SOK Phearin Department of Computer Science MBC Lab., Konkuk University
SOK Phearin Department of Computer Science MBC Lab., Konkuk University
1
Outline
I. Overview of Pervasive Computing
II. Architecture
V. Conclusion
2
Pervasive Computing Overview
“Ubiquitous computing names the third wave in computing, just
now beginning. First were mainframes, each shared by lots of
people. Now we are in the personal computing era, person and
machine staring uneasily at each other across the desktop. Next
comes ubiquitous computing, or the age of calm
technology, when technology recedes into the background of our
lives.”
4
What is Pervasive Computing
Integration of Information and Communications
Technology (ICT) into people’s lives and
environments, made possible by the growing availability
of microprocessors with inbuilt communication
facilities.
Goals:
People Oriented
Implicitly use of computers
People will focus on task, not tool
5
Pervasive Computing Components
Three converging areas of ICT components:
Computing devices: communicate with each other and
act intelligently
Sensors: input devices
Processors: interpret and analyze data
Actuators: output devices
6
Architecture
Application
Mobile Computing
Navigation… can be built and
Context-Aware used
Affective Computing
Hardware
7
Architecture
Application Not only:
Middleware and Security Interface Heterogeneity
Scalability
Intelligent Computing
Context-Aware
But also:
Affective Computing Service Discovery
Context-aware
Hardware
8
Architecture
Structure of Middleware and Security Interface
API
Context-aware
service
Service Description
Extend Module
……
Security Mechanism
9
Architecture
Application
Affective Computing
Hardware
10
Architecture
Mobile Computing:
•Automatic configuration, dynamic addressing and tracking system
•Free switch between heterogeneous networks
Affective Computing is the computing that relates to, arises
from, or deliberately influences emotions.
– Rosalind W. Picard
•computer science, sensor technology, psychology, physiology
•Key technologies: face recognitions, emotional signal
measurements and analysis
Mobile Computing
12
Architecture
Structure of Embedded Operating System and Hardware
Network
Sensors I/O Device
Interface
13
Wireless Communication
Many existing and emerging wireless technologies
serve in Pervasive Computing:
14
Security Issues
Common vulnerabilities existing in wireless technologies:
Physical jamming
15
Security Issues
Various types of Attack to a Pervasive Computing can:
16
Wireless Vulnerabilities
Wi-Fi MAC Protocol Attacks
(CSMA/CA)
DoS attack: Clear Channel Assessment-Jamming
17
Wireless Vulnerabilities
802.11 state machine
18
Wireless Vulnerabilities
Wi-Fi Security Protocol Attacks
19
Wireless Vulnerabilities
Wi-Fi Security Protocol Attacks
20
Wireless Vulnerabilities
21
Wireless Vulnerabilities
Attacks on RSNA
•Security level rollback attack: “Pre-RSNA only” beacons to force
the network to use WEP
22
Wireless Vulnerabilities
Attacks on RSNA (Cont.)
•RSN IE poisoning: fake beacons - fail at stage 3
23
Conclusion
Confidentiality, Integrity, and Availability (CIA) are
essential to pervasive computing applications since
sensitive and real-time information may flow over any type
of wireless links
24
Reference
Liu, Y. & Li, F., PCA: A Reference Architecture for Pervasive Computing, 2006 1 st
International Symposium on Pervasive Computing and Applications, IEEE
04079121
25
26