190 likes | 345 Views
UBICOMP2002 W7: Security in Ubiquitous Computing. Context-Aware & Yet Another service. Hiromitsu Kato hkato@sdl.hitachi.co.jp Systems Development Lab. Hitachi, Ltd. Contents. Our Future Vision Super Distribution and Coordination System concept, AYA
E N D
UBICOMP2002 W7: Security in Ubiquitous Computing Context-Aware & Yet Another service Hiromitsu Kato hkato@sdl.hitachi.co.jp Systems Development Lab. Hitachi, Ltd.
Contents • Our Future Vision • Super Distribution and Coordination • System concept, AYA • Autonomous networking idea over Super Distributed Objects • Town Management Application • Security Issues • Agility and Fragility • Direct access • Our attempts • Secure Tele-operation Protocol • Ongoing works • Demo video
Contents • Our Future Vision • Super Distribution and Coordination • System concept, AYA • Autonomous networking idea over Super Distributed Objects • Town Management Application • Security Issues • Agility and Fragility • Direct access • Our attempts • Secure Tele-operation Protocol • Ongoing works • Demo video
Future Vision • Super Distributed Intelligence • Ubiquitous Networking Home/Office -Borderless operation: Appliances accessible from everywhere -Cooperative energy saving: Appliances autonomously work together for peak power shift Industry -Virtual line: Line organization according to individual product -Channel Assembly: Product customization in logistics -Recycling: Classification based on specification and used history e-Life(Human Body) -Wearable Tools: Digital fabrics, computer ring, and other information tools receive various services such as safety, entertainment, business, etc. -Silicon Surgeons: Robots travel through body and monitor the health problem. Transportation -Smart ways: Roads memorizing accidents and advising safety drive -Smart cars: Cars cooperatively driving with each other to reduce accidents and improve traffic speed and density
Paradigm Shift • From “Resource-Centric” to “User-Centric” Past Super Distribution I like… Resource Please give me… Java -Context-aware -Resource distributed -Logic-aware -Resource centered Are the clients satisfied? Servants for human and society.
Contents • Our Future Vision • Super Distribution and Collaboration • Basic concept, AYA • Autonomous networking idea over Super Distributed Objects • Town Management Application • Security Issues • Agility and Fragility • Direct Access • Our attempts • Secure Tele-operation Protocol • Ongoing works • Demo video
Basic Concept • AYA: context-Aware & Yet Another service • 綾(AYA): A twill weave, a fabric with a twill weave • Towards the woven and twilled intelligence system • The warp = Connection between Information and physical presence • The woof = Link between physical presences [Nishijin brocade]
Target Application • Town Management Support System • Goal: • Area value augmentation • Creating a real-world portal site attracting many people to come, by using IT • Requirements • Service is highly situation-dependent • Various users, events, timing, devices, … • Service consistency support • …and more…
Contents • Our Future Vision • Super Distribution and Collaboration • Basic concept, AYA • Autonomous networking idea over Super Distributed Objects • Town Management Application • Security Issues • Agility and Fragility • Direct access • Our attempts • Secure Tele-operation Protocol • Ongoing works • Demo video
Security Issue (1) • Easy come, easy go • Flexibility is likely to lead to fragility • The malicious user would easily realize the DoS (Denial of Service) attack. • Even the normal users could interrupt the service for another person.
Security Issue (2) • Ubiquitous direct access • The firewall cannot always be a premise in the ubicomp environment. • Self-protection is needed. But, how?
Contents • Our Future Vision • Super Distribution and Collaboration • Basic concept, AYA • Autonomous networking idea over Super Distributed Objects • Town Management Application • Security Issues • Agility and Fragility • Direct Access • Our attempts • Secure Tele-operation Protocol • Ongoing works • Demo video
Our first idea • Operation-Privilege (O.P.) Management • Remote Controller (RC) Metaphor • Device access is allowed after acquiring the RC. • Malicious access can be stopped by taking away the RC.
Secure Tele-operation Protocol • Three-tier model approach • The secure procedure is arranged as the STP spec. External system Internal system STP server P Remote Operator’s Terminal Operation target O.P. OHA UHA OHA UHA Operation target Remote Operator’s Terminal (User-Hosting Agent) (Object-Hosting Agent) Requester Mediator Provider
Ongoing works • Three-tier model is a firewall approach. Not suitable for ubiquitous direct access environment. • Some ongoing works • Embedded STP • Each active device would have the STP server functions for self-protection. • Adapter dispatch approach • O.P. mgt. with secure manager and adapter dispatch • Privacy policy handling • O.P. transfer vs. Privacy transfer
Sample Application Scenario • Smart Town Navigation Demo [Video] Station Home/Office Theater Shopping Mall
Standardization Activity • SDO SIG is organized in OMG • SDO = Super Distributed Objects • Members: U. of Tokyo, Hitachi SDL, FhG/FOCUS, UC Irvine/NTT, … • RFP had issued in Feb 2002 • “PIM and PSM for SDO” • For the unified management model for devices and related software agents • First submission in Oct 2002 • From tomorrow(!), it will be discussed in Helsinki…
Summary • Vision: Super Distributed World • AYA: Enabling the surrounding embedded systems to support for human life flexibly • Security issues • Fragility problem about ad-hoc systems • Ubiquitous direct access • … • Our trials • OP Mgt., STP, Adapter dispatch, Privacy, ...
Thank you Q&A: I appreciate if you would speak slowly.