SlideShare a Scribd company logo
1 of 26
SOK Phearin
Department of Computer Science
   MBC Lab., Konkuk University



                                 1
Outline
I.   Overview of Pervasive Computing

II. Architecture

III. Wireless Communication Technologies in Pervasive
     Computing and Security Issues

IV. Wireless Vulnerabilities

V. Conclusion


                                                        2
Pervasive Computing Overview
“Ubiquitous computing names the third wave in computing, just
now beginning. First were mainframes, each shared by lots of
people. Now we are in the personal computing era, person and
machine staring uneasily at each other across the desktop. Next
comes ubiquitous computing, or the age of calm
technology, when technology recedes into the background of our
lives.”

“The Computer for the 21st Century”
        - September, 1991




                                 Mark D. Weiser (July 23, 1952 – April 27, 1999)3
Pervasive Computing Overview
Development of computing technologies:

   1st wave : Mainframe computing era


   2nd wave : Personal computing era


   3rd wave : Pervasive computing era
            (initially called ubiquitous computing)




                                                      4
What is Pervasive Computing
 Integration of Information and Communications
 Technology (ICT) into people’s lives and
 environments, made possible by the growing availability
 of microprocessors with inbuilt communication
 facilities.


 Goals:
   People Oriented
   Implicitly use of computers
   People will focus on task, not tool
                                                      5
Pervasive Computing Components
Three converging areas of ICT components:
   Computing devices: communicate with each other and
                act intelligently
       Sensors: input devices
       Processors: interpret and analyze data
       Actuators: output devices


   Communications: serve pervasive computing applications
     Ex. Zigbee, Bluetooth, WiFi, Wimax /LTE /3G /4G …


   User Interfaces: point of contact between ICT and human
     Active: Users overtly control PC technologies and devices
     Passive: PC covertly control in the background
     Coercive: both Active and Passive

                                                              6
Architecture
                               Application

         Middleware and Security Interface
                                                     Various applications such as
                                                      Smart Room, Intelligent
Intelligent Computing




                              Mobile Computing
                                                      Navigation… can be built and
                                Context-Aware         used

                             Affective Computing



                        Embedded Operating System

                                Hardware




                                                                                 7
Architecture
                               Application            Not only:
         Middleware and Security Interface              Heterogeneity
                                                        Scalability
Intelligent Computing




                              Mobile Computing          Programming interface

                                Context-Aware
                                                      But also:
                             Affective Computing         Service Discovery
                                                         Context-aware

                        Embedded Operating System

                                Hardware




                                                                                 8
Architecture
Structure of Middleware and Security Interface


                               API

                                        Context-aware
                                           service

                               Service Description

                         Extend Module


                                   ……

              Security Mechanism




                                                        9
Architecture
                               Application

         Middleware and Security Interface

                                                     An important aspect of the
Intelligent Computing




                              Mobile Computing        difference between pervasive
                                                      computing and desktop
                                Context-Aware         computing

                             Affective Computing



                        Embedded Operating System

                                Hardware




                                                                                   10
Architecture
Mobile Computing:
   •Automatic configuration, dynamic addressing and tracking system
   •Free switch between heterogeneous networks
Affective Computing is the computing that relates to, arises
      from, or deliberately influences emotions.
             – Rosalind W. Picard
   •computer science, sensor technology, psychology, physiology
   •Key technologies: face recognitions, emotional signal
      measurements and analysis

Context-aware Computing: senses environment context and
     human context changes.
   Key technologies: Location awareness, activities recognition
                                                                   11
Architecture
                               Application           Hardware:
         Middleware and Security Interface             Fast processing speed
                                                       Small size
Intelligent Computing




                              Mobile Computing


                                Context-Aware        Embedded Operating
                                                      System:
                             Affective Computing
                                                        Real-time services
                                                        Rational allocation
                        Embedded Operating System        memories
                                Hardware




                                                                                12
Architecture
Structure of Embedded Operating System and Hardware



                                   Network
          Sensors    I/O Device
                                   Interface

         Real-time Embedded Operating System

             Pervasive Computing Hardware




                                                       13
Wireless Communication
       Many existing and emerging wireless technologies
serve in Pervasive Computing:

•Zigbee and Bluetooth - sensors and actuators - low
       energy consumption, short distances (up to 10 meters)


•Wi-Fi - devices - middle ranges (several hundreds of meters)


•Wimax /LTE /3G /4G - a home gateway to Internet - long
     ranges (several to tens of kilometres)


                                                                14
Security Issues
Common vulnerabilities existing in wireless technologies:

   Physical jamming

   Passive eavesdropping and traffic analysis

   Message injection and active eavesdropping

   Message deletion and interception

   Insider attacks to breach data confidentiality

   Denial of service (DoS) attacks



                                                         15
Security Issues
Various types of Attack to a Pervasive Computing can:


   Compromise users’ data,

   Crash an entire system

   Render services unavailable

   Potentially lead to the loss of property

   Harm users and even lives




                                                         16
Wireless Vulnerabilities
Wi-Fi MAC Protocol Attacks

     Carrier Sense Multiple Access with Collision Avoidance

      (CSMA/CA)
         DoS attack: Clear Channel Assessment-Jamming



     Virtual carrier sense

         DoS attack: Repeat forged RTS/CTS messages with large
                 NAV leading network slowdown


                                                                  17
Wireless Vulnerabilities
 802.11 state machine

     DoS attack: forge deauthentication or disassociation frames




                                                                18
Wireless Vulnerabilities
Wi-Fi Security Protocol Attacks




                                   19
Wireless Vulnerabilities
Wi-Fi Security Protocol Attacks


Pre-Robust Security Network Association (Pre-RSNA):
      security mechanisms in the IEEE 802.11-1997

  Attacks on Wired Equivalent Privacy(WEP):
     Shared Key management – key can be easily obtained from the
              attackers
     Weak RC4 encryption implementation – key can be easily broken
              by the brute force attack




                                                                      20
Wireless Vulnerabilities

Robust Security Network Association (RSNA): security
      mechanisms in the IEEE 802.11-2007,
      consisting of 3 security algorithms:
   Data confidentiality and integrity protocols
   RSNA security association management
   key management procedures




                                                        21
Wireless Vulnerabilities
Attacks on RSNA
  •Security level rollback attack: “Pre-RSNA only” beacons to force
     the network to use WEP


  •EAP attack: forged association requests - disconnect legitimate
     users.


  •Four-way handshake DoS attack: forged first unauthenticated
     message - parallel incomplete Handshakes - exhaust queue
     space

                                                                     22
Wireless Vulnerabilities
Attacks on RSNA (Cont.)
   •RSN IE poisoning: fake beacons - fail at stage 3


   •Reflection attack against four-way handshake: transmitted
      data sent back to originator .


   •Dos attack against TKIP: intercepted and modified packet - AP
      and the client suspend their communication




                                                                    23
Conclusion
 Confidentiality, Integrity, and Availability (CIA) are
  essential to pervasive computing applications since
  sensitive and real-time information may flow over any type
  of wireless links


 Many challenges and attacks have been proved. Each
  operation and policy should be carefully examined against
  any possible attacks.



                                                               24
Reference
 Liu, Y. & Li, F., PCA: A Reference Architecture for Pervasive Computing, 2006 1 st
  International Symposium on Pervasive Computing and Applications, IEEE
  04079121



 Zhou, B, Marshall, A. & Lee, T. H., Wireless Security Issues in pervasive
  computing, 2010 Fourth International Conference on Genetic and Evolutionary
  Computing, IEEE 05715481



 2006, Pervasive Computing, Parliamentary Office of Science and Technology




                                                                                   25
26

More Related Content

What's hot

pervasive computing
pervasive computingpervasive computing
pervasive computingSweety Singh
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computingPriti Punia
 
Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computinglogus2k
 
Seminar on pervasive computing
Seminar  on pervasive computingSeminar  on pervasive computing
Seminar on pervasive computingLikan Patra
 
Case study mobile computing
Case study mobile computingCase study mobile computing
Case study mobile computingkaleeswaran S
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligencechandrika95
 
The future of mobile computing
The future of mobile computingThe future of mobile computing
The future of mobile computingRashid Shahariar
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsAbdullah Alfadhly
 
Grid computing Seminar PPT
Grid computing Seminar PPTGrid computing Seminar PPT
Grid computing Seminar PPTUpender Upr
 
Virtualize of IO Devices .docx
Virtualize of IO Devices .docxVirtualize of IO Devices .docx
Virtualize of IO Devices .docxkumari36
 
Green Computing Seminar
Green Computing SeminarGreen Computing Seminar
Green Computing SeminarNikunj_Agrawal
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingHoneyson Joseph
 
Distributed System
Distributed SystemDistributed System
Distributed SystemIqra khalil
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment modelsAshok Kumar
 

What's hot (20)

pervasive computing
pervasive computingpervasive computing
pervasive computing
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computing
 
Seminar on pervasive computing
Seminar  on pervasive computingSeminar  on pervasive computing
Seminar on pervasive computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Nano computing
Nano computingNano computing
Nano computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Case study mobile computing
Case study mobile computingCase study mobile computing
Case study mobile computing
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
 
The future of mobile computing
The future of mobile computingThe future of mobile computing
The future of mobile computing
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Grid computing Seminar PPT
Grid computing Seminar PPTGrid computing Seminar PPT
Grid computing Seminar PPT
 
Virtualize of IO Devices .docx
Virtualize of IO Devices .docxVirtualize of IO Devices .docx
Virtualize of IO Devices .docx
 
Green Computing Seminar
Green Computing SeminarGreen Computing Seminar
Green Computing Seminar
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous Computing
 
Distributed System
Distributed SystemDistributed System
Distributed System
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
 
Cloud Service Models
Cloud Service ModelsCloud Service Models
Cloud Service Models
 

Viewers also liked

Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computingu065932
 
Pervasive Web Application Architecture
Pervasive Web Application ArchitecturePervasive Web Application Architecture
Pervasive Web Application ArchitectureUC San Diego
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItRob Manson
 
Ec2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computingEc2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computingNuth Otanasap
 
Conversational Architecture, CAVE Language, Data Stewardship
Conversational Architecture, CAVE Language, Data StewardshipConversational Architecture, CAVE Language, Data Stewardship
Conversational Architecture, CAVE Language, Data StewardshipLoren Davie
 
Ambient intelligence & Ubiquitous Computing
Ambient intelligence & Ubiquitous ComputingAmbient intelligence & Ubiquitous Computing
Ambient intelligence & Ubiquitous ComputingRohit Arora
 
I hear voices: Explorations of multidevice experiences with conversational as...
I hear voices: Explorations of multidevice experiences with conversational as...I hear voices: Explorations of multidevice experiences with conversational as...
I hear voices: Explorations of multidevice experiences with conversational as...Karen Kaushansky
 
Products are Services, how ubiquitous computing changes design
Products are Services, how ubiquitous computing changes designProducts are Services, how ubiquitous computing changes design
Products are Services, how ubiquitous computing changes designMike Kuniavsky
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile ComputingJAINIK PATEL
 
Unit 1 - mobile computing introduction
Unit 1 - mobile computing introductionUnit 1 - mobile computing introduction
Unit 1 - mobile computing introductionVintesh Patel
 
Understanding the New World of Cognitive Computing
Understanding the New World of Cognitive ComputingUnderstanding the New World of Cognitive Computing
Understanding the New World of Cognitive ComputingDATAVERSITY
 
Docker on IoT Devices
Docker on IoT DevicesDocker on IoT Devices
Docker on IoT DevicesDocker, Inc.
 
Cognitive Computing : Trends to Watch in 2016
Cognitive Computing:  Trends to Watch in 2016Cognitive Computing:  Trends to Watch in 2016
Cognitive Computing : Trends to Watch in 2016Bill Chamberlin
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaPrashant Gupta
 

Viewers also liked (16)

Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Pervasive Web Application Architecture
Pervasive Web Application ArchitecturePervasive Web Application Architecture
Pervasive Web Application Architecture
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In It
 
Ec2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computingEc2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computing
 
Conversational Architecture, CAVE Language, Data Stewardship
Conversational Architecture, CAVE Language, Data StewardshipConversational Architecture, CAVE Language, Data Stewardship
Conversational Architecture, CAVE Language, Data Stewardship
 
Ambient intelligence & Ubiquitous Computing
Ambient intelligence & Ubiquitous ComputingAmbient intelligence & Ubiquitous Computing
Ambient intelligence & Ubiquitous Computing
 
I hear voices: Explorations of multidevice experiences with conversational as...
I hear voices: Explorations of multidevice experiences with conversational as...I hear voices: Explorations of multidevice experiences with conversational as...
I hear voices: Explorations of multidevice experiences with conversational as...
 
Products are Services, how ubiquitous computing changes design
Products are Services, how ubiquitous computing changes designProducts are Services, how ubiquitous computing changes design
Products are Services, how ubiquitous computing changes design
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile Computing
 
Unit 1 - mobile computing introduction
Unit 1 - mobile computing introductionUnit 1 - mobile computing introduction
Unit 1 - mobile computing introduction
 
Understanding the New World of Cognitive Computing
Understanding the New World of Cognitive ComputingUnderstanding the New World of Cognitive Computing
Understanding the New World of Cognitive Computing
 
Docker on IoT Devices
Docker on IoT DevicesDocker on IoT Devices
Docker on IoT Devices
 
Cognitive Computing : Trends to Watch in 2016
Cognitive Computing:  Trends to Watch in 2016Cognitive Computing:  Trends to Watch in 2016
Cognitive Computing : Trends to Watch in 2016
 
Fog computing
Fog computingFog computing
Fog computing
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant Gupta
 

Similar to Pervasive computing and its Security Issues

Chapter_1.pptx
Chapter_1.pptxChapter_1.pptx
Chapter_1.pptxAadiSoni3
 
Piet Demeester - Future Internet
Piet Demeester - Future InternetPiet Demeester - Future Internet
Piet Demeester - Future Internetimec.archive
 
Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementMicrosoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementIntergen
 
Cloud Computing: da curiosidade para casos reais
Cloud Computing: da curiosidade para casos reaisCloud Computing: da curiosidade para casos reais
Cloud Computing: da curiosidade para casos reaissoudW
 
The Stuxnet Worm creation process
The Stuxnet Worm creation processThe Stuxnet Worm creation process
The Stuxnet Worm creation processAjay Ohri
 
Enabling High Level Application Development In The Internet Of Things
Enabling High Level Application Development In The Internet Of ThingsEnabling High Level Application Development In The Internet Of Things
Enabling High Level Application Development In The Internet Of ThingsPankesh Patel
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTIJRTEMJOURNAL
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT journal ijrtem
 
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...Rio Info
 
Telecom trends 261112
Telecom trends 261112Telecom trends 261112
Telecom trends 261112Sharon Rozov
 
Grid computing [2005]
Grid computing [2005]Grid computing [2005]
Grid computing [2005]Raul Soto
 
Ubiquitous Computing and Context-Aware Services
Ubiquitous Computing and Context-Aware ServicesUbiquitous Computing and Context-Aware Services
Ubiquitous Computing and Context-Aware ServicesKuncoro Wastuwibowo
 
Cloud Computing: da curiosidade para casos reais
Cloud Computing: da curiosidade para casos reaisCloud Computing: da curiosidade para casos reais
Cloud Computing: da curiosidade para casos reaissoudW
 

Similar to Pervasive computing and its Security Issues (20)

Sensor Network
Sensor NetworkSensor Network
Sensor Network
 
Chapter_1.pptx
Chapter_1.pptxChapter_1.pptx
Chapter_1.pptx
 
Day 3 p2 - security
Day 3   p2 - securityDay 3   p2 - security
Day 3 p2 - security
 
Day 3 p2 - security
Day 3   p2 - securityDay 3   p2 - security
Day 3 p2 - security
 
Piet Demeester - Future Internet
Piet Demeester - Future InternetPiet Demeester - Future Internet
Piet Demeester - Future Internet
 
Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementMicrosoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT Management
 
Cloud Computing: da curiosidade para casos reais
Cloud Computing: da curiosidade para casos reaisCloud Computing: da curiosidade para casos reais
Cloud Computing: da curiosidade para casos reais
 
The Stuxnet Worm creation process
The Stuxnet Worm creation processThe Stuxnet Worm creation process
The Stuxnet Worm creation process
 
Enabling High Level Application Development In The Internet Of Things
Enabling High Level Application Development In The Internet Of ThingsEnabling High Level Application Development In The Internet Of Things
Enabling High Level Application Development In The Internet Of Things
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Telecom trends 261112
Telecom trends 261112Telecom trends 261112
Telecom trends 261112
 
Grid computing [2005]
Grid computing [2005]Grid computing [2005]
Grid computing [2005]
 
Ubiquitous Computing and Context-Aware Services
Ubiquitous Computing and Context-Aware ServicesUbiquitous Computing and Context-Aware Services
Ubiquitous Computing and Context-Aware Services
 
Autonomic computer
Autonomic computerAutonomic computer
Autonomic computer
 
Autonomic computer
Autonomic computerAutonomic computer
Autonomic computer
 
Digital Pen En 2008
Digital Pen En 2008Digital Pen En 2008
Digital Pen En 2008
 
Cloud Computing: da curiosidade para casos reais
Cloud Computing: da curiosidade para casos reaisCloud Computing: da curiosidade para casos reais
Cloud Computing: da curiosidade para casos reais
 

More from Phearin Sok

A Mobile Service Architecture for Improving Availability and Continuity
A Mobile Service Architecture for Improving Availability and ContinuityA Mobile Service Architecture for Improving Availability and Continuity
A Mobile Service Architecture for Improving Availability and ContinuityPhearin Sok
 
Locator ID Separation Using Device Unique ID
Locator ID Separation Using Device Unique IDLocator ID Separation Using Device Unique ID
Locator ID Separation Using Device Unique IDPhearin Sok
 
Mobility Management in HIMALIS Architecture
Mobility Management in HIMALIS ArchitectureMobility Management in HIMALIS Architecture
Mobility Management in HIMALIS ArchitecturePhearin Sok
 
DPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant NetworkDPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant NetworkPhearin Sok
 
Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparisonPhearin Sok
 
Desktop to Cloud Transformation Planning
Desktop to Cloud Transformation PlanningDesktop to Cloud Transformation Planning
Desktop to Cloud Transformation PlanningPhearin Sok
 
Content centric networking
Content centric networkingContent centric networking
Content centric networkingPhearin Sok
 

More from Phearin Sok (9)

A Mobile Service Architecture for Improving Availability and Continuity
A Mobile Service Architecture for Improving Availability and ContinuityA Mobile Service Architecture for Improving Availability and Continuity
A Mobile Service Architecture for Improving Availability and Continuity
 
N Screen
N ScreenN Screen
N Screen
 
Locator ID Separation Using Device Unique ID
Locator ID Separation Using Device Unique IDLocator ID Separation Using Device Unique ID
Locator ID Separation Using Device Unique ID
 
Mobility Management in HIMALIS Architecture
Mobility Management in HIMALIS ArchitectureMobility Management in HIMALIS Architecture
Mobility Management in HIMALIS Architecture
 
DPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant NetworkDPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant Network
 
Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparison
 
UNICEF
UNICEFUNICEF
UNICEF
 
Desktop to Cloud Transformation Planning
Desktop to Cloud Transformation PlanningDesktop to Cloud Transformation Planning
Desktop to Cloud Transformation Planning
 
Content centric networking
Content centric networkingContent centric networking
Content centric networking
 

Recently uploaded

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Recently uploaded (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

Pervasive computing and its Security Issues

  • 1. SOK Phearin Department of Computer Science MBC Lab., Konkuk University 1
  • 2. Outline I. Overview of Pervasive Computing II. Architecture III. Wireless Communication Technologies in Pervasive Computing and Security Issues IV. Wireless Vulnerabilities V. Conclusion 2
  • 3. Pervasive Computing Overview “Ubiquitous computing names the third wave in computing, just now beginning. First were mainframes, each shared by lots of people. Now we are in the personal computing era, person and machine staring uneasily at each other across the desktop. Next comes ubiquitous computing, or the age of calm technology, when technology recedes into the background of our lives.” “The Computer for the 21st Century” - September, 1991 Mark D. Weiser (July 23, 1952 – April 27, 1999)3
  • 4. Pervasive Computing Overview Development of computing technologies:  1st wave : Mainframe computing era  2nd wave : Personal computing era  3rd wave : Pervasive computing era (initially called ubiquitous computing) 4
  • 5. What is Pervasive Computing  Integration of Information and Communications Technology (ICT) into people’s lives and environments, made possible by the growing availability of microprocessors with inbuilt communication facilities.  Goals:  People Oriented  Implicitly use of computers  People will focus on task, not tool 5
  • 6. Pervasive Computing Components Three converging areas of ICT components:  Computing devices: communicate with each other and act intelligently  Sensors: input devices  Processors: interpret and analyze data  Actuators: output devices  Communications: serve pervasive computing applications Ex. Zigbee, Bluetooth, WiFi, Wimax /LTE /3G /4G …  User Interfaces: point of contact between ICT and human  Active: Users overtly control PC technologies and devices  Passive: PC covertly control in the background  Coercive: both Active and Passive 6
  • 7. Architecture Application Middleware and Security Interface Various applications such as Smart Room, Intelligent Intelligent Computing Mobile Computing Navigation… can be built and Context-Aware used Affective Computing Embedded Operating System Hardware 7
  • 8. Architecture Application Not only: Middleware and Security Interface  Heterogeneity  Scalability Intelligent Computing Mobile Computing  Programming interface Context-Aware But also: Affective Computing  Service Discovery  Context-aware Embedded Operating System Hardware 8
  • 9. Architecture Structure of Middleware and Security Interface API Context-aware service Service Description Extend Module …… Security Mechanism 9
  • 10. Architecture Application Middleware and Security Interface An important aspect of the Intelligent Computing Mobile Computing difference between pervasive computing and desktop Context-Aware computing Affective Computing Embedded Operating System Hardware 10
  • 11. Architecture Mobile Computing: •Automatic configuration, dynamic addressing and tracking system •Free switch between heterogeneous networks Affective Computing is the computing that relates to, arises from, or deliberately influences emotions. – Rosalind W. Picard •computer science, sensor technology, psychology, physiology •Key technologies: face recognitions, emotional signal measurements and analysis Context-aware Computing: senses environment context and human context changes. Key technologies: Location awareness, activities recognition 11
  • 12. Architecture Application Hardware: Middleware and Security Interface  Fast processing speed  Small size Intelligent Computing Mobile Computing Context-Aware Embedded Operating System: Affective Computing  Real-time services  Rational allocation Embedded Operating System memories Hardware 12
  • 13. Architecture Structure of Embedded Operating System and Hardware Network Sensors I/O Device Interface Real-time Embedded Operating System Pervasive Computing Hardware 13
  • 14. Wireless Communication Many existing and emerging wireless technologies serve in Pervasive Computing: •Zigbee and Bluetooth - sensors and actuators - low energy consumption, short distances (up to 10 meters) •Wi-Fi - devices - middle ranges (several hundreds of meters) •Wimax /LTE /3G /4G - a home gateway to Internet - long ranges (several to tens of kilometres) 14
  • 15. Security Issues Common vulnerabilities existing in wireless technologies:  Physical jamming  Passive eavesdropping and traffic analysis  Message injection and active eavesdropping  Message deletion and interception  Insider attacks to breach data confidentiality  Denial of service (DoS) attacks 15
  • 16. Security Issues Various types of Attack to a Pervasive Computing can:  Compromise users’ data,  Crash an entire system  Render services unavailable  Potentially lead to the loss of property  Harm users and even lives 16
  • 17. Wireless Vulnerabilities Wi-Fi MAC Protocol Attacks  Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)  DoS attack: Clear Channel Assessment-Jamming  Virtual carrier sense  DoS attack: Repeat forged RTS/CTS messages with large NAV leading network slowdown 17
  • 18. Wireless Vulnerabilities  802.11 state machine  DoS attack: forge deauthentication or disassociation frames 18
  • 20. Wireless Vulnerabilities Wi-Fi Security Protocol Attacks Pre-Robust Security Network Association (Pre-RSNA): security mechanisms in the IEEE 802.11-1997  Attacks on Wired Equivalent Privacy(WEP):  Shared Key management – key can be easily obtained from the attackers  Weak RC4 encryption implementation – key can be easily broken by the brute force attack 20
  • 21. Wireless Vulnerabilities Robust Security Network Association (RSNA): security mechanisms in the IEEE 802.11-2007, consisting of 3 security algorithms: Data confidentiality and integrity protocols RSNA security association management key management procedures 21
  • 22. Wireless Vulnerabilities Attacks on RSNA •Security level rollback attack: “Pre-RSNA only” beacons to force the network to use WEP •EAP attack: forged association requests - disconnect legitimate users. •Four-way handshake DoS attack: forged first unauthenticated message - parallel incomplete Handshakes - exhaust queue space 22
  • 23. Wireless Vulnerabilities Attacks on RSNA (Cont.) •RSN IE poisoning: fake beacons - fail at stage 3 •Reflection attack against four-way handshake: transmitted data sent back to originator . •Dos attack against TKIP: intercepted and modified packet - AP and the client suspend their communication 23
  • 24. Conclusion  Confidentiality, Integrity, and Availability (CIA) are essential to pervasive computing applications since sensitive and real-time information may flow over any type of wireless links  Many challenges and attacks have been proved. Each operation and policy should be carefully examined against any possible attacks. 24
  • 25. Reference  Liu, Y. & Li, F., PCA: A Reference Architecture for Pervasive Computing, 2006 1 st International Symposium on Pervasive Computing and Applications, IEEE 04079121  Zhou, B, Marshall, A. & Lee, T. H., Wireless Security Issues in pervasive computing, 2010 Fourth International Conference on Genetic and Evolutionary Computing, IEEE 05715481  2006, Pervasive Computing, Parliamentary Office of Science and Technology 25
  • 26. 26

Editor's Notes

  1. First Wave - Mainframe computing: one computer shared by many people, via workstations.Second Wave - Personal computing: one computer used by one person, requiring a conscious interaction. Users largely bound to desktop.Third Wave – Pervasive (initially called ubiquitous) computing: one person, many computers. Millions of computers embedded in the environment, allowing technology to recede into the background.
  2. Integrate between people’s lives and env. and make it available for the growth in number of microprocessors connected together using inbuilt (originally equipped with) communication technology such as wire or wireless technology and Internet.Goal of pervasive computing is the realization of computing people-oriented and ubiquitous, making the computer disappear from the eyes of the people, and people can't feel the presence of computer , so that people can only focus on the task rather than the tool - computer itself
  3. actuators: output devices that respond to processed information by altering the environment via electronic or mechanical means. Zigbee and Bluetooth can be used to connect sensors and actuators with low energy consumption in short distances (up to 10 meters)Wi-Fi can be used to connect devices in middle ranges (several hundreds of meters);Wimax /LTE /3G /4G can be used to connect a home gateway to Internet in long ranges (several to tens of kilometres)
  4. The function of services discovery is the faculty of middleware dynamic finding service. Once middleware found on service, it will start banding services and the corresponding procedures. It enables devices and services to properly discover, configure, and communicate with each other
  5. Context-aware computing : For example: a context aware mobile phone may know that it is currently in the meeting room, and that the user has sat down. The phone may conclude that the user is currently in a meeting and reject any unimportant calls. - location awareness and activity recognition
  6. Physical jamming: an adversary generates strong noises to prevent legitimate communications
  7. EAP : Extensible Authentication Protocolsupports multiple authentication methods, such as token cards, one-time passwords, certificates, public key authentication and smart cards. IEEE 802.1x specifies how EAP should be encapsulated in LAN frames.
  8. temporal key identity protocol (TKIP)When TKIP is used, a 20-bit message integrity check (MIC) is computed. Theoretically, it takes 2 minutes to crack MIC by brute force at 11 Mbps data rate. A countermeasure against this vulnerability is implemented with the temporal key identity protocol (TKIP): If two MIC failures are logged within one minute, communications are suspended for 60 seconds (this makes the brute force crack take 6 months). However, an attacker can attack against this countermeasure by intercepting a packet, modifying it so as to make the receiving station unable to calculate the correct MIC, and sending it again and again. This will make the AP and the client suspend their communication.
  9. ARP:Address Resolution Protocol