SlideShare a Scribd company logo
1 of 26
SOK Phearin
Department of Computer Science
   MBC Lab., Konkuk University



                                 1
Outline
I.   Overview of Pervasive Computing

II. Architecture

III. Wireless Communication Technologies in Pervasive
     Computing and Security Issues

IV. Wireless Vulnerabilities

V. Conclusion


                                                        2
Pervasive Computing Overview
“Ubiquitous computing names the third wave in computing, just
now beginning. First were mainframes, each shared by lots of
people. Now we are in the personal computing era, person and
machine staring uneasily at each other across the desktop. Next
comes ubiquitous computing, or the age of calm
technology, when technology recedes into the background of our
lives.”

“The Computer for the 21st Century”
        - September, 1991




                                 Mark D. Weiser (July 23, 1952 – April 27, 1999)3
Pervasive Computing Overview
Development of computing technologies:

   1st wave : Mainframe computing era


   2nd wave : Personal computing era


   3rd wave : Pervasive computing era
            (initially called ubiquitous computing)




                                                      4
What is Pervasive Computing
 Integration of Information and Communications
 Technology (ICT) into people’s lives and
 environments, made possible by the growing availability
 of microprocessors with inbuilt communication
 facilities.


 Goals:
   People Oriented
   Implicitly use of computers
   People will focus on task, not tool
                                                      5
Pervasive Computing Components
Three converging areas of ICT components:
   Computing devices: communicate with each other and
                act intelligently
       Sensors: input devices
       Processors: interpret and analyze data
       Actuators: output devices


   Communications: serve pervasive computing applications
     Ex. Zigbee, Bluetooth, WiFi, Wimax /LTE /3G /4G …


   User Interfaces: point of contact between ICT and human
     Active: Users overtly control PC technologies and devices
     Passive: PC covertly control in the background
     Coercive: both Active and Passive

                                                              6
Architecture
                               Application

         Middleware and Security Interface
                                                     Various applications such as
                                                      Smart Room, Intelligent
Intelligent Computing




                              Mobile Computing
                                                      Navigation… can be built and
                                Context-Aware         used

                             Affective Computing



                        Embedded Operating System

                                Hardware




                                                                                 7
Architecture
                               Application            Not only:
         Middleware and Security Interface              Heterogeneity
                                                        Scalability
Intelligent Computing




                              Mobile Computing          Programming interface

                                Context-Aware
                                                      But also:
                             Affective Computing         Service Discovery
                                                         Context-aware

                        Embedded Operating System

                                Hardware




                                                                                 8
Architecture
Structure of Middleware and Security Interface


                               API

                                        Context-aware
                                           service

                               Service Description

                         Extend Module


                                   ……

              Security Mechanism




                                                        9
Architecture
                               Application

         Middleware and Security Interface

                                                     An important aspect of the
Intelligent Computing




                              Mobile Computing        difference between pervasive
                                                      computing and desktop
                                Context-Aware         computing

                             Affective Computing



                        Embedded Operating System

                                Hardware




                                                                                   10
Architecture
Mobile Computing:
   •Automatic configuration, dynamic addressing and tracking system
   •Free switch between heterogeneous networks
Affective Computing is the computing that relates to, arises
      from, or deliberately influences emotions.
             – Rosalind W. Picard
   •computer science, sensor technology, psychology, physiology
   •Key technologies: face recognitions, emotional signal
      measurements and analysis

Context-aware Computing: senses environment context and
     human context changes.
   Key technologies: Location awareness, activities recognition
                                                                   11
Architecture
                               Application           Hardware:
         Middleware and Security Interface             Fast processing speed
                                                       Small size
Intelligent Computing




                              Mobile Computing


                                Context-Aware        Embedded Operating
                                                      System:
                             Affective Computing
                                                        Real-time services
                                                        Rational allocation
                        Embedded Operating System        memories
                                Hardware




                                                                                12
Architecture
Structure of Embedded Operating System and Hardware



                                   Network
          Sensors    I/O Device
                                   Interface

         Real-time Embedded Operating System

             Pervasive Computing Hardware




                                                       13
Wireless Communication
       Many existing and emerging wireless technologies
serve in Pervasive Computing:

•Zigbee and Bluetooth - sensors and actuators - low
       energy consumption, short distances (up to 10 meters)


•Wi-Fi - devices - middle ranges (several hundreds of meters)


•Wimax /LTE /3G /4G - a home gateway to Internet - long
     ranges (several to tens of kilometres)


                                                                14
Security Issues
Common vulnerabilities existing in wireless technologies:

   Physical jamming

   Passive eavesdropping and traffic analysis

   Message injection and active eavesdropping

   Message deletion and interception

   Insider attacks to breach data confidentiality

   Denial of service (DoS) attacks



                                                         15
Security Issues
Various types of Attack to a Pervasive Computing can:


   Compromise users’ data,

   Crash an entire system

   Render services unavailable

   Potentially lead to the loss of property

   Harm users and even lives




                                                         16
Wireless Vulnerabilities
Wi-Fi MAC Protocol Attacks

     Carrier Sense Multiple Access with Collision Avoidance

      (CSMA/CA)
         DoS attack: Clear Channel Assessment-Jamming



     Virtual carrier sense

         DoS attack: Repeat forged RTS/CTS messages with large
                 NAV leading network slowdown


                                                                  17
Wireless Vulnerabilities
 802.11 state machine

     DoS attack: forge deauthentication or disassociation frames




                                                                18
Wireless Vulnerabilities
Wi-Fi Security Protocol Attacks




                                   19
Wireless Vulnerabilities
Wi-Fi Security Protocol Attacks


Pre-Robust Security Network Association (Pre-RSNA):
      security mechanisms in the IEEE 802.11-1997

  Attacks on Wired Equivalent Privacy(WEP):
     Shared Key management – key can be easily obtained from the
              attackers
     Weak RC4 encryption implementation – key can be easily broken
              by the brute force attack




                                                                      20
Wireless Vulnerabilities

Robust Security Network Association (RSNA): security
      mechanisms in the IEEE 802.11-2007,
      consisting of 3 security algorithms:
   Data confidentiality and integrity protocols
   RSNA security association management
   key management procedures




                                                        21
Wireless Vulnerabilities
Attacks on RSNA
  •Security level rollback attack: “Pre-RSNA only” beacons to force
     the network to use WEP


  •EAP attack: forged association requests - disconnect legitimate
     users.


  •Four-way handshake DoS attack: forged first unauthenticated
     message - parallel incomplete Handshakes - exhaust queue
     space

                                                                     22
Wireless Vulnerabilities
Attacks on RSNA (Cont.)
   •RSN IE poisoning: fake beacons - fail at stage 3


   •Reflection attack against four-way handshake: transmitted
      data sent back to originator .


   •Dos attack against TKIP: intercepted and modified packet - AP
      and the client suspend their communication




                                                                    23
Conclusion
 Confidentiality, Integrity, and Availability (CIA) are
  essential to pervasive computing applications since
  sensitive and real-time information may flow over any type
  of wireless links


 Many challenges and attacks have been proved. Each
  operation and policy should be carefully examined against
  any possible attacks.



                                                               24
Reference
 Liu, Y. & Li, F., PCA: A Reference Architecture for Pervasive Computing, 2006 1 st
  International Symposium on Pervasive Computing and Applications, IEEE
  04079121



 Zhou, B, Marshall, A. & Lee, T. H., Wireless Security Issues in pervasive
  computing, 2010 Fourth International Conference on Genetic and Evolutionary
  Computing, IEEE 05715481



 2006, Pervasive Computing, Parliamentary Office of Science and Technology




                                                                                   25
26

More Related Content

What's hot

Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing Govind Raj
 
pervasive computing
pervasive computingpervasive computing
pervasive computingSweety Singh
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingHoneyson Joseph
 
Pervasive Computing: Vision and Challenges
Pervasive Computing: Vision and ChallengesPervasive Computing: Vision and Challenges
Pervasive Computing: Vision and ChallengesRaquel Salcedo Gomes
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligencechandrika95
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computingPriti Punia
 
Autonomic Computing
Autonomic ComputingAutonomic Computing
Autonomic ComputingAhmed Banafa
 
Wearable Computing and Human Computer Interfaces
Wearable Computing and Human Computer InterfacesWearable Computing and Human Computer Interfaces
Wearable Computing and Human Computer InterfacesJeffrey Funk
 
Introduction to HCI
Introduction to HCI Introduction to HCI
Introduction to HCI Deskala
 
Ubiquitous computing abstract
Ubiquitous computing abstractUbiquitous computing abstract
Ubiquitous computing abstractPriti Punia
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous ComputingDaniel Kornev
 
Mobile computing -- Introduction
Mobile computing -- IntroductionMobile computing -- Introduction
Mobile computing -- Introductionnicole_wang
 
Pervasive Computing - Let us Pervade our Future
Pervasive Computing - Let us Pervade our FuturePervasive Computing - Let us Pervade our Future
Pervasive Computing - Let us Pervade our FutureKarthikeyan V
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics123seminarsonly
 

What's hot (20)

Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing
 
pervasive computing
pervasive computingpervasive computing
pervasive computing
 
PERVASIVE COMPUTING
PERVASIVE COMPUTINGPERVASIVE COMPUTING
PERVASIVE COMPUTING
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous Computing
 
Pervasive Computing: Vision and Challenges
Pervasive Computing: Vision and ChallengesPervasive Computing: Vision and Challenges
Pervasive Computing: Vision and Challenges
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Autonomic Computing
Autonomic ComputingAutonomic Computing
Autonomic Computing
 
Affective Computing
Affective ComputingAffective Computing
Affective Computing
 
Wearable Computing and Human Computer Interfaces
Wearable Computing and Human Computer InterfacesWearable Computing and Human Computer Interfaces
Wearable Computing and Human Computer Interfaces
 
Introduction to HCI
Introduction to HCI Introduction to HCI
Introduction to HCI
 
Ubiquitous computing abstract
Ubiquitous computing abstractUbiquitous computing abstract
Ubiquitous computing abstract
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Introduction uc
Introduction ucIntroduction uc
Introduction uc
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Mobile computing -- Introduction
Mobile computing -- IntroductionMobile computing -- Introduction
Mobile computing -- Introduction
 
Pervasive Computing - Let us Pervade our Future
Pervasive Computing - Let us Pervade our FuturePervasive Computing - Let us Pervade our Future
Pervasive Computing - Let us Pervade our Future
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 

Viewers also liked

Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computingRam kumar
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computingu065932
 
Pervasive Web Application Architecture
Pervasive Web Application ArchitecturePervasive Web Application Architecture
Pervasive Web Application ArchitectureUC San Diego
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItRob Manson
 
Ec2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computingEc2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computingNuth Otanasap
 
Conversational Architecture, CAVE Language, Data Stewardship
Conversational Architecture, CAVE Language, Data StewardshipConversational Architecture, CAVE Language, Data Stewardship
Conversational Architecture, CAVE Language, Data StewardshipLoren Davie
 
Ambient intelligence & Ubiquitous Computing
Ambient intelligence & Ubiquitous ComputingAmbient intelligence & Ubiquitous Computing
Ambient intelligence & Ubiquitous ComputingRohit Arora
 
I hear voices: Explorations of multidevice experiences with conversational as...
I hear voices: Explorations of multidevice experiences with conversational as...I hear voices: Explorations of multidevice experiences with conversational as...
I hear voices: Explorations of multidevice experiences with conversational as...Karen Kaushansky
 
Products are Services, how ubiquitous computing changes design
Products are Services, how ubiquitous computing changes designProducts are Services, how ubiquitous computing changes design
Products are Services, how ubiquitous computing changes designMike Kuniavsky
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile ComputingJAINIK PATEL
 
Unit 1 - mobile computing introduction
Unit 1 - mobile computing introductionUnit 1 - mobile computing introduction
Unit 1 - mobile computing introductionVintesh Patel
 
Understanding the New World of Cognitive Computing
Understanding the New World of Cognitive ComputingUnderstanding the New World of Cognitive Computing
Understanding the New World of Cognitive ComputingDATAVERSITY
 
Docker on IoT Devices
Docker on IoT DevicesDocker on IoT Devices
Docker on IoT DevicesDocker, Inc.
 
Cognitive Computing : Trends to Watch in 2016
Cognitive Computing:  Trends to Watch in 2016Cognitive Computing:  Trends to Watch in 2016
Cognitive Computing : Trends to Watch in 2016Bill Chamberlin
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaPrashant Gupta
 

Viewers also liked (16)

Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computing
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Pervasive Web Application Architecture
Pervasive Web Application ArchitecturePervasive Web Application Architecture
Pervasive Web Application Architecture
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In It
 
Ec2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computingEc2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computing
 
Conversational Architecture, CAVE Language, Data Stewardship
Conversational Architecture, CAVE Language, Data StewardshipConversational Architecture, CAVE Language, Data Stewardship
Conversational Architecture, CAVE Language, Data Stewardship
 
Ambient intelligence & Ubiquitous Computing
Ambient intelligence & Ubiquitous ComputingAmbient intelligence & Ubiquitous Computing
Ambient intelligence & Ubiquitous Computing
 
I hear voices: Explorations of multidevice experiences with conversational as...
I hear voices: Explorations of multidevice experiences with conversational as...I hear voices: Explorations of multidevice experiences with conversational as...
I hear voices: Explorations of multidevice experiences with conversational as...
 
Products are Services, how ubiquitous computing changes design
Products are Services, how ubiquitous computing changes designProducts are Services, how ubiquitous computing changes design
Products are Services, how ubiquitous computing changes design
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile Computing
 
Unit 1 - mobile computing introduction
Unit 1 - mobile computing introductionUnit 1 - mobile computing introduction
Unit 1 - mobile computing introduction
 
Understanding the New World of Cognitive Computing
Understanding the New World of Cognitive ComputingUnderstanding the New World of Cognitive Computing
Understanding the New World of Cognitive Computing
 
Docker on IoT Devices
Docker on IoT DevicesDocker on IoT Devices
Docker on IoT Devices
 
Cognitive Computing : Trends to Watch in 2016
Cognitive Computing:  Trends to Watch in 2016Cognitive Computing:  Trends to Watch in 2016
Cognitive Computing : Trends to Watch in 2016
 
Fog computing
Fog computingFog computing
Fog computing
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant Gupta
 

Similar to Pervasive computing and its Security Issues

Chapter_1.pptx
Chapter_1.pptxChapter_1.pptx
Chapter_1.pptxAadiSoni3
 
Piet Demeester - Future Internet
Piet Demeester - Future InternetPiet Demeester - Future Internet
Piet Demeester - Future Internetimec.archive
 
Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementMicrosoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementIntergen
 
Cloud Computing: da curiosidade para casos reais
Cloud Computing: da curiosidade para casos reaisCloud Computing: da curiosidade para casos reais
Cloud Computing: da curiosidade para casos reaissoudW
 
The Stuxnet Worm creation process
The Stuxnet Worm creation processThe Stuxnet Worm creation process
The Stuxnet Worm creation processAjay Ohri
 
Enabling High Level Application Development In The Internet Of Things
Enabling High Level Application Development In The Internet Of ThingsEnabling High Level Application Development In The Internet Of Things
Enabling High Level Application Development In The Internet Of ThingsPankesh Patel
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTIJRTEMJOURNAL
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT journal ijrtem
 
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...Rio Info
 
Telecom trends 261112
Telecom trends 261112Telecom trends 261112
Telecom trends 261112Sharon Rozov
 
Grid computing [2005]
Grid computing [2005]Grid computing [2005]
Grid computing [2005]Raul Soto
 
Ubiquitous Computing and Context-Aware Services
Ubiquitous Computing and Context-Aware ServicesUbiquitous Computing and Context-Aware Services
Ubiquitous Computing and Context-Aware ServicesKuncoro Wastuwibowo
 
Cloud Computing: da curiosidade para casos reais
Cloud Computing: da curiosidade para casos reaisCloud Computing: da curiosidade para casos reais
Cloud Computing: da curiosidade para casos reaissoudW
 

Similar to Pervasive computing and its Security Issues (20)

Sensor Network
Sensor NetworkSensor Network
Sensor Network
 
Chapter_1.pptx
Chapter_1.pptxChapter_1.pptx
Chapter_1.pptx
 
Day 3 p2 - security
Day 3   p2 - securityDay 3   p2 - security
Day 3 p2 - security
 
Day 3 p2 - security
Day 3   p2 - securityDay 3   p2 - security
Day 3 p2 - security
 
Piet Demeester - Future Internet
Piet Demeester - Future InternetPiet Demeester - Future Internet
Piet Demeester - Future Internet
 
Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementMicrosoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT Management
 
Cloud Computing: da curiosidade para casos reais
Cloud Computing: da curiosidade para casos reaisCloud Computing: da curiosidade para casos reais
Cloud Computing: da curiosidade para casos reais
 
The Stuxnet Worm creation process
The Stuxnet Worm creation processThe Stuxnet Worm creation process
The Stuxnet Worm creation process
 
Enabling High Level Application Development In The Internet Of Things
Enabling High Level Application Development In The Internet Of ThingsEnabling High Level Application Development In The Internet Of Things
Enabling High Level Application Development In The Internet Of Things
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Telecom trends 261112
Telecom trends 261112Telecom trends 261112
Telecom trends 261112
 
Grid computing [2005]
Grid computing [2005]Grid computing [2005]
Grid computing [2005]
 
Ubiquitous Computing and Context-Aware Services
Ubiquitous Computing and Context-Aware ServicesUbiquitous Computing and Context-Aware Services
Ubiquitous Computing and Context-Aware Services
 
Autonomic computer
Autonomic computerAutonomic computer
Autonomic computer
 
Autonomic computer
Autonomic computerAutonomic computer
Autonomic computer
 
Digital Pen En 2008
Digital Pen En 2008Digital Pen En 2008
Digital Pen En 2008
 
Cloud Computing: da curiosidade para casos reais
Cloud Computing: da curiosidade para casos reaisCloud Computing: da curiosidade para casos reais
Cloud Computing: da curiosidade para casos reais
 

More from Phearin Sok

A Mobile Service Architecture for Improving Availability and Continuity
A Mobile Service Architecture for Improving Availability and ContinuityA Mobile Service Architecture for Improving Availability and Continuity
A Mobile Service Architecture for Improving Availability and ContinuityPhearin Sok
 
Locator ID Separation Using Device Unique ID
Locator ID Separation Using Device Unique IDLocator ID Separation Using Device Unique ID
Locator ID Separation Using Device Unique IDPhearin Sok
 
Mobility Management in HIMALIS Architecture
Mobility Management in HIMALIS ArchitectureMobility Management in HIMALIS Architecture
Mobility Management in HIMALIS ArchitecturePhearin Sok
 
DPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant NetworkDPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant NetworkPhearin Sok
 
Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparisonPhearin Sok
 
Desktop to Cloud Transformation Planning
Desktop to Cloud Transformation PlanningDesktop to Cloud Transformation Planning
Desktop to Cloud Transformation PlanningPhearin Sok
 
Content centric networking
Content centric networkingContent centric networking
Content centric networkingPhearin Sok
 

More from Phearin Sok (9)

A Mobile Service Architecture for Improving Availability and Continuity
A Mobile Service Architecture for Improving Availability and ContinuityA Mobile Service Architecture for Improving Availability and Continuity
A Mobile Service Architecture for Improving Availability and Continuity
 
N Screen
N ScreenN Screen
N Screen
 
Locator ID Separation Using Device Unique ID
Locator ID Separation Using Device Unique IDLocator ID Separation Using Device Unique ID
Locator ID Separation Using Device Unique ID
 
Mobility Management in HIMALIS Architecture
Mobility Management in HIMALIS ArchitectureMobility Management in HIMALIS Architecture
Mobility Management in HIMALIS Architecture
 
DPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant NetworkDPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant Network
 
Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparison
 
UNICEF
UNICEFUNICEF
UNICEF
 
Desktop to Cloud Transformation Planning
Desktop to Cloud Transformation PlanningDesktop to Cloud Transformation Planning
Desktop to Cloud Transformation Planning
 
Content centric networking
Content centric networkingContent centric networking
Content centric networking
 

Recently uploaded

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 

Recently uploaded (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Pervasive computing and its Security Issues

  • 1. SOK Phearin Department of Computer Science MBC Lab., Konkuk University 1
  • 2. Outline I. Overview of Pervasive Computing II. Architecture III. Wireless Communication Technologies in Pervasive Computing and Security Issues IV. Wireless Vulnerabilities V. Conclusion 2
  • 3. Pervasive Computing Overview “Ubiquitous computing names the third wave in computing, just now beginning. First were mainframes, each shared by lots of people. Now we are in the personal computing era, person and machine staring uneasily at each other across the desktop. Next comes ubiquitous computing, or the age of calm technology, when technology recedes into the background of our lives.” “The Computer for the 21st Century” - September, 1991 Mark D. Weiser (July 23, 1952 – April 27, 1999)3
  • 4. Pervasive Computing Overview Development of computing technologies:  1st wave : Mainframe computing era  2nd wave : Personal computing era  3rd wave : Pervasive computing era (initially called ubiquitous computing) 4
  • 5. What is Pervasive Computing  Integration of Information and Communications Technology (ICT) into people’s lives and environments, made possible by the growing availability of microprocessors with inbuilt communication facilities.  Goals:  People Oriented  Implicitly use of computers  People will focus on task, not tool 5
  • 6. Pervasive Computing Components Three converging areas of ICT components:  Computing devices: communicate with each other and act intelligently  Sensors: input devices  Processors: interpret and analyze data  Actuators: output devices  Communications: serve pervasive computing applications Ex. Zigbee, Bluetooth, WiFi, Wimax /LTE /3G /4G …  User Interfaces: point of contact between ICT and human  Active: Users overtly control PC technologies and devices  Passive: PC covertly control in the background  Coercive: both Active and Passive 6
  • 7. Architecture Application Middleware and Security Interface Various applications such as Smart Room, Intelligent Intelligent Computing Mobile Computing Navigation… can be built and Context-Aware used Affective Computing Embedded Operating System Hardware 7
  • 8. Architecture Application Not only: Middleware and Security Interface  Heterogeneity  Scalability Intelligent Computing Mobile Computing  Programming interface Context-Aware But also: Affective Computing  Service Discovery  Context-aware Embedded Operating System Hardware 8
  • 9. Architecture Structure of Middleware and Security Interface API Context-aware service Service Description Extend Module …… Security Mechanism 9
  • 10. Architecture Application Middleware and Security Interface An important aspect of the Intelligent Computing Mobile Computing difference between pervasive computing and desktop Context-Aware computing Affective Computing Embedded Operating System Hardware 10
  • 11. Architecture Mobile Computing: •Automatic configuration, dynamic addressing and tracking system •Free switch between heterogeneous networks Affective Computing is the computing that relates to, arises from, or deliberately influences emotions. – Rosalind W. Picard •computer science, sensor technology, psychology, physiology •Key technologies: face recognitions, emotional signal measurements and analysis Context-aware Computing: senses environment context and human context changes. Key technologies: Location awareness, activities recognition 11
  • 12. Architecture Application Hardware: Middleware and Security Interface  Fast processing speed  Small size Intelligent Computing Mobile Computing Context-Aware Embedded Operating System: Affective Computing  Real-time services  Rational allocation Embedded Operating System memories Hardware 12
  • 13. Architecture Structure of Embedded Operating System and Hardware Network Sensors I/O Device Interface Real-time Embedded Operating System Pervasive Computing Hardware 13
  • 14. Wireless Communication Many existing and emerging wireless technologies serve in Pervasive Computing: •Zigbee and Bluetooth - sensors and actuators - low energy consumption, short distances (up to 10 meters) •Wi-Fi - devices - middle ranges (several hundreds of meters) •Wimax /LTE /3G /4G - a home gateway to Internet - long ranges (several to tens of kilometres) 14
  • 15. Security Issues Common vulnerabilities existing in wireless technologies:  Physical jamming  Passive eavesdropping and traffic analysis  Message injection and active eavesdropping  Message deletion and interception  Insider attacks to breach data confidentiality  Denial of service (DoS) attacks 15
  • 16. Security Issues Various types of Attack to a Pervasive Computing can:  Compromise users’ data,  Crash an entire system  Render services unavailable  Potentially lead to the loss of property  Harm users and even lives 16
  • 17. Wireless Vulnerabilities Wi-Fi MAC Protocol Attacks  Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)  DoS attack: Clear Channel Assessment-Jamming  Virtual carrier sense  DoS attack: Repeat forged RTS/CTS messages with large NAV leading network slowdown 17
  • 18. Wireless Vulnerabilities  802.11 state machine  DoS attack: forge deauthentication or disassociation frames 18
  • 20. Wireless Vulnerabilities Wi-Fi Security Protocol Attacks Pre-Robust Security Network Association (Pre-RSNA): security mechanisms in the IEEE 802.11-1997  Attacks on Wired Equivalent Privacy(WEP):  Shared Key management – key can be easily obtained from the attackers  Weak RC4 encryption implementation – key can be easily broken by the brute force attack 20
  • 21. Wireless Vulnerabilities Robust Security Network Association (RSNA): security mechanisms in the IEEE 802.11-2007, consisting of 3 security algorithms: Data confidentiality and integrity protocols RSNA security association management key management procedures 21
  • 22. Wireless Vulnerabilities Attacks on RSNA •Security level rollback attack: “Pre-RSNA only” beacons to force the network to use WEP •EAP attack: forged association requests - disconnect legitimate users. •Four-way handshake DoS attack: forged first unauthenticated message - parallel incomplete Handshakes - exhaust queue space 22
  • 23. Wireless Vulnerabilities Attacks on RSNA (Cont.) •RSN IE poisoning: fake beacons - fail at stage 3 •Reflection attack against four-way handshake: transmitted data sent back to originator . •Dos attack against TKIP: intercepted and modified packet - AP and the client suspend their communication 23
  • 24. Conclusion  Confidentiality, Integrity, and Availability (CIA) are essential to pervasive computing applications since sensitive and real-time information may flow over any type of wireless links  Many challenges and attacks have been proved. Each operation and policy should be carefully examined against any possible attacks. 24
  • 25. Reference  Liu, Y. & Li, F., PCA: A Reference Architecture for Pervasive Computing, 2006 1 st International Symposium on Pervasive Computing and Applications, IEEE 04079121  Zhou, B, Marshall, A. & Lee, T. H., Wireless Security Issues in pervasive computing, 2010 Fourth International Conference on Genetic and Evolutionary Computing, IEEE 05715481  2006, Pervasive Computing, Parliamentary Office of Science and Technology 25
  • 26. 26

Editor's Notes

  1. First Wave - Mainframe computing: one computer shared by many people, via workstations.Second Wave - Personal computing: one computer used by one person, requiring a conscious interaction. Users largely bound to desktop.Third Wave – Pervasive (initially called ubiquitous) computing: one person, many computers. Millions of computers embedded in the environment, allowing technology to recede into the background.
  2. Integrate between people’s lives and env. and make it available for the growth in number of microprocessors connected together using inbuilt (originally equipped with) communication technology such as wire or wireless technology and Internet.Goal of pervasive computing is the realization of computing people-oriented and ubiquitous, making the computer disappear from the eyes of the people, and people can't feel the presence of computer , so that people can only focus on the task rather than the tool - computer itself
  3. actuators: output devices that respond to processed information by altering the environment via electronic or mechanical means. Zigbee and Bluetooth can be used to connect sensors and actuators with low energy consumption in short distances (up to 10 meters)Wi-Fi can be used to connect devices in middle ranges (several hundreds of meters);Wimax /LTE /3G /4G can be used to connect a home gateway to Internet in long ranges (several to tens of kilometres)
  4. The function of services discovery is the faculty of middleware dynamic finding service. Once middleware found on service, it will start banding services and the corresponding procedures. It enables devices and services to properly discover, configure, and communicate with each other
  5. Context-aware computing : For example: a context aware mobile phone may know that it is currently in the meeting room, and that the user has sat down. The phone may conclude that the user is currently in a meeting and reject any unimportant calls. - location awareness and activity recognition
  6. Physical jamming: an adversary generates strong noises to prevent legitimate communications
  7. EAP : Extensible Authentication Protocolsupports multiple authentication methods, such as token cards, one-time passwords, certificates, public key authentication and smart cards. IEEE 802.1x specifies how EAP should be encapsulated in LAN frames.
  8. temporal key identity protocol (TKIP)When TKIP is used, a 20-bit message integrity check (MIC) is computed. Theoretically, it takes 2 minutes to crack MIC by brute force at 11 Mbps data rate. A countermeasure against this vulnerability is implemented with the temporal key identity protocol (TKIP): If two MIC failures are logged within one minute, communications are suspended for 60 seconds (this makes the brute force crack take 6 months). However, an attacker can attack against this countermeasure by intercepting a packet, modifying it so as to make the receiving station unable to calculate the correct MIC, and sending it again and again. This will make the AP and the client suspend their communication.
  9. ARP:Address Resolution Protocol