SlideShare a Scribd company logo
1 of 17
Download to read offline
Secure context-awareness
in ubiquitous computing
Ville Seppänen
ville.t.seppanen@tut.fi
TLT-2656 Special Course on Networking
Contents
• Research paper overview
– Suomalainen, J., Hyttinen, P., & Tarvainen, P. (2010).
Secure information sharing between heterogeneous
embedded devices. Proceedings of the Fourth
European Conference on Software Architecture
Companion Volume - ECSA ’10
• Application design project
– Context information from mobile device hardware
20.12.2012TLT-2656 Assignment 2
SMART SPACE SECURITY
Research Paper overview: “Secure information sharing
between heterogeneous embedded devices”
20.12.2012TLT-2656 Assignment 3
Challenge in smart spaces
• One of the key challenges is security
• Heterogenous devices use various security
measures
– How to ensure sufficient security will be maintained
when giving away information?
– Constrained devices cannot make complex
encryption/decryption
• Mobile devices move between environments
– How to ensure that devices can communicate in
different environments?
20.12.2012TLT-2656 Assignment 4
Their proposed solution
• Novel security architecture that guarantees
secure information sharing between devices
without a directly compatible security
mechanism
– Features controlling and monitoring confidentiality,
integrity, authenticity and access control
• Security profiles for measuring and mapping
security level of connections
20.12.2012TLT-2656 Assignment 5
Smart space security
architecture
20.12.2012TLT-2656 Assignment 6
Source:Suomalainen,J.,Hyttinen,P.,&Tarvainen,P.(2010).Secureinformation
sharingbetweenheterogeneousembeddeddevices.ProceedingsoftheFourth
EuropeanConferenceonSoftwareArchitectureCompanionVolume-ECSA’10
Architecture
• The architecture is an extension of Smart-M3
architecture
• RDF Information Base Solution (RIBS) is a
SIB based on Smart-M3 implementation
• Security administrators (and monitors) have
been added
– KPs authenticate with credentials (given when first
joining smart space) to access information
– Desired security level stated in policy directive is
enforced by the security components
20.12.2012TLT-2656 Assignment 7
Authorization elements
21.12.2012TLT-2656 Assignment 8
Source: Suomalainen, J., Hyttinen, P., & Tarvainen, P. (2010). Secure information sharing between heterogeneous embedded devices.
Proceedings of the Fourth European Conference on Software Architecture Companion Volume - ECSA ’10
Access control
• Access control is done by restricting access to
certain information to a certain security level
– Security level does not imply specific technologies
• Virtual Smart Spaces can be created for
private space containers
21.12.2012TLT-2656 Assignment 9
Key points
• Not all devices support all security mechanisms,
but in smart spaces, devices should be able to
communicate securely
– Sufficient security level is more important than
the use of specific technologies
• Administrator of security configurations is
usually non-expert
– Security levels must be simple but powerful
enough
20.12.2012TLT-2656 Assignment 10
APPLICATION DESIGN
Smart-M3 Application Design Project
20.12.2012TLT-2656 Assignment 11
Scenario
• Adapting mobile application and device behavior to
context
– Network optimization based on battery power
• Context information can be received from many
devices and context information created on the mobile
device can be sent to others
• Each KP gathers relevant context and makes
decisions based on it
• Higher-level behavioral context can be reasoned from
low-level technical context
– User is sleeping vs. low movement and light sensor values…
20.12.2012TLT-2656 Assignment 12
Application layout
• Focus on mobile devices (Linux, Android, Qt/Maemo)
– Device platform (OS) has its own producer KP,
publishing context information
– Each application can have their own consumer KP,
subscribing to context information and reasoning with it
• Users affect the environment of the device which
causes applications to adapt to the context
• Focus on primary-phone-centric smart space where
mostly a single user has only one device most of the
time
20.12.2012TLT-2656 Assignment 13
Architecture
21.12.2012TLT-2656 Assignment 14
Ontology
21.12.2012TLT-2656 Assignment 15
Ontology
• Ontology enables application and device
vendors to share (and understand)
information, even to other devices and SIBs
• Ontology can be expanded to have more
abstract, higher-level properties and classes
reasoned from lower-level ones
20.12.2012TLT-2656 Assignment 16
Knowledge Processor design
• Mobile device KP
– Context information from QtMobility, Linux file system
/proc or D-Bus on Nokia N900
– Publishes information to SIB on a Linux PC
• Mobile application KP
– Retrieves information from SIB
– Adapts behavior (e.g. sync rate of information to a
cloud service) based on information and simple user-
specified rules
20.12.2012TLT-2656 Assignment 17

More Related Content

What's hot

Internet of Things Reference Architectures
Internet of Things Reference ArchitecturesInternet of Things Reference Architectures
Internet of Things Reference ArchitecturesSofoklisEfremidisAIT
 
Chariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_InfosecgirlsChariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_InfosecgirlsVandana Verma
 
Blockchain for Manufacturing Sector
Blockchain for Manufacturing SectorBlockchain for Manufacturing Sector
Blockchain for Manufacturing SectorSuradhaIyer
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Ulf Mattsson
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security ElementsEurotech
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT SecurityCAS
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT SystemsSecurity Innovation
 
Innovating with IoT: A Toolkit Approach
Innovating with IoT: A Toolkit ApproachInnovating with IoT: A Toolkit Approach
Innovating with IoT: A Toolkit ApproachAtanu Roy Chowdhury
 
Iot security amar prusty
Iot security amar prustyIot security amar prusty
Iot security amar prustyamarprusty
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIntel® Software
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoTVishnupriya T H
 
Edcon - Hardware wallets and smart contracts
Edcon -  Hardware wallets and smart contractsEdcon -  Hardware wallets and smart contracts
Edcon - Hardware wallets and smart contractsEric Larcheveque
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Ravindra Dastikop
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITYThe Avi Sharma
 
Addressing the Challenges of IoT Design
Addressing the Challenges of IoT DesignAddressing the Challenges of IoT Design
Addressing the Challenges of IoT DesignMentor Graphics
 

What's hot (20)

Internet of Things Reference Architectures
Internet of Things Reference ArchitecturesInternet of Things Reference Architectures
Internet of Things Reference Architectures
 
Challenges of the io t v1
Challenges of the io t v1Challenges of the io t v1
Challenges of the io t v1
 
Chariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_InfosecgirlsChariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_Infosecgirls
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
Blockchain for Manufacturing Sector
Blockchain for Manufacturing SectorBlockchain for Manufacturing Sector
Blockchain for Manufacturing Sector
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
Innovating with IoT: A Toolkit Approach
Innovating with IoT: A Toolkit ApproachInnovating with IoT: A Toolkit Approach
Innovating with IoT: A Toolkit Approach
 
Iot security amar prusty
Iot security amar prustyIot security amar prusty
Iot security amar prusty
 
IoT Security Challenges
IoT Security ChallengesIoT Security Challenges
IoT Security Challenges
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
Emerging Technologies
Emerging TechnologiesEmerging Technologies
Emerging Technologies
 
Introduction to IoT
Introduction to IoTIntroduction to IoT
Introduction to IoT
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
 
Edcon - Hardware wallets and smart contracts
Edcon -  Hardware wallets and smart contractsEdcon -  Hardware wallets and smart contracts
Edcon - Hardware wallets and smart contracts
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 
Addressing the Challenges of IoT Design
Addressing the Challenges of IoT DesignAddressing the Challenges of IoT Design
Addressing the Challenges of IoT Design
 

Viewers also liked

Parse: A Mobile Backend as a Service (MBaaS)
Parse: A Mobile Backend as a Service (MBaaS)Parse: A Mobile Backend as a Service (MBaaS)
Parse: A Mobile Backend as a Service (MBaaS)Ville Seppänen
 
Capturing policies for fine-grained access control on mobile devices
Capturing policies for fine-grained access control on mobile devicesCapturing policies for fine-grained access control on mobile devices
Capturing policies for fine-grained access control on mobile devicesPrajit Kumar Das
 
SecureDroid: An Android Security Framework Extension for Context-Aware policy...
SecureDroid: An Android Security Framework Extension for Context-Aware policy...SecureDroid: An Android Security Framework Extension for Context-Aware policy...
SecureDroid: An Android Security Framework Extension for Context-Aware policy...Giuseppe La Torre
 
Context-Aware Access Control and Presentation of Linked Data
Context-Aware Access Control and Presentation of Linked DataContext-Aware Access Control and Presentation of Linked Data
Context-Aware Access Control and Presentation of Linked DataLuca Costabello
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control PresentationWajahat Rajab
 
งานคู่
งานคู่งานคู่
งานคู่naleesaetor
 
Fusion homes noida
Fusion homes noidaFusion homes noida
Fusion homes noidaDhra Sharma
 
Catálogo de-productos-fashion-woman-s.a
Catálogo de-productos-fashion-woman-s.aCatálogo de-productos-fashion-woman-s.a
Catálogo de-productos-fashion-woman-s.aJezee Llanque
 
Graphic history of architecture
Graphic history of architectureGraphic history of architecture
Graphic history of architecturearchinn
 
Ulcerative colitis... prepared and Presented by Tarif Younas Mughal
Ulcerative colitis... prepared and Presented by Tarif Younas MughalUlcerative colitis... prepared and Presented by Tarif Younas Mughal
Ulcerative colitis... prepared and Presented by Tarif Younas MughalTarif Mughal
 
chuyên thiết kế tvc quảng cáo độc đáo
chuyên thiết kế tvc quảng cáo độc đáochuyên thiết kế tvc quảng cáo độc đáo
chuyên thiết kế tvc quảng cáo độc đáodeonna317
 
Legal compliance officer performance appraisal
Legal compliance officer performance appraisalLegal compliance officer performance appraisal
Legal compliance officer performance appraisalhernandezjoshua395
 

Viewers also liked (16)

Parse: A Mobile Backend as a Service (MBaaS)
Parse: A Mobile Backend as a Service (MBaaS)Parse: A Mobile Backend as a Service (MBaaS)
Parse: A Mobile Backend as a Service (MBaaS)
 
Capturing policies for fine-grained access control on mobile devices
Capturing policies for fine-grained access control on mobile devicesCapturing policies for fine-grained access control on mobile devices
Capturing policies for fine-grained access control on mobile devices
 
SecureDroid: An Android Security Framework Extension for Context-Aware policy...
SecureDroid: An Android Security Framework Extension for Context-Aware policy...SecureDroid: An Android Security Framework Extension for Context-Aware policy...
SecureDroid: An Android Security Framework Extension for Context-Aware policy...
 
Context-Aware Access Control and Presentation of Linked Data
Context-Aware Access Control and Presentation of Linked DataContext-Aware Access Control and Presentation of Linked Data
Context-Aware Access Control and Presentation of Linked Data
 
Android security
Android securityAndroid security
Android security
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
งานคู่
งานคู่งานคู่
งานคู่
 
Ensayos geotecnia
Ensayos geotecniaEnsayos geotecnia
Ensayos geotecnia
 
Fusion homes noida
Fusion homes noidaFusion homes noida
Fusion homes noida
 
RoadPiece_Freshman
RoadPiece_FreshmanRoadPiece_Freshman
RoadPiece_Freshman
 
Module 1
Module 1Module 1
Module 1
 
Catálogo de-productos-fashion-woman-s.a
Catálogo de-productos-fashion-woman-s.aCatálogo de-productos-fashion-woman-s.a
Catálogo de-productos-fashion-woman-s.a
 
Graphic history of architecture
Graphic history of architectureGraphic history of architecture
Graphic history of architecture
 
Ulcerative colitis... prepared and Presented by Tarif Younas Mughal
Ulcerative colitis... prepared and Presented by Tarif Younas MughalUlcerative colitis... prepared and Presented by Tarif Younas Mughal
Ulcerative colitis... prepared and Presented by Tarif Younas Mughal
 
chuyên thiết kế tvc quảng cáo độc đáo
chuyên thiết kế tvc quảng cáo độc đáochuyên thiết kế tvc quảng cáo độc đáo
chuyên thiết kế tvc quảng cáo độc đáo
 
Legal compliance officer performance appraisal
Legal compliance officer performance appraisalLegal compliance officer performance appraisal
Legal compliance officer performance appraisal
 

Similar to Secure context-awareness in ubiquitous computing

AccML, co-located with HiPEAC 2021_Pedro Trancoso presentation
AccML, co-located with HiPEAC 2021_Pedro Trancoso presentationAccML, co-located with HiPEAC 2021_Pedro Trancoso presentation
AccML, co-located with HiPEAC 2021_Pedro Trancoso presentationVEDLIoT Project
 
connecting smart object in IoT.pptx
connecting smart object in IoT.pptxconnecting smart object in IoT.pptx
connecting smart object in IoT.pptxAnisZahirahAzman
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...IJCSIS Research Publications
 
Future Intelligence Fusepool End User presentation Harris Moysadis
Future Intelligence Fusepool End User presentation Harris MoysadisFuture Intelligence Fusepool End User presentation Harris Moysadis
Future Intelligence Fusepool End User presentation Harris MoysadisFusepool SME project
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaCodeOps Technologies LLP
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdfRupesh930637
 
OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...
OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...
OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...Pôle Systematic Paris-Region
 
factsheet_4g_critical_comm_en_vl
factsheet_4g_critical_comm_en_vlfactsheet_4g_critical_comm_en_vl
factsheet_4g_critical_comm_en_vlSylvain Maret
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Dalton Valadares
 
IoT architecture.pptx
IoT architecture.pptxIoT architecture.pptx
IoT architecture.pptxHammadArif32
 
15CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 315CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 3Syed Mustafa
 
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...Lillie Coney
 
Intel Gateway Solutions for the Internet of Things
Intel Gateway Solutions for the Internet of ThingsIntel Gateway Solutions for the Internet of Things
Intel Gateway Solutions for the Internet of ThingsIntel IoT
 
Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS ) Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS ) GICTTraining
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
 
An IOT Based Low Power Health Monitoring with Active Personal Assistance
An IOT Based Low Power Health Monitoring with Active Personal AssistanceAn IOT Based Low Power Health Monitoring with Active Personal Assistance
An IOT Based Low Power Health Monitoring with Active Personal Assistanceijtsrd
 

Similar to Secure context-awareness in ubiquitous computing (20)

AccML, co-located with HiPEAC 2021_Pedro Trancoso presentation
AccML, co-located with HiPEAC 2021_Pedro Trancoso presentationAccML, co-located with HiPEAC 2021_Pedro Trancoso presentation
AccML, co-located with HiPEAC 2021_Pedro Trancoso presentation
 
connecting smart object in IoT.pptx
connecting smart object in IoT.pptxconnecting smart object in IoT.pptx
connecting smart object in IoT.pptx
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
 
Future Intelligence Fusepool End User presentation Harris Moysadis
Future Intelligence Fusepool End User presentation Harris MoysadisFuture Intelligence Fusepool End User presentation Harris Moysadis
Future Intelligence Fusepool End User presentation Harris Moysadis
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
 
OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...
OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...
OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...
 
factsheet_4g_critical_comm_en_vl
factsheet_4g_critical_comm_en_vlfactsheet_4g_critical_comm_en_vl
factsheet_4g_critical_comm_en_vl
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
 
INTERNSHIP PPT JP.pptx
INTERNSHIP PPT JP.pptxINTERNSHIP PPT JP.pptx
INTERNSHIP PPT JP.pptx
 
IoT architecture.pptx
IoT architecture.pptxIoT architecture.pptx
IoT architecture.pptx
 
15CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 315CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 3
 
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
 
Lec2.pptx
Lec2.pptxLec2.pptx
Lec2.pptx
 
Lec2.pptx
Lec2.pptxLec2.pptx
Lec2.pptx
 
Intel Gateway Solutions for the Internet of Things
Intel Gateway Solutions for the Internet of ThingsIntel Gateway Solutions for the Internet of Things
Intel Gateway Solutions for the Internet of Things
 
FG2.ppt
FG2.pptFG2.ppt
FG2.ppt
 
Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS ) Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS )
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
 
An IOT Based Low Power Health Monitoring with Active Personal Assistance
An IOT Based Low Power Health Monitoring with Active Personal AssistanceAn IOT Based Low Power Health Monitoring with Active Personal Assistance
An IOT Based Low Power Health Monitoring with Active Personal Assistance
 

Recently uploaded

call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....ShaimaaMohamedGalal
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 

Recently uploaded (20)

call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 

Secure context-awareness in ubiquitous computing

  • 1. Secure context-awareness in ubiquitous computing Ville Seppänen ville.t.seppanen@tut.fi TLT-2656 Special Course on Networking
  • 2. Contents • Research paper overview – Suomalainen, J., Hyttinen, P., & Tarvainen, P. (2010). Secure information sharing between heterogeneous embedded devices. Proceedings of the Fourth European Conference on Software Architecture Companion Volume - ECSA ’10 • Application design project – Context information from mobile device hardware 20.12.2012TLT-2656 Assignment 2
  • 3. SMART SPACE SECURITY Research Paper overview: “Secure information sharing between heterogeneous embedded devices” 20.12.2012TLT-2656 Assignment 3
  • 4. Challenge in smart spaces • One of the key challenges is security • Heterogenous devices use various security measures – How to ensure sufficient security will be maintained when giving away information? – Constrained devices cannot make complex encryption/decryption • Mobile devices move between environments – How to ensure that devices can communicate in different environments? 20.12.2012TLT-2656 Assignment 4
  • 5. Their proposed solution • Novel security architecture that guarantees secure information sharing between devices without a directly compatible security mechanism – Features controlling and monitoring confidentiality, integrity, authenticity and access control • Security profiles for measuring and mapping security level of connections 20.12.2012TLT-2656 Assignment 5
  • 6. Smart space security architecture 20.12.2012TLT-2656 Assignment 6 Source:Suomalainen,J.,Hyttinen,P.,&Tarvainen,P.(2010).Secureinformation sharingbetweenheterogeneousembeddeddevices.ProceedingsoftheFourth EuropeanConferenceonSoftwareArchitectureCompanionVolume-ECSA’10
  • 7. Architecture • The architecture is an extension of Smart-M3 architecture • RDF Information Base Solution (RIBS) is a SIB based on Smart-M3 implementation • Security administrators (and monitors) have been added – KPs authenticate with credentials (given when first joining smart space) to access information – Desired security level stated in policy directive is enforced by the security components 20.12.2012TLT-2656 Assignment 7
  • 8. Authorization elements 21.12.2012TLT-2656 Assignment 8 Source: Suomalainen, J., Hyttinen, P., & Tarvainen, P. (2010). Secure information sharing between heterogeneous embedded devices. Proceedings of the Fourth European Conference on Software Architecture Companion Volume - ECSA ’10
  • 9. Access control • Access control is done by restricting access to certain information to a certain security level – Security level does not imply specific technologies • Virtual Smart Spaces can be created for private space containers 21.12.2012TLT-2656 Assignment 9
  • 10. Key points • Not all devices support all security mechanisms, but in smart spaces, devices should be able to communicate securely – Sufficient security level is more important than the use of specific technologies • Administrator of security configurations is usually non-expert – Security levels must be simple but powerful enough 20.12.2012TLT-2656 Assignment 10
  • 11. APPLICATION DESIGN Smart-M3 Application Design Project 20.12.2012TLT-2656 Assignment 11
  • 12. Scenario • Adapting mobile application and device behavior to context – Network optimization based on battery power • Context information can be received from many devices and context information created on the mobile device can be sent to others • Each KP gathers relevant context and makes decisions based on it • Higher-level behavioral context can be reasoned from low-level technical context – User is sleeping vs. low movement and light sensor values… 20.12.2012TLT-2656 Assignment 12
  • 13. Application layout • Focus on mobile devices (Linux, Android, Qt/Maemo) – Device platform (OS) has its own producer KP, publishing context information – Each application can have their own consumer KP, subscribing to context information and reasoning with it • Users affect the environment of the device which causes applications to adapt to the context • Focus on primary-phone-centric smart space where mostly a single user has only one device most of the time 20.12.2012TLT-2656 Assignment 13
  • 16. Ontology • Ontology enables application and device vendors to share (and understand) information, even to other devices and SIBs • Ontology can be expanded to have more abstract, higher-level properties and classes reasoned from lower-level ones 20.12.2012TLT-2656 Assignment 16
  • 17. Knowledge Processor design • Mobile device KP – Context information from QtMobility, Linux file system /proc or D-Bus on Nokia N900 – Publishes information to SIB on a Linux PC • Mobile application KP – Retrieves information from SIB – Adapts behavior (e.g. sync rate of information to a cloud service) based on information and simple user- specified rules 20.12.2012TLT-2656 Assignment 17