation
• Clustering
• Pattern Recognition
• Classification
• Outlier Detection
19. 05/05/2012
UMBC Spring 2012
19Mobile Computing: Research Survey
Data Mining Challenges
• Data Mining Fields related to distributed
systems:
• Stream Data Mining
• Moving Objects Mining
• Web and Text Data Mining
20. 05/05/2012
UMBC Spring 2012
20Mobile Computing: Research Survey
Web and Text Data Mining
• Web mining can be decomposed into three
main styles of mining:
• Web Content Mining
• Web Structure Mining
• Web Usage Mining
21. 05/05/2012
UMBC Spring 2012
21Mobile Computing: Research Survey
Web and Text Data Mining
• For its textual contents, web mining algorithms uses the
common textual data mining techniques such as :
• Information extraction
• Topic tracking
• Summarization
• Categorization
• Clustering
• Concept linkage
• Multimedia web contents and its integration with web textual
contents is still an open field for web mining research activities
with lots of potential promises.
23. 05/05/2012
UMBC Spring 2012
23Mobile Computing: Research Survey
Distributed Databases Challenge
• Mobile databases performance measures in term of reliability,
availability, correctness, and timeliness.
• The usage of heterogynous mobile communication
infrastructures and combining it with using different query
strategies. A layer of intelligence that detects available and
changing infrastructure characteristics and adapt query
strategies.
• Smart resource and data discovery, and fuses that with user
profiles and policies to produced smart automated or semi-
automated queries.
24. 05/05/2012
UMBC Spring 2012
24Mobile Computing: Research Survey
Distributed Databases Challenge
• Sensor network and Mobile databases integration. Such an
integrate can offer a local, or global sensor view based on
database queries or processes or semi-processed sensor data.
• The definition of meta-data needed for multimedia database.
Researching the way the methods of meta-data are being
produced, the ways that meta-data can model multimedia
databases, and expanding the usage of meta-data to be a source
for upper level intelligence functions that builds semantics
based on them is needed.
25. 05/05/2012
UMBC Spring 2012
25Mobile Computing: Research Survey
Distributed Databases Challenge
• Sensor network and Mobile databases integration. Such an
integrate can offer a local, or global sensor view based on
database queries or processes or semi-processed sensor data.
• The definition of meta-data needed for multimedia database.
Researching the way the methods of meta-data are being
produced, the ways that meta-data can model multimedia
databases, and expanding the usage of meta-data to be a source
for upper level intelligence functions that builds semantics
based on them is needed.