810 likes | 1k Views
Spheres of Influence: Secure organization and coordination of diverse device communities. Kevin Eustice Ph.D. Oral Qualifying Examination UCLA Computer Science April 20 th , 2005. Statement of Purpose.
E N D
Spheres of Influence:Secure organization and coordination of diverse device communities Kevin Eustice Ph.D. Oral Qualifying Examination UCLA Computer Science April 20th, 2005
Statement of Purpose • Design and implement a device community management framework supporting ubiquitous computing scenarios. • Contributions of this work: • Generalized concept of structured device communities applied to ubiquitous computing. • Framework prototype: Spheres of Influence. • Sample applications illustrating value and generality of framework
Roadmap • Managing Ubiquitous Computing • Our approach: Spheres of Influence • Preliminary Work • Design and Implementation • Related Work • Dissertation Plan
What is ubiquitous computing? Invisible Computing Tangible Computing Context-Aware Computing Transparent Computing Pervasive Computing Smart Spaces Augmented Reality
What is ubiquitous computing? “…the third wave in computing…” —Mark Weiser “Third Paradigm computing” —Alan Kay Common elements of ubiquitous computing visions: • Large number of devices in the environment • Pervasive communications infrastructure • Interactions support human activities
Ubiquitous Computing deconstructed Interacting devices grouped by context Device Communitiesare: • Related by some common attribute • Dynamic with changing membership • Reactive responding to context changes
Thesis Approach: • Divide world into self-managed, physically and logically grouped device communities. • Manage group transitions and interactions. • Provide common interface for group interaction. Benefits: • Simplifies high-level management through encapsulation. • Community takes on responsibility for coordinating members.
Applicationsbenefiting from coordination • Mobile cluster management • At multiple levels • Policy driven applications • Ensure consistent policy across applications • Automatic proxy deployment • Multi-device applications • E.g., multimedia applications
Necessary Components • Membership Services • Secure Device Enrollment • Community Discovery • Relationship Management & Maintenance • Communication & Event Services • Secure communication channels • Interest management • Event processing and dissemination • Community-aware event semantics • Policy Engine • Application Support
Necessary Components • Membership Services • Secure Device Enrollment • Community Discovery • Relationship Management & Maintenance • Communication & Event Services • Secure communication channels • Interest management • Event processing and dissemination • Community-aware event semantics • Policy Engine • Application Support
Roadmap • Managing Ubiquitous Computing • Our approach: Spheres of Influence • Preliminary Work • Design and Implementation • Related Work • Dissertation Plan
Approach: Spheres of Influence Sphere: a networked software container representing a device or a device community. The sphere serves as an interaction nexus for a community.1 1. Eustice et al."Enabling Secure Ubiquitous Interactions," Proceedings of the First International Workshop on Middleware for Pervasive and Ad-hoc Computing (MPAC2003).
Spheres of Influenceare recursive Spheres can join with others to form larger, structured spheres • Coordinator of a sphere is the Sphere Leader Represents complex structures: • Locations • Organizations • Device Clusters
My Personal Sphere Kevin’s Personal Sphere
Location Sphere Hierarchy Boelter Hall Boelter 3rd Floor Boelter 3564 Physical Sphere Personal Sphere
Location Sphere Hierarchy 1st Floor 2nd Floor 3rd Floor 4th Floor 5th Floor 6th Floor … Floor Boelter Hall Physical Sphere Personal Sphere
Spheres of Influence Spheres serve as a scoping mechanism for: • Policy • Privilege • Event flow • Communication
Spheres of InfluenceOperational Vision • Relationships adjust with behavior • Spheres negotiate for service • Applications leverage community context to customize user experience
Sphere authenticates, negotiates for access to Ackerman Kevin Ackerman
Negotiate access to “Friends” sphere, update location, check for new relevant events. Kevin Kevin’s Friends Ackerman Accesses local services & Ackerman scoped events
LASR Boelter Hall Kevin Kevin Boelter 3564 Ackerman To receive LASR-specific services in 3564, Kevin must be able to show active membership in the LASR social sphere.
Anticipated Benefits • Community Coordination • Improved Security • Structured, Common Community Model • Vehicle for Application Innovation
Community Coordination • Group members are group-aware • Preferences and policy exposed to group • Group members can interact as peers • Structure serves to improve scalability of communities Example: Group Mobility Optimization
E C D A B Example: Mobile Tour Group Congestion Delays Tricky Configurations Other WLAN Museum Network Impact for Group of size N • Startup: 0 • Transition: N*(Associate+ DHCP+Resource Acquisition) • Maintenance: depends Drawbacks: • Consistent behavior requires multiple consistent configurations! • Hosting network is flooded at every network transition! • Congestion degrades performance of DHCP • N-times: • Acquire address (DHCP, bootp, …) • Rebind to network (VPN, mobile IP, IPsec, …) • Identify and reacquire resources (proxies, etc.) • Requires: • Devices are manually configured with consistent configurations!
E C D A B Example: Mobile Tour Sphere Congestion Delays Tricky Configurations Other WLAN Museum Network Impact for Sphere of size N • Startup: (N-1)*(Associate + DHCP + Sphere Join) • Transition: Associate + DHCP + Resource Acquisition • Maintenance: 1 (Broadcast,Multicast), N-1 (Unicast) Advantages: • Consistent behavior due to common policy • Configuration overhead spread over time • Spatial reuse possibilities • Museum sphere can provide information on underutilized frequency space Drawbacks: • Sphere Bottleneck (can be optimized) • N-times: • Acquire address (DHCP, bootp, …) • Rebind to network (VPN, mobile IP, IPsec, …) • Identify and reacquire resources (proxies, etc.) • Requires: • Devices are manually configured with consistent configurations!
Security Benefits • Security boundary • Sphere members protected from outside • Sphere join can include integrity analysis1 • Membership services • Sphere access control • Wireless enrollment mechanisms 1. K. Eustice et al. "Securing WiFi Nomads: The Case for Quarantine, Examination, and Decontamination," Proceedings of the New Security Paradigms Workshop (NSPW) 2003.
Applications Innovation • Spheres as collaboration nexus • Relationships used to customize behavior • Group as User • Semantics • Interfaces Example: Interactive Media
Example: Interactive Media Social Sphere Multimedia application, using sphere behavior as input: • Transitions • Membership • Interactions Possible applications: • Campus-wide game • LACMA tour group application Location Sphere Social Sphere
Structured Common Community Model • Multiple fidelity community membership • Shared structure scopes relevance • Simple standardized interface • Cross-community references • Diverse relations (Boelter 3564 and LASR)
Roadmap • Managing Ubiquitous Computing • Our approach: Spheres of Influence • Preliminary Work • Design and Implementation • Related Work • Dissertation Plan
QED Quarantine device upon entry into network, and authenticate. Bob Worker Worker Worker Examine device for vulnerabilities or undesirable services. Worker Decontaminate: Work with device to repair vulnerabilities! Bob’s Office
Results from QED • Evaluated in LASR testbed over 802.11b • Vulnerable machines required additional time • Variable based on package size, average file size • E.g., perl required ~91 sec. for 34 Mbyte update Fig 1. Measured overhead in each component of QED session with up-to-date machine; 99% confidence intervals. [Eustice05] K. Eustice, L. Kleinrock, M. Lukac, V. Ramakrishna and P. Reiher, “QED: Securing the Mobile Masses,” UCLA Technical Report TR-ID pending. 2005.
Roadmap • Managing Ubiquitous Computing • Our approach: Spheres of Influence • Preliminary Work • Design and Implementation • Related Work • Dissertation Plan
Major Systems Issues • Placement of Management Logic • Sphere Discovery • Relationship Management • Fault Tolerance and Reliability • Events and Event Semantics • Application Primitives
Sphere Discovery • How do I find any sphere? • Broadcast & multicast • Reference-based maps • How do I find a specific sphere? • Lookup Server • DNS-based approach
Relationship Management • Sphere Bindings • Which sphere is the right sphere for me? • Different devices will bind to different spheres • Approach • User/Application Preferences • Leverage existing relationships • Negotiation – resource/requirement matching
Events and Event Semantics • Handling dynamic membership • Queuing events for inactive members • Interest registration • Event Semantics • Scoping events • Closest spheres may be most relevant • Event Ordering
Ext. Event Iface Doorman Applications Connection to any related Spheres Int. Event Iface Sphere State Member table Access Rights Event Registration … Policy Manager Sphere Manager Spheres of InfluenceComponents • Doorman: handles external interactions • Sphere Manager: handles internal interactions • Policy Manager: mediates interactions • Applications Interface
A Sphere of Influence Node Applications Sphere Manager Sphere API Event Coordinator Policy Engine Policy Manager Discovery Module Advert. Module Join Module Connection Manager Doorman Ext. Sphere Interface External components Int. Sphere Interface Security Services Operating System Network (802.11, Bluetooth, Ethernet)
Roadmap • Managing Ubiquitous Computing • Our approach: Spheres of Influence • Preliminary Work • Design and Implementation • Related Work • Dissertation Plan
? Social Group Applications [Wang’04] Personal Cluster Management [Chetan’04] Location-based Infrastructure [Roman’01, Undercoffer’02, Al-Muhtadi’04 …] Related Work Spheresof Influence Others? Service Groups?
Related Work • Ubiquitous Computing Infrastructure • Intelligent Room/Project Oxygen, Gaia, Centaurus2, one.world • Ubiquitous Group Management • Ephemeral Social Groups, Mobile Gaia, Super Spaces • Cluster Management • Open Cluster Framework, Mobile ad hoc clustering • Content Distribution/Pub-Sub Event Distribution • SIENA, REBECA • Secure Enrollment and Network Configuration • Resurrecting Duckling, Network-in-a-Box
Roadmap • Managing Ubiquitous Computing • Our approach: Spheres of Influence • Preliminary Work • Design and Implementation • Related Work • Dissertation Plan
Planned Activities • Complete Implementation • Measure of Utility • Evaluation • Measure of Applicability
Complete Implementation • The Spheres of Influence prototype will be completed as detailed in the prospectus. • Iterative development model for fast feedback. • Implementation will be made publicly available via Sourceforge.
Measure of Utility Implementation and demonstration of two sample applications • A “coordinate and optimize” application • An application to show novelty, using community transitions and interactions as application input
System Evaluation • Framework Overhead • Application Performance • Methodology • Basic overhead measurements will be gathered in LASR testbed • Application results will also be gathered and analyzed
Measure of Applicability My assumption: devices will interact in different types of organized groups. • Provide a model to characterize ubiquitous applications in terms of group interactions. • Analysis of common applications.
Examples • Community Geo-annotation • mapping of social sphere[s] onto location spheres • Friend-finder • mapping of location sphere[s] onto social spheres • Access-control applications • mapping of social spheres onto physical spheres • Location-aware Wireless Device Configuration • mapping of physical spheres from location sphere onto elemental device spheres
Implementation Status Completed: • Communications framework • Sphere join protocol • Event registration and processing • Network configuration modules • Reference map-based discovery