SlideShare a Scribd company logo
SOK Phearin
Department of Computer Science
   MBC Lab., Konkuk University



                                 1
Outline
I.   Overview of Pervasive Computing

II. Architecture

III. Wireless Communication Technologies in Pervasive
     Computing and Security Issues

IV. Wireless Vulnerabilities

V. Conclusion


                                                        2
Pervasive Computing Overview
“Ubiquitous computing names the third wave in computing, just
now beginning. First were mainframes, each shared by lots of
people. Now we are in the personal computing era, person and
machine staring uneasily at each other across the desktop. Next
comes ubiquitous computing, or the age of calm
technology, when technology recedes into the background of our
lives.”

“The Computer for the 21st Century”
        - September, 1991




                                 Mark D. Weiser (July 23, 1952 – April 27, 1999)3
Pervasive Computing Overview
Development of computing technologies:

   1st wave : Mainframe computing era


   2nd wave : Personal computing era


   3rd wave : Pervasive computing era
            (initially called ubiquitous computing)




                                                      4
What is Pervasive Computing
 Integration of Information and Communications
 Technology (ICT) into people’s lives and
 environments, made possible by the growing availability
 of microprocessors with inbuilt communication
 facilities.


 Goals:
   People Oriented
   Implicitly use of computers
   People will focus on task, not tool
                                                      5
Pervasive Computing Components
Three converging areas of ICT components:
   Computing devices: communicate with each other and
                act intelligently
       Sensors: input devices
       Processors: interpret and analyze data
       Actuators: output devices


   Communications: serve pervasive computing applications
     Ex. Zigbee, Bluetooth, WiFi, Wimax /LTE /3G /4G …


   User Interfaces: point of contact between ICT and human
     Active: Users overtly control PC technologies and devices
     Passive: PC covertly control in the background
     Coercive: both Active and Passive

                                                              6
Architecture
                               Application

         Middleware and Security Interface
                                                     Various applications such as
                                                      Smart Room, Intelligent
Intelligent Computing




                              Mobile Computing
                                                      Navigation… can be built and
                                Context-Aware         used

                             Affective Computing



                        Embedded Operating System

                                Hardware




                                                                                 7
Architecture
                               Application            Not only:
         Middleware and Security Interface              Heterogeneity
                                                        Scalability
Intelligent Computing




                              Mobile Computing          Programming interface

                                Context-Aware
                                                      But also:
                             Affective Computing         Service Discovery
                                                         Context-aware

                        Embedded Operating System

                                Hardware




                                                                                 8
Architecture
Structure of Middleware and Security Interface


                               API

                                        Context-aware
                                           service

                               Service Description

                         Extend Module


                                   ……

              Security Mechanism




                                                        9
Architecture
                               Application

         Middleware and Security Interface

                                                     An important aspect of the
Intelligent Computing




                              Mobile Computing        difference between pervasive
                                                      computing and desktop
                                Context-Aware         computing

                             Affective Computing



                        Embedded Operating System

                                Hardware




                                                                                   10
Architecture
Mobile Computing:
   •Automatic configuration, dynamic addressing and tracking system
   •Free switch between heterogeneous networks
Affective Computing is the computing that relates to, arises
      from, or deliberately influences emotions.
             – Rosalind W. Picard
   •computer science, sensor technology, psychology, physiology
   •Key technologies: face recognitions, emotional signal
      measurements and analysis

Context-aware Computing: senses environment context and
     human context changes.
   Key technologies: Location awareness, activities recognition
                                                                   11
Architecture
                               Application           Hardware:
         Middleware and Security Interface             Fast processing speed
                                                       Small size
Intelligent Computing




                              Mobile Computing


                                Context-Aware        Embedded Operating
                                                      System:
                             Affective Computing
                                                        Real-time services
                                                        Rational allocation
                        Embedded Operating System        memories
                                Hardware




                                                                                12
Architecture
Structure of Embedded Operating System and Hardware



                                   Network
          Sensors    I/O Device
                                   Interface

         Real-time Embedded Operating System

             Pervasive Computing Hardware




                                                       13
Wireless Communication
       Many existing and emerging wireless technologies
serve in Pervasive Computing:

•Zigbee and Bluetooth - sensors and actuators - low
       energy consumption, short distances (up to 10 meters)


•Wi-Fi - devices - middle ranges (several hundreds of meters)


•Wimax /LTE /3G /4G - a home gateway to Internet - long
     ranges (several to tens of kilometres)


                                                                14
Security Issues
Common vulnerabilities existing in wireless technologies:

   Physical jamming

   Passive eavesdropping and traffic analysis

   Message injection and active eavesdropping

   Message deletion and interception

   Insider attacks to breach data confidentiality

   Denial of service (DoS) attacks



                                                         15
Security Issues
Various types of Attack to a Pervasive Computing can:


   Compromise users’ data,

   Crash an entire system

   Render services unavailable

   Potentially lead to the loss of property

   Harm users and even lives




                                                         16
Wireless Vulnerabilities
Wi-Fi MAC Protocol Attacks

     Carrier Sense Multiple Access with Collision Avoidance

      (CSMA/CA)
         DoS attack: Clear Channel Assessment-Jamming



     Virtual carrier sense

         DoS attack: Repeat forged RTS/CTS messages with large
                 NAV leading network slowdown


                                                                  17
Wireless Vulnerabilities
 802.11 state machine

     DoS attack: forge deauthentication or disassociation frames




                                                                18
Wireless Vulnerabilities
Wi-Fi Security Protocol Attacks




                                   19
Wireless Vulnerabilities
Wi-Fi Security Protocol Attacks


Pre-Robust Security Network Association (Pre-RSNA):
      security mechanisms in the IEEE 802.11-1997

  Attacks on Wired Equivalent Privacy(WEP):
     Shared Key management – key can be easily obtained from the
              attackers
     Weak RC4 encryption implementation – key can be easily broken
              by the brute force attack




                                                                      20
Wireless Vulnerabilities

Robust Security Network Association (RSNA): security
      mechanisms in the IEEE 802.11-2007,
      consisting of 3 security algorithms:
   Data confidentiality and integrity protocols
   RSNA security association management
   key management procedures




                                                        21
Wireless Vulnerabilities
Attacks on RSNA
  •Security level rollback attack: “Pre-RSNA only” beacons to force
     the network to use WEP


  •EAP attack: forged association requests - disconnect legitimate
     users.


  •Four-way handshake DoS attack: forged first unauthenticated
     message - parallel incomplete Handshakes - exhaust queue
     space

                                                                     22
Wireless Vulnerabilities
Attacks on RSNA (Cont.)
   •RSN IE poisoning: fake beacons - fail at stage 3


   •Reflection attack against four-way handshake: transmitted
      data sent back to originator .


   •Dos attack against TKIP: intercepted and modified packet - AP
      and the client suspend their communication




                                                                    23
Conclusion
 Confidentiality, Integrity, and Availability (CIA) are
  essential to pervasive computing applications since
  sensitive and real-time information may flow over any type
  of wireless links


 Many challenges and attacks have been proved. Each
  operation and policy should be carefully examined against
  any possible attacks.



                                                               24
Reference
 Liu, Y. & Li, F., PCA: A Reference Architecture for Pervasive Computing, 2006 1 st
  International Symposium on Pervasive Computing and Applications, IEEE
  04079121



 Zhou, B, Marshall, A. & Lee, T. H., Wireless Security Issues in pervasive
  computing, 2010 Fourth International Conference on Genetic and Evolutionary
  Computing, IEEE 05715481



 2006, Pervasive Computing, Parliamentary Office of Science and Technology




                                                                                   25
26

More Related Content

What's hot

IoT and m2m
IoT and m2mIoT and m2m
IoT and m2m
pavan penugonda
 
Properties of ubiquitous computing
Properties of ubiquitous computingProperties of ubiquitous computing
Properties of ubiquitous computing
Purvi Sankhe
 
IOT Platform Design Methodology
IOT Platform Design Methodology IOT Platform Design Methodology
IOT Platform Design Methodology
poonam kumawat
 
Pervasive Computing: Vision and Challenges
Pervasive Computing: Vision and ChallengesPervasive Computing: Vision and Challenges
Pervasive Computing: Vision and Challenges
Raquel Salcedo Gomes
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
Devdutta Chakrabarti
 
Mobile computing
Mobile computingMobile computing
Mobile computing
Jennifer Christy
 
The evolution of pervasive computing towards a Web of Things
The evolution of pervasive computing towards a Web of ThingsThe evolution of pervasive computing towards a Web of Things
The evolution of pervasive computing towards a Web of Things
Andreas Kamilaris
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
123seminarsonly
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
Pragya Srivastava
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing
Govind Raj
 
Mobile Computing
Mobile ComputingMobile Computing
Internet of things
Internet of thingsInternet of things
Internet of things
Vikrant Negi
 
Mobile computing
Mobile computingMobile computing
Mobile computing
Mayuresh Tiwari
 
Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)
Zakaria Hossain
 
Ambient Intelligence
Ambient IntelligenceAmbient Intelligence
Ambient Intelligence
Dr. Mazlan Abbas
 
pervasive computing
pervasive computingpervasive computing
pervasive computing
Sweety Singh
 
Mobile computing
Mobile computingMobile computing
Mobile computing
pooja s p
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
Anastasios Economides
 
Manet
ManetManet
Internet of things ppt
Internet of things pptInternet of things ppt
Internet of things ppt
Dania Purnama Sari
 

What's hot (20)

IoT and m2m
IoT and m2mIoT and m2m
IoT and m2m
 
Properties of ubiquitous computing
Properties of ubiquitous computingProperties of ubiquitous computing
Properties of ubiquitous computing
 
IOT Platform Design Methodology
IOT Platform Design Methodology IOT Platform Design Methodology
IOT Platform Design Methodology
 
Pervasive Computing: Vision and Challenges
Pervasive Computing: Vision and ChallengesPervasive Computing: Vision and Challenges
Pervasive Computing: Vision and Challenges
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
The evolution of pervasive computing towards a Web of Things
The evolution of pervasive computing towards a Web of ThingsThe evolution of pervasive computing towards a Web of Things
The evolution of pervasive computing towards a Web of Things
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)
 
Ambient Intelligence
Ambient IntelligenceAmbient Intelligence
Ambient Intelligence
 
pervasive computing
pervasive computingpervasive computing
pervasive computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
Manet
ManetManet
Manet
 
Internet of things ppt
Internet of things pptInternet of things ppt
Internet of things ppt
 

Viewers also liked

Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computing
Ram kumar
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
u065932
 
Pervasive Web Application Architecture
Pervasive Web Application ArchitecturePervasive Web Application Architecture
Pervasive Web Application Architecture
UC San Diego
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous Computing
Honeyson Joseph
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
Vashira Ravipanich
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In It
Rob Manson
 
Ec2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computingEc2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computing
Nuth Otanasap
 
Conversational Architecture, CAVE Language, Data Stewardship
Conversational Architecture, CAVE Language, Data StewardshipConversational Architecture, CAVE Language, Data Stewardship
Conversational Architecture, CAVE Language, Data Stewardship
Loren Davie
 
Ambient intelligence & Ubiquitous Computing
Ambient intelligence & Ubiquitous ComputingAmbient intelligence & Ubiquitous Computing
Ambient intelligence & Ubiquitous Computing
Rohit Arora
 
I hear voices: Explorations of multidevice experiences with conversational as...
I hear voices: Explorations of multidevice experiences with conversational as...I hear voices: Explorations of multidevice experiences with conversational as...
I hear voices: Explorations of multidevice experiences with conversational as...
Karen Kaushansky
 
Products are Services, how ubiquitous computing changes design
Products are Services, how ubiquitous computing changes designProducts are Services, how ubiquitous computing changes design
Products are Services, how ubiquitous computing changes design
Mike Kuniavsky
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile Computing
JAINIK PATEL
 
Unit 1 - mobile computing introduction
Unit 1 - mobile computing introductionUnit 1 - mobile computing introduction
Unit 1 - mobile computing introduction
Vintesh Patel
 
Understanding the New World of Cognitive Computing
Understanding the New World of Cognitive ComputingUnderstanding the New World of Cognitive Computing
Understanding the New World of Cognitive Computing
DATAVERSITY
 
Docker on IoT Devices
Docker on IoT DevicesDocker on IoT Devices
Docker on IoT Devices
Docker, Inc.
 
Cognitive Computing : Trends to Watch in 2016
Cognitive Computing:  Trends to Watch in 2016Cognitive Computing:  Trends to Watch in 2016
Cognitive Computing : Trends to Watch in 2016
Bill Chamberlin
 
Fog computing
Fog computingFog computing
Fog computing
Hari Priyanka
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant Gupta
Prashant Gupta
 

Viewers also liked (18)

Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computing
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Pervasive Web Application Architecture
Pervasive Web Application ArchitecturePervasive Web Application Architecture
Pervasive Web Application Architecture
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous Computing
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In It
 
Ec2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computingEc2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computing
 
Conversational Architecture, CAVE Language, Data Stewardship
Conversational Architecture, CAVE Language, Data StewardshipConversational Architecture, CAVE Language, Data Stewardship
Conversational Architecture, CAVE Language, Data Stewardship
 
Ambient intelligence & Ubiquitous Computing
Ambient intelligence & Ubiquitous ComputingAmbient intelligence & Ubiquitous Computing
Ambient intelligence & Ubiquitous Computing
 
I hear voices: Explorations of multidevice experiences with conversational as...
I hear voices: Explorations of multidevice experiences with conversational as...I hear voices: Explorations of multidevice experiences with conversational as...
I hear voices: Explorations of multidevice experiences with conversational as...
 
Products are Services, how ubiquitous computing changes design
Products are Services, how ubiquitous computing changes designProducts are Services, how ubiquitous computing changes design
Products are Services, how ubiquitous computing changes design
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile Computing
 
Unit 1 - mobile computing introduction
Unit 1 - mobile computing introductionUnit 1 - mobile computing introduction
Unit 1 - mobile computing introduction
 
Understanding the New World of Cognitive Computing
Understanding the New World of Cognitive ComputingUnderstanding the New World of Cognitive Computing
Understanding the New World of Cognitive Computing
 
Docker on IoT Devices
Docker on IoT DevicesDocker on IoT Devices
Docker on IoT Devices
 
Cognitive Computing : Trends to Watch in 2016
Cognitive Computing:  Trends to Watch in 2016Cognitive Computing:  Trends to Watch in 2016
Cognitive Computing : Trends to Watch in 2016
 
Fog computing
Fog computingFog computing
Fog computing
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant Gupta
 

Similar to Pervasive computing and its Security Issues

Sensor Network
Sensor NetworkSensor Network
Sensor Network
Phearin Sok
 
Chapter_1.pptx
Chapter_1.pptxChapter_1.pptx
Chapter_1.pptx
AadiSoni3
 
Day 3 p2 - security
Day 3   p2 - securityDay 3   p2 - security
Day 3 p2 - security
Lilian Schaffer
 
Day 3 p2 - security
Day 3   p2 - securityDay 3   p2 - security
Day 3 p2 - security
Lilian Schaffer
 
Piet Demeester - Future Internet
Piet Demeester - Future InternetPiet Demeester - Future Internet
Piet Demeester - Future Internet
imec.archive
 
Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementMicrosoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT Management
Intergen
 
Cloud Computing: da curiosidade para casos reais
Cloud Computing: da curiosidade para casos reaisCloud Computing: da curiosidade para casos reais
Cloud Computing: da curiosidade para casos reais
soudW
 
The Stuxnet Worm creation process
The Stuxnet Worm creation processThe Stuxnet Worm creation process
The Stuxnet Worm creation process
Ajay Ohri
 
Enabling High Level Application Development In The Internet Of Things
Enabling High Level Application Development In The Internet Of ThingsEnabling High Level Application Development In The Internet Of Things
Enabling High Level Application Development In The Internet Of Things
Pankesh Patel
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
IJRTEMJOURNAL
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
journal ijrtem
 
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
Rio Info
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
MuhammadTalha563553
 
Telecom trends 261112
Telecom trends 261112Telecom trends 261112
Telecom trends 261112
Sharon Rozov
 
Grid computing [2005]
Grid computing [2005]Grid computing [2005]
Grid computing [2005]
Raul Soto
 
Ubiquitous Computing and Context-Aware Services
Ubiquitous Computing and Context-Aware ServicesUbiquitous Computing and Context-Aware Services
Ubiquitous Computing and Context-Aware Services
Kuncoro Wastuwibowo
 
Autonomic computer
Autonomic computerAutonomic computer
Autonomic computer
Elanthendral Mariappan
 
Autonomic computer
Autonomic computerAutonomic computer
Autonomic computer
Elanthendral Mariappan
 
Digital Pen En 2008
Digital Pen En 2008Digital Pen En 2008
Digital Pen En 2008
massimilianobrambilla
 
Cloud Computing: da curiosidade para casos reais
Cloud Computing: da curiosidade para casos reaisCloud Computing: da curiosidade para casos reais
Cloud Computing: da curiosidade para casos reais
soudW
 

Similar to Pervasive computing and its Security Issues (20)

Sensor Network
Sensor NetworkSensor Network
Sensor Network
 
Chapter_1.pptx
Chapter_1.pptxChapter_1.pptx
Chapter_1.pptx
 
Day 3 p2 - security
Day 3   p2 - securityDay 3   p2 - security
Day 3 p2 - security
 
Day 3 p2 - security
Day 3   p2 - securityDay 3   p2 - security
Day 3 p2 - security
 
Piet Demeester - Future Internet
Piet Demeester - Future InternetPiet Demeester - Future Internet
Piet Demeester - Future Internet
 
Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementMicrosoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT Management
 
Cloud Computing: da curiosidade para casos reais
Cloud Computing: da curiosidade para casos reaisCloud Computing: da curiosidade para casos reais
Cloud Computing: da curiosidade para casos reais
 
The Stuxnet Worm creation process
The Stuxnet Worm creation processThe Stuxnet Worm creation process
The Stuxnet Worm creation process
 
Enabling High Level Application Development In The Internet Of Things
Enabling High Level Application Development In The Internet Of ThingsEnabling High Level Application Development In The Internet Of Things
Enabling High Level Application Development In The Internet Of Things
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Telecom trends 261112
Telecom trends 261112Telecom trends 261112
Telecom trends 261112
 
Grid computing [2005]
Grid computing [2005]Grid computing [2005]
Grid computing [2005]
 
Ubiquitous Computing and Context-Aware Services
Ubiquitous Computing and Context-Aware ServicesUbiquitous Computing and Context-Aware Services
Ubiquitous Computing and Context-Aware Services
 
Autonomic computer
Autonomic computerAutonomic computer
Autonomic computer
 
Autonomic computer
Autonomic computerAutonomic computer
Autonomic computer
 
Digital Pen En 2008
Digital Pen En 2008Digital Pen En 2008
Digital Pen En 2008
 
Cloud Computing: da curiosidade para casos reais
Cloud Computing: da curiosidade para casos reaisCloud Computing: da curiosidade para casos reais
Cloud Computing: da curiosidade para casos reais
 

More from Phearin Sok

A Mobile Service Architecture for Improving Availability and Continuity
A Mobile Service Architecture for Improving Availability and ContinuityA Mobile Service Architecture for Improving Availability and Continuity
A Mobile Service Architecture for Improving Availability and Continuity
Phearin Sok
 
N Screen
N ScreenN Screen
N Screen
Phearin Sok
 
Locator ID Separation Using Device Unique ID
Locator ID Separation Using Device Unique IDLocator ID Separation Using Device Unique ID
Locator ID Separation Using Device Unique ID
Phearin Sok
 
Mobility Management in HIMALIS Architecture
Mobility Management in HIMALIS ArchitectureMobility Management in HIMALIS Architecture
Mobility Management in HIMALIS Architecture
Phearin Sok
 
DPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant NetworkDPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant Network
Phearin Sok
 
Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparison
Phearin Sok
 
UNICEF
UNICEFUNICEF
UNICEF
Phearin Sok
 
Desktop to Cloud Transformation Planning
Desktop to Cloud Transformation PlanningDesktop to Cloud Transformation Planning
Desktop to Cloud Transformation Planning
Phearin Sok
 
Content centric networking
Content centric networkingContent centric networking
Content centric networking
Phearin Sok
 

More from Phearin Sok (9)

A Mobile Service Architecture for Improving Availability and Continuity
A Mobile Service Architecture for Improving Availability and ContinuityA Mobile Service Architecture for Improving Availability and Continuity
A Mobile Service Architecture for Improving Availability and Continuity
 
N Screen
N ScreenN Screen
N Screen
 
Locator ID Separation Using Device Unique ID
Locator ID Separation Using Device Unique IDLocator ID Separation Using Device Unique ID
Locator ID Separation Using Device Unique ID
 
Mobility Management in HIMALIS Architecture
Mobility Management in HIMALIS ArchitectureMobility Management in HIMALIS Architecture
Mobility Management in HIMALIS Architecture
 
DPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant NetworkDPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant Network
 
Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparison
 
UNICEF
UNICEFUNICEF
UNICEF
 
Desktop to Cloud Transformation Planning
Desktop to Cloud Transformation PlanningDesktop to Cloud Transformation Planning
Desktop to Cloud Transformation Planning
 
Content centric networking
Content centric networkingContent centric networking
Content centric networking
 

Recently uploaded

Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 

Recently uploaded (20)

Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Artificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic WarfareArtificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic Warfare
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 

Pervasive computing and its Security Issues

  • 1. SOK Phearin Department of Computer Science MBC Lab., Konkuk University 1
  • 2. Outline I. Overview of Pervasive Computing II. Architecture III. Wireless Communication Technologies in Pervasive Computing and Security Issues IV. Wireless Vulnerabilities V. Conclusion 2
  • 3. Pervasive Computing Overview “Ubiquitous computing names the third wave in computing, just now beginning. First were mainframes, each shared by lots of people. Now we are in the personal computing era, person and machine staring uneasily at each other across the desktop. Next comes ubiquitous computing, or the age of calm technology, when technology recedes into the background of our lives.” “The Computer for the 21st Century” - September, 1991 Mark D. Weiser (July 23, 1952 – April 27, 1999)3
  • 4. Pervasive Computing Overview Development of computing technologies:  1st wave : Mainframe computing era  2nd wave : Personal computing era  3rd wave : Pervasive computing era (initially called ubiquitous computing) 4
  • 5. What is Pervasive Computing  Integration of Information and Communications Technology (ICT) into people’s lives and environments, made possible by the growing availability of microprocessors with inbuilt communication facilities.  Goals:  People Oriented  Implicitly use of computers  People will focus on task, not tool 5
  • 6. Pervasive Computing Components Three converging areas of ICT components:  Computing devices: communicate with each other and act intelligently  Sensors: input devices  Processors: interpret and analyze data  Actuators: output devices  Communications: serve pervasive computing applications Ex. Zigbee, Bluetooth, WiFi, Wimax /LTE /3G /4G …  User Interfaces: point of contact between ICT and human  Active: Users overtly control PC technologies and devices  Passive: PC covertly control in the background  Coercive: both Active and Passive 6
  • 7. Architecture Application Middleware and Security Interface Various applications such as Smart Room, Intelligent Intelligent Computing Mobile Computing Navigation… can be built and Context-Aware used Affective Computing Embedded Operating System Hardware 7
  • 8. Architecture Application Not only: Middleware and Security Interface  Heterogeneity  Scalability Intelligent Computing Mobile Computing  Programming interface Context-Aware But also: Affective Computing  Service Discovery  Context-aware Embedded Operating System Hardware 8
  • 9. Architecture Structure of Middleware and Security Interface API Context-aware service Service Description Extend Module …… Security Mechanism 9
  • 10. Architecture Application Middleware and Security Interface An important aspect of the Intelligent Computing Mobile Computing difference between pervasive computing and desktop Context-Aware computing Affective Computing Embedded Operating System Hardware 10
  • 11. Architecture Mobile Computing: •Automatic configuration, dynamic addressing and tracking system •Free switch between heterogeneous networks Affective Computing is the computing that relates to, arises from, or deliberately influences emotions. – Rosalind W. Picard •computer science, sensor technology, psychology, physiology •Key technologies: face recognitions, emotional signal measurements and analysis Context-aware Computing: senses environment context and human context changes. Key technologies: Location awareness, activities recognition 11
  • 12. Architecture Application Hardware: Middleware and Security Interface  Fast processing speed  Small size Intelligent Computing Mobile Computing Context-Aware Embedded Operating System: Affective Computing  Real-time services  Rational allocation Embedded Operating System memories Hardware 12
  • 13. Architecture Structure of Embedded Operating System and Hardware Network Sensors I/O Device Interface Real-time Embedded Operating System Pervasive Computing Hardware 13
  • 14. Wireless Communication Many existing and emerging wireless technologies serve in Pervasive Computing: •Zigbee and Bluetooth - sensors and actuators - low energy consumption, short distances (up to 10 meters) •Wi-Fi - devices - middle ranges (several hundreds of meters) •Wimax /LTE /3G /4G - a home gateway to Internet - long ranges (several to tens of kilometres) 14
  • 15. Security Issues Common vulnerabilities existing in wireless technologies:  Physical jamming  Passive eavesdropping and traffic analysis  Message injection and active eavesdropping  Message deletion and interception  Insider attacks to breach data confidentiality  Denial of service (DoS) attacks 15
  • 16. Security Issues Various types of Attack to a Pervasive Computing can:  Compromise users’ data,  Crash an entire system  Render services unavailable  Potentially lead to the loss of property  Harm users and even lives 16
  • 17. Wireless Vulnerabilities Wi-Fi MAC Protocol Attacks  Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)  DoS attack: Clear Channel Assessment-Jamming  Virtual carrier sense  DoS attack: Repeat forged RTS/CTS messages with large NAV leading network slowdown 17
  • 18. Wireless Vulnerabilities  802.11 state machine  DoS attack: forge deauthentication or disassociation frames 18
  • 20. Wireless Vulnerabilities Wi-Fi Security Protocol Attacks Pre-Robust Security Network Association (Pre-RSNA): security mechanisms in the IEEE 802.11-1997  Attacks on Wired Equivalent Privacy(WEP):  Shared Key management – key can be easily obtained from the attackers  Weak RC4 encryption implementation – key can be easily broken by the brute force attack 20
  • 21. Wireless Vulnerabilities Robust Security Network Association (RSNA): security mechanisms in the IEEE 802.11-2007, consisting of 3 security algorithms: Data confidentiality and integrity protocols RSNA security association management key management procedures 21
  • 22. Wireless Vulnerabilities Attacks on RSNA •Security level rollback attack: “Pre-RSNA only” beacons to force the network to use WEP •EAP attack: forged association requests - disconnect legitimate users. •Four-way handshake DoS attack: forged first unauthenticated message - parallel incomplete Handshakes - exhaust queue space 22
  • 23. Wireless Vulnerabilities Attacks on RSNA (Cont.) •RSN IE poisoning: fake beacons - fail at stage 3 •Reflection attack against four-way handshake: transmitted data sent back to originator . •Dos attack against TKIP: intercepted and modified packet - AP and the client suspend their communication 23
  • 24. Conclusion  Confidentiality, Integrity, and Availability (CIA) are essential to pervasive computing applications since sensitive and real-time information may flow over any type of wireless links  Many challenges and attacks have been proved. Each operation and policy should be carefully examined against any possible attacks. 24
  • 25. Reference  Liu, Y. & Li, F., PCA: A Reference Architecture for Pervasive Computing, 2006 1 st International Symposium on Pervasive Computing and Applications, IEEE 04079121  Zhou, B, Marshall, A. & Lee, T. H., Wireless Security Issues in pervasive computing, 2010 Fourth International Conference on Genetic and Evolutionary Computing, IEEE 05715481  2006, Pervasive Computing, Parliamentary Office of Science and Technology 25
  • 26. 26

Editor's Notes

  1. First Wave - Mainframe computing: one computer shared by many people, via workstations.Second Wave - Personal computing: one computer used by one person, requiring a conscious interaction. Users largely bound to desktop.Third Wave – Pervasive (initially called ubiquitous) computing: one person, many computers. Millions of computers embedded in the environment, allowing technology to recede into the background.
  2. Integrate between people’s lives and env. and make it available for the growth in number of microprocessors connected together using inbuilt (originally equipped with) communication technology such as wire or wireless technology and Internet.Goal of pervasive computing is the realization of computing people-oriented and ubiquitous, making the computer disappear from the eyes of the people, and people can't feel the presence of computer , so that people can only focus on the task rather than the tool - computer itself
  3. actuators: output devices that respond to processed information by altering the environment via electronic or mechanical means. Zigbee and Bluetooth can be used to connect sensors and actuators with low energy consumption in short distances (up to 10 meters)Wi-Fi can be used to connect devices in middle ranges (several hundreds of meters);Wimax /LTE /3G /4G can be used to connect a home gateway to Internet in long ranges (several to tens of kilometres)
  4. The function of services discovery is the faculty of middleware dynamic finding service. Once middleware found on service, it will start banding services and the corresponding procedures. It enables devices and services to properly discover, configure, and communicate with each other
  5. Context-aware computing : For example: a context aware mobile phone may know that it is currently in the meeting room, and that the user has sat down. The phone may conclude that the user is currently in a meeting and reject any unimportant calls. - location awareness and activity recognition
  6. Physical jamming: an adversary generates strong noises to prevent legitimate communications
  7. EAP : Extensible Authentication Protocolsupports multiple authentication methods, such as token cards, one-time passwords, certificates, public key authentication and smart cards. IEEE 802.1x specifies how EAP should be encapsulated in LAN frames.
  8. temporal key identity protocol (TKIP)When TKIP is used, a 20-bit message integrity check (MIC) is computed. Theoretically, it takes 2 minutes to crack MIC by brute force at 11 Mbps data rate. A countermeasure against this vulnerability is implemented with the temporal key identity protocol (TKIP): If two MIC failures are logged within one minute, communications are suspended for 60 seconds (this makes the brute force crack take 6 months). However, an attacker can attack against this countermeasure by intercepting a packet, modifying it so as to make the receiving station unable to calculate the correct MIC, and sending it again and again. This will make the AP and the client suspend their communication.
  9. ARP:Address Resolution Protocol