Ubiquitous Computing

Size: px
Start display at page:

Download "Ubiquitous Computing"

Transcription

1 Ubiquitous Computing Issues & Challenges Jaydip Sen Senior Scientist Wireless Research Group, Innovation Lab Tata Consultancy Services, Kolkata, INDIA

2 Outline of the Talk The Vision of UbiComp -- According to Mark Weiser The Enablers Major Challenges Security and Privacy Issues Simulation Results TCS Home Gateway Initiative Security Challenges and Solutions 2

3 The Trends in Computing Technology 1970s 1990s Late 1990s Now and Tomorrow?

4 Pervasive Computing Era

5 Computing Evolution

6 Ubiquitous Computing Mark Weiser, Xerox PARC 1988 Ubiquitous computing enhances computer use by making many computers available throughout the physical environment, but making them effectively invisible to the user 6

7 Invisible Technologies The most powerful technologies are invisible: they get out of the way to let human be effective Electricity Electric motors hidden everywhere (20-30 per car) Electric sockets in every wall and portably available through batteries Integrated, invisible infrastructure Literary technology Continuously surrounding us at many scales: books, newspapers, street signs, candy wrappers Used trivially and profoundly Literally visible, effectively invisible 7

8 A Good Technology Is Invisible Invisible stays out of the way of itself Like a good pencil stays out of the way of the writing Like a good car stays out of the way of the driving Bad technology draws attention to itself, not task Like a broken, or skipping, or dull pencil Like a car that needs a tune-up Computers are mostly not invisible They dominate interaction with them Ubiquitous computing is about invisible computers 8

9 Ubiquitous and Pervasive Computing Ubiquitous: Existing or being everywhere, or in all places at the same time; omnipresent. Pervasive: Tending to pervade, or having power to spread throughout; of a pervading quality. Pervasive is a stepping stone to ubiquity. A pervasive technology becomes ubiquitous when it is taken for granted. 9

10 Outline The Vision -- According to Mark Weiser The Enablers Major Challenges Security and Privacy Issues Conclusion 10

11 Pervasive Computing Enablers Moore s Law of IC Technologies Communication Technologies Material Technologies Sensors/Actuators

12 1st Enabler Moore s Law Processing speed and storage capacity double every 18 months cheaper, smaller, faster Exponential increase will probably go on for the next 10 years at same rate 12

13 Generalized Moore s Law Most important technology parameters double every 1 3 years: computation cycles (clock speed) memory, magnetic disks bandwidth Consequence: scaling down Problems: increasing cost energy 13

14 2nd Enabler Communication Bandwidth of single fibre: ~10 Gb/s 2007: ~20 Tb/s with wavelength multiplex (often at no cost for laying new cable!) Powerline coffee maker automatically connected to the Internet Wireless mobile phone: GSM, GPRS, 3G, 4G wireless LAN (> 10 Mb/s) Bluetooth WiMAX, LTE Personal Area Networks (PAN) - Zigbee Body Area Networks (BAN) Home Area Networks (HAN) 14

15 3rd Enabler New Materials Important : whole eras named after materials e.g., Stone age, Iron age, Pottery age etc. More recently: semiconductors, fibres information and communication technologies Organic semiconductors change the external appearance of computers Plastic laser... Opto-electronics, flexible displays, 15

16 4th Enabler Sensors & Actuators Miniaturized cameras, microphones,... Fingerprint sensor Radio sensors RFID Infrared Location sensors... e.g., GPS 16

17 Putting Them Altogether Progress in computing speed communication bandwidth material sciences sensor techniques computer science concepts miniaturization energy and battery display technologies... Enables new applications Post-PC era business opportunities Challenges for computer scientists, e.g., infrastructure design, algorithm development... 17

18 Evolution of Computing Paradigms Remote communication protocol layering, RPC, end-to-end args.. Fault tolerance ACID, two-phase commit, nested transactions... High availability replication, rollback recovery,... Remote information access dist. file systems, dist. databases, caching,. Distributed Systems Mobile Computing Pervasive Computing Ubiquitous Computing Distributed security encryption, mutual authentication,... Mobile networking Mobile IP, ad hoc networks, wireless TCP fixes,... Mobile information access disconnected operation, weak consistency,... Adaptive applications proxies, transcoding, agility,... Energy-aware systems goal-directed adaptation, disk spin-down,... Location sensitivity GPS, WaveLan triangulation, contextawareness,... Context Awareness Localized scalability Invisibility Privacy Adaptability 18

19 Outline The Vision -- According to Mark Weiser The Enablers Major Challenges Security and Privacy Issues Conclusion 19

20 Ubiquitous Computing Challenges Technology Invisibility Security and Privacy Adaptability

21 Security and Trust Interactions cross multiple organisational boundaries Lessons from history: everything worth hacking gets hacked Need for secure out of the box set up Context aware adaptive security Identify friend or foe level of trust Small communicators, with confidential data, are easily lost or stolen biometric authentication? Trust based on experience + recommendations Credential validation with intermittent network connectivity

22 You are now predictable Privacy System can co-relate location, context and behaviour patterns Do you want employer, colleagues or insurance company to know you carry a medical monitor? Tension between authentication and anonymity business wants to authenticate you for financial transactions and to provide personalized service Users should be aware of being monitored User control should be there on information generated or access to stored information

23 Security and Privacy Challenges 1. Spatio-temporal variation of data and data sources All devices in the neighborhood are potential information providers Nothing is fixed No global catalog No global routing table No centralized control However, each entity can interact with its neighbors By advertising / registering its service By collecting / subscribing to services provided by others

24 Security & Privacy Challenges (contd ) 2. Query may be explicit or implicit Users sometimes ask explicitly e.g. tell me the nearest restaurant that has vegetarian menu items The system can guess likely queries based on declarative information or past behavior e.g. the user always wants to know the price of IBM stock

25 Security & Privacy Challenges (contd ) 3. Information sources are not known a priori. Schema translations cannot be done beforehand Resource limited devices Need for common, domain specific ontologies Different possibilities: Device could interact with only such providers whose schemas it understands Device could interact with anyone, and cache the information with a hope for a translation in the future Device could always try to translate itself Schema translation, Ontology mapping.

26 Security & Privacy Challenges (contd ) 4. Cooperation amongst information sources cannot be guaranteed Device has reliable information, but makes it inaccessible Device provides information that is unreliable Once a device shares information, it must have the capability to protect future unauthorized propagation and changes to that information

27 Security & Privacy Challenges (contd ) Need to avoid humans in the loop Devices must dynamically "predict" data importance and utility based on the current context The key insight: declarative (or inferred) descriptions help Information needs Information capability Constraints Resources Data Answer fidelity Expressive Profiles can capture such descriptions

28 A Data Management Architecture Design and implementation consists of Data Metadata Profiles Entities Communication interfaces Information Providers Information Consumers Information Managers

29 Metadata Metadata representation To provide information about Information providers and consumers, Data objects, and Queries and answers To describe relationships To describe restrictions To reason over the information Semantic language DAML+OIL / DAML-S (DARPA Agent Markup Language)/ (Ontology Inference Layer)

30 Profile Profile User preferences, schedule, requirements Device constraints, providers, consumers Data ownership, restriction, requirements, process model Profiles based on BDI models Beliefs are facts about user or environment/context Desires and Intentions higher level expressions of beliefs and goals Devices reason over the BDI profiles Generate domains of interest and utility functions Change domains and utility functions based on context

31 Information Manager Problems Not all sources and data are correct/accurate/reliable No common sense Person can evaluate a web site based on how it looks, a computer cannot No centralized party that could verify peer reliability or reliability of its data Device is reliable, malicious, ignorant or uncooperative Distributed Belief Need to depend on other peers Evaluate integrity of peers and data based on peer distributed belief Detect which peer and what data is accurate Detect malicious peers Incentive model: if A is malicious, it will be excluded from the network

32 Information Manager (contd...) Distributed Belief Model Device sends a query to multiple peers Ask its vicinity for reputation of untrusted peers that responded to the query Trust a device only if trusted before or if enough of trusted peers trust it Use answers from (recommended to be) trusted peers to determine answer Update reputation/trust level for all devices that responded Trust level increases for devices that responded according to final answer Trust level decreases for devices that responded in a conflicting way Each devices builds a ring of trust

33 Distributed Belief Model A: B, where is Bob? A: C, where is Bob? A: D, where is Bob?

34 Distributed Belief Model (contd ) B: A, Bob is in home. C: A, Bob is at work. D: A, Bob is in home.

35 Distributed Belief Model (contd ) A: I have enough trust in D. What about B and C? A: B: Bob in home, C: Bob at work, D: Bob in home

36 Distributed Belief Model (contd ) B: I am not sure. C: I always do. E: I don t. F: I do. D: I don t. A: Do you trust C? A: I don t care what C says. I don t know enough about B, but I trust D, E, and F. Together, they don t trust C, so won t I.

37 Distributed Belief Model (contd ) E: I do. B: I do. C: I never do. F: I am not sure. D: I am not sure. A: Do you trust B? A: I don t care what B says. I don t trust C, but I trust D, E, and F. Together, they trust B a little, so will I.

38 Distributed Belief Model (contd ) A: I trust B and D, both say Bob is home A: Bob is home! A: Increase trust in B. A: Decrease trust in C. A: Increase trust in D.

39 Distributed Belief Model Information Manager Initial Trust Function a device performs this function whenever it encounters another device for the first time Pessimistic (-1), Optimistic (+1), Undecided (0) Trust Learning Function based on the current and past trust values Blindly +, Blindly -, Fast+, Fast-, Balanced+, Balanced Slow, Exponential Trust Weighting Function weight assigned to the information provided by a device based on its current trust value Multiplication (x*y), Cosine [ y 0 0, y > 0 x (1 cos(y*π/2)) ] Accuracy Merging Function used by a device to combine weighted accuracy degrees for same answers from multiple peers Max (highest suggested accuracy), Min (lowest suggested accuracy), Average

40 Experimental Parameters

41 Experiments Devices Reliable : share reliable data only Malicious : try to share unreliable data as reliable Ignorant : have unreliable data but believe they are reliable Uncooperative : have reliable data but will not share Model Device sends a query to multiple peers Asks its vicinity for reputation of untrusted peers that responded to the query Trust a device only if trusted before or if enough of trusted peers trust it Use answers from (recommended to be) trusted peers to determine answer Update reputation/trust level for all devices that responded A trust level increases for devices that responded according to final answer A trust level decreases for devices that responded in a conflicting way

42 Experimental Environment Parameter Value Spatial dimension 150 m * 150 m Simulation period 50 min Simulation KB 800 data answers, 800 questions No. of mobile devices 50 Mobility pattern Random way-point, 5 s pause time, speed 1-5 m/s Routing protocol AODV Flooding range 2 hops Tx range 25 m Tx throughput 2 Mbps Device s cache size 250 KB (50% of simulation KB) Device s initial KB 100 question, 100 answers not matching initial questions Device s initial trust 3 to 5 nodes

43 Results Answer Accuracy vs. Trust Learning Functions Answer Accuracy vs. Accuracy Merging Functions Distrust Convergence vs. Dishonesty Level

44 Answer Accuracy vs. Trust Learning Functions The effects of trust learning functions with an initial optimistic trust for environments with varying level of dishonesty. The results are shown for ++, --, s, f, f+, f-, and exp learning functions. Dishonesty levels increased from 0% to 100% Higher initial trust more answers accepted more wrong answers accurate answers incorrect 80 answers Number of Answers (%) s f f+ f e 0% 0 + s f f+ f e 25% 0 + s f f+ f e 50% 0 + s f f+ f e 75% 0 + s f f+ f e 100%

45 Ans Accuracy vs. Trust Learning Func (contd ) The effects of trust learning functions with an initial pessimistic trust for environments with varying level of dishonesty. The results are shown for ++, --, s, f, f+, f-, and exp learning functions accurate answers incorrect 80answers Number of Answers (%) s f f+ f e 0% 0 + s f f+ f e 25% 0 + s f f+ f e 50% 0 + s f f+ f e 75% 0 + s f f+ f e 100%

46 Answer Accuracy vs. Accuracy Merging Function The effects of accuracy merging functions for environments with varying level of dishonesty. The results are shown for (a) MIN using only-one (OO) final answer approach (b) MIN using { highest-one} (HO) final answer approach (c) MAX + OO, (d) MAX + HO, (e) AVG + OO, and (f) AVG + HO accurate answers incorrect 80 answers Number of Answers (%) a b c d e f 0% 0 a b c d e f 25% 0 a b c d e f 50% 0 a b c d e f 75% 0 a b c d e f 100%

47 Distrust Convergence vs. Dishonesty Level Average distrust convergence period in seconds for environments with varying level of dishonesty (25%, 50% and 100% dishonest nodes). Convergence period time from the start till all honest devices are able to detect all unreliable nodes. The results are shown for [ (a) ++, (b) --, (c) s, (d) f with α +. (e)- (h) for same functions with α 0. Average Distrust Degree for Dishonest Device es % % a b 0.4 c d 0.6 e f 0.8 g h %

48 Distrust Convergence vs. Dishonesty Level Convergence is much slower for higher proportion of dishonest nodes in the network Blindly negative trust learning function always produced the least trust level among the nodes in all possible combinations in the simulation. For undecided initial trust function, the final trust values for most of the dishonest nodes were found to be -1. The convergence was quick where the number of dishonest nodes was not high. In situations where there are many dishonest nodes, an undecided initial trust function produced undecided trust degree for most of the nodes. The less evidence a device could obtain (for or against a peer node) the less is the probability that the device will make a decision about the peer s dishonesty.

49 TCS Home Gateway Initiative

50 Drivers for Home Networking WiFi enablement of the home More than one PC in use Music and Video going on line Future two way multimedia services Sales (millions) Global sales of Wifi-enabled laptops What s 20.0 the role for the Telco?

51 Drivers for Home Networking Lots of companies producing WiFi gateways Growing market worldwide Prices falling rapidly Technology changing rapidly Consumer electronics companies WiFi enabling devices

52 It s about Services Entertainment Security Home Gateway PC Internet This is complex to manage! Gaming Voice and video services Personal content

53 Issues for the Home Gateway The Home network will become increasingly complex to manage Customers will require: a range of services. delivered to a range of devices. with end to end quality assurance across the network Home gateway manufacturers, telecommunications operators and consumer electronics companies must work together to develop common standards to enable this Key areas that require standards to be agreed include: Service management Service performance Security Seamless integration of many different devices and the ability to deliver managed services to these will be key to the future customer take-up of broadband services

54 What will HGI Enable Entertainment Security Security QoS control Services Internet Service integration Home Gateway Home Network PC Device Ma anagement End to end service delivery Voice services Personal content Gaming

55 TCS Home Gateway Initiative TCS has come up with a home infotainment platform (HIP) an embedded platform for Internet access on TV from home. TCS has plans to extend this device into a ubiquitous home gateway. Like all embedded systems, such gateway device is required to store, access, or communicate date which are sensitive in nature. This makes security a serious concern.

56 Security Challenges in Embedded Systems Tamper-proofing the device: Physical and side-channel attacks integrates all attacks that interact with the embedded systems hardware and exploit the physical side of system implementation flaws and properties. Invasive attacks micro-probing techniques gain access to the chip level components in order to interfere and manipulate with system internals. Non-invasive attacks do not require the device to be opened. Fault-induction attacks observe the targeted systems behavior after generating errors or failures on it, through manipulation of its operating conditions like supply of voltage, temperature, radiation, light etc. Software attacks exploit the systems capability to download, upgrade, and execute application codes. Interception-based attacks try to passively eavesdrop on sensitive data in order to compromise the privacy or confidentiality of the user. Interruption-based attacks make the device usable through an energy exhaustion attack on the device. Modification-based attacks compromise software integrity by exploiting detected vulnerabilities. Example: use of buffer overflow to overwrite the stack memory, and transferring control to a malicious program whose execution may have undesirable effects.

57 Security Challenges in Embedded Systems Networking threats prevention: Access from the Internet the users will be able to connect to the gateway from the Internet and access information from small embedded devices at their homes. Given the constraints of the platform of the home gateway, maintaining adequate security in such scenarios is a real challenge. Home network threats the broadcast nature of the wireless radio signal makes the network vulnerable to several threats. Strong countermeasures are needed to overcome these problems. Confidentiality and privacy of user data access protocols and the system need to be designed to ensure that the confidentiality and/or privacy of sensitive user data are maintained by use of appropriate encryption and privacy-preserving mechanisms.

58 Security Challenges in Embedded Systems Networking threats prevention: Access from the Internet the users will be able to connect to the gateway from the Internet and access information from small embedded devices at their homes. Given the constraints of the platform of the home gateway, maintaining adequate security in such scenarios is a real challenge. Home network threats the broadcast nature of the wireless radio signal makes the network vulnerable to several threats. Strong countermeasures are needed to overcome these problems. Confidentiality and privacy of user data access protocols and the system need to be designed to ensure that the confidentiality and/or privacy of sensitive user data are maintained by use of appropriate encryption and privacy-preserving mechanisms.

59 Security Solutions Specific security solutions for handling the vulnerabilities: Security bootstrapping providing an acceptable guarantee about the security of the operating systems starting point is of paramount importance. Software authentication and validation every application should undergo a validation step before its execution. This can be done through computing a hash of the application code and comparing it to a pre-computed value. Operating system and application enhancement Trusted Computing Group (TCG) and Next Generation Secure Computing Base (NGSCB) initiatives rely on different OS modifications which protect sensitive code or data.

60 Trusted Computing Idea: It shall be impossible to install and execute software that is not certified and authorised Current paradigm: Software-open systems Trusted computing paradigm: Software closed systems Controlled by hardware 1999: Trusted Computing Group (TCG) Trusted Platform Module (TPM) specification 2001: Production of TPM chip 2002: Microsoft announces Palladium TPM chip 2005: Next Generation Secure Computing Base (NGSCB) 2006: Limited trusted computing in Vista Disk encryption based on TPM (Trusted Platform Module) 2009: TPM in almost all PCs, not yet in mobiles

61 Trusted Computing Module (TPM)

62 Trusted Computing Base: TCB A full combination of security mechanisms (hardware and software) within a system Security evaluation gives security assurance US TCSEC (Trusted Computer Security Evaluation Criteria, aka. Orange Book) European ITSEC (Information Technology Security Evaluation Criteria) ISO Common Criteria Represents a public measure of security Additional factors can override security assurance at any time, e.g. security flaws

63 Conclusion Challenging research problems exist in the field of pervasive and ubiquitous computing. Integration of technologies is the greatest challenge. HCI, Software agents, AI and other domains of computer science will play a major role in the evolutions and growth of ubiquitous computing. A lot has been achieved but much more remains to be achieved.

64 Thank You! 64

Ubiquitous Computing

Ubiquitous Computing Ubiquitous Computing Potentials & Challenges Jaydip Sen Senior Scientist, Wireless Research Group, Innovation Lab Tata Consultancy Services, Kolkata, INDIA Outline of the Talk The Vision of UbiComp --

More information

Ubiquitous Computing. Ambient Intelligence

Ubiquitous Computing. Ambient Intelligence Ubiquitous Computing Ambient Intelligence CS4031 Introduction to Digital Media 2016 Computing Evolution Ubiquitous Computing Mark Weiser, Xerox PARC 1988 Ubiquitous computing enhances computer use by making

More information

Mobile Computing Introduction

Mobile Computing Introduction Mobile Computing Introduction UNIT - 1 Prepared By:- NITIN PANDYA Assistant Professor, SVBIT. What is Mobile Computing 2 NTIIN PANDYA 3 NTIIN PANDYA Definitions Mobile Computing What is mobile computing?

More information

Ubiquitous Computing Introduction

Ubiquitous Computing Introduction Ubiquitous Introduction University of Innsbruck WS 2010/2011 Prof. Dr. Thomas Strang thomas.strang@uibk.ac.at Where it all started The term Ubiquitous 1 goes back to the late Mark Weiser, who wrote 1991

More information

Mobile Security Fall 2012

Mobile Security Fall 2012 Mobile Security 14-829 Fall 2012 Patrick Tague Class #9 The Internet of Things Partial slide credit to L. Zoia and Y. Zhang Announcements If you haven't signed up for a Survey presentation (two teams,

More information

DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 1. Introduction

DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 1. Introduction DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 1 Introduction Modified by: Dr. Ramzi Saifan Definition of a Distributed System (1) A distributed

More information

02 - Distributed Systems

02 - Distributed Systems 02 - Distributed Systems Definition Coulouris 1 (Dis)advantages Coulouris 2 Challenges Saltzer_84.pdf Models Physical Architectural Fundamental 2/60 Definition Distributed Systems Distributed System is

More information

IP Mobility vs. Session Mobility

IP Mobility vs. Session Mobility IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when

More information

Version 11

Version 11 The Big Challenges Networked and Electronic Media European Technology Platform The birth of a new sector www.nem-initiative.org Version 11 1. NEM IN THE WORLD The main objective of the Networked and Electronic

More information

02 - Distributed Systems

02 - Distributed Systems 02 - Distributed Systems Definition Coulouris 1 (Dis)advantages Coulouris 2 Challenges Saltzer_84.pdf Models Physical Architectural Fundamental 2/58 Definition Distributed Systems Distributed System is

More information

Mobile and Ubiquitous Computing

Mobile and Ubiquitous Computing Mobile and Ubiquitous Computing Today l Mobile, pervasive and volatile systems l Association and Interoperation l Sensing context and adaptation RIP? How is mobility different Mobile elements are resource-poor

More information

Introduction to Distributed Systems

Introduction to Distributed Systems Introduction to Distributed Systems Other matters: review of the Bakery Algorithm: why can t we simply keep track of the last ticket taken and the next ticvket to be called? Ref: [Coulouris&al Ch 1, 2]

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

SECURING DEVICES IN THE INTERNET OF THINGS

SECURING DEVICES IN THE INTERNET OF THINGS SECURING DEVICES IN THE INTERNET OF THINGS WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe consequences, including

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 1: Introduction to Mobile Systems Prof Cecilia Mascolo About Me time In this course The course will include aspects related to general understanding of Mobile and ubiquitous

More information

Threat Modeling. Bart De Win Secure Application Development Course, Credits to

Threat Modeling. Bart De Win Secure Application Development Course, Credits to Threat Modeling Bart De Win bart.dewin@ascure.com Secure Application Development Course, 2009 Credits to Frank Piessens (KUL) for the slides 2 1 Overview Introduction Key Concepts Threats, Vulnerabilities,

More information

A Layered Protocol Architecture for Scalable Innovation and Identification of Network Economic Synergies in the Internet of Things

A Layered Protocol Architecture for Scalable Innovation and Identification of Network Economic Synergies in the Internet of Things A Layered Protocol Architecture for Scalable Innovation and Identification of Network Economic Synergies in the Internet of Things Tilman Wolf 1 and Anna Nagurney 2 1 Department of Electrical and Computer

More information

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Automotive The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased

More information

System-Level Failures in Security

System-Level Failures in Security System-Level Failures in Security Non linear offset component (ms) 0.0 0.5 1.0 1.5 2.0 Variable skew De noised Non linear offset Temperature 26.4 26.3 26.2 26.1 26.0 25.9 25.8 Temperature ( C) Fri 11:00

More information

What is an Ad Hoc Network?

What is an Ad Hoc Network? Introduction Part 1 CS-6777 Mobile Ad Hoc Networking Memorial University of Newfoundland What is an Ad Hoc Network?! A mobile ad hoc network (MANET) is Communication network Wireless signaling Multi-hop

More information

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures By Chris Karlof and David Wagner Lukas Wirne Anton Widera 23.11.2017 Table of content 1. Background 2. Sensor Networks vs. Ad-hoc

More information

SECURING DEVICES IN THE INTERNET OF THINGS

SECURING DEVICES IN THE INTERNET OF THINGS SECURING DEVICES IN THE INTERNET OF THINGS EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe consequences, including steep financial losses, damage

More information

Securing Devices in the Internet of Things

Securing Devices in the Internet of Things AN INTEL COMPANY Securing Devices in the Internet of Things WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe

More information

Future-Generation Wireless Networks: Beyond 3G and 4G.

Future-Generation Wireless Networks: Beyond 3G and 4G. Future-Generation Wireless Networks: Beyond 3G and 4G. Kumar Adumulla 29 March 2006 Networks 1 Outline Introduction Wireless Networking Generations Issues in 3G What is 4G Beyond 3G & 4G Conclusion References

More information

Operating systems and security - Overview

Operating systems and security - Overview Operating systems and security - Overview Protection in Operating systems Protected objects Protecting memory, files User authentication, especially passwords Trusted operating systems, security kernels,

More information

Operating systems and security - Overview

Operating systems and security - Overview Operating systems and security - Overview Protection in Operating systems Protected objects Protecting memory, files User authentication, especially passwords Trusted operating systems, security kernels,

More information

6 Vulnerabilities of the Retail Payment Ecosystem

6 Vulnerabilities of the Retail Payment Ecosystem 6 Vulnerabilities of the Retail Payment Ecosystem FINANCIAL INSTITUTION PAYMENT GATEWAY DATABASES POINT OF SALE POINT OF INTERACTION SOFTWARE VENDOR Table of Contents 4 7 8 11 12 14 16 18 Intercepting

More information

Networking. Prof. Abdul Hameed

Networking. Prof. Abdul Hameed Networking Prof. Abdul Hameed http://informationtechnology.pk http://informationtechnology.pk 0 Chapter Topics Networking Fundamentals Network Architectures and Components Connecting to the Internet Installing

More information

Bluetooth. Quote of the Day. "I don't have to be careful, I've got a gun. -Homer Simpson. Stephen Carter March 19, 2002

Bluetooth. Quote of the Day. I don't have to be careful, I've got a gun. -Homer Simpson. Stephen Carter March 19, 2002 Bluetooth Stephen Carter March 19, 2002 Quote of the Day "I don't have to be careful, I've got a gun. -Homer Simpson 1 About Bluetooth Developed by a group called Bluetooth Special Interest Group (SIG),

More information

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations 98-367 MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations Which are common symptoms of a virus infection? (Lesson 5 p 135-136) Poor system performance. Unusually low

More information

Addressing Unique M2M Challenges with Converged Gateways

Addressing Unique M2M Challenges with Converged Gateways October 19-20, 2010 Addressing Unique M2M Challenges with Converged Gateways Paul L. Russell, Jr. Paul.Russell@InterDigital.com ETSI TC M2M Workshop 19-20 October 2010, Sophia Antipolis, France Where are

More information

Network 2020 Vision. Nikos G. Panagiotidis Business Development Manager Intel Hellas S.A.

Network 2020 Vision. Nikos G. Panagiotidis Business Development Manager Intel Hellas S.A. Network 2020 Vision from Telco to QOE Service Provider Nikos G. Panagiotidis Business Development Manager Intel Hellas S.A. Need Positive Technology Spiral End To End IT Mobile Devices OSS/BSS User Experience

More information

Wireless Network Security Spring 2011

Wireless Network Security Spring 2011 Wireless Network Security 14-814 Spring 2011 Patrick Tague Jan 18, 2011 Class #3 Wireless vulnerabilities and threats Announcement: Agenda 6 remaining survey slots, 12 students yet to sign up Vulnerabilities,

More information

Wireless Security Security problems in Wireless Networks

Wireless Security Security problems in Wireless Networks Wireless Security Security problems in Wireless Networks Security of Wireless Networks Wireless networks are everywhere more and more electronic devices are becoming wireless However, ensuring security

More information

Wireless e-business Security. Lothar Vigelandzoon

Wireless e-business Security. Lothar Vigelandzoon Wireless e-business Security Lothar Vigelandzoon E-business evolution Increased business drivers for cost efficiency & market penetration Increased Importance of brand reputation Distance between IT and

More information

Case study of Wireless Technologies in Industrial Applications

Case study of Wireless Technologies in Industrial Applications International Journal of Scientific and Research Publications, Volume 7, Issue 1, January 2017 257 Case study of Wireless Technologies in Industrial Applications Rahul Hanumanth Rao Computer Information

More information

IEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING

IEEE 2013 JAVA PROJECTS  Contact No: KNOWLEDGE AND DATA ENGINEERING IEEE 2013 JAVA PROJECTS www.chennaisunday.com Contact No: 9566137117 KNOWLEDGE AND DATA ENGINEERING (DATA MINING) 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data

More information

Chapter 1. Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization. Revised: August 2011

Chapter 1. Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization. Revised: August 2011 Introduction ti Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

Sustaining profitable growth in Mobile

Sustaining profitable growth in Mobile Sustaining profitable growth in Mobile Mario Rivas Executive Vice President Communications Businesses Philips Semiconductors Financial Analysts Day 2004 Agenda Update Communications businesses Nexperia

More information

TRENDS IN SECURE MULTICORE EMBEDDED SYSTEMS

TRENDS IN SECURE MULTICORE EMBEDDED SYSTEMS TRENDS IN SECURE MULTICORE EMBEDDED SYSTEMS MATTHEW SHORT SR PRODUCT LINE MANAGER DIGITAL NETWORKING MATTHEW.SHORT@NXP.COM A NEW POSITION OF STRENGTH #1 Communications Processors #1 RF Power Transistors

More information

Custom Connect. All Area Networks. customer s guide to how it works version 1.0

Custom Connect. All Area Networks. customer s guide to how it works version 1.0 All Area Networks Custom Connect customer s guide to how it works version 1.0 The information in this technical user guide and the glossary of terms has been prepared in good faith and is correct at the

More information

Threat analysis. Tuomas Aura CS-C3130 Information security. Aalto University, autumn 2017

Threat analysis. Tuomas Aura CS-C3130 Information security. Aalto University, autumn 2017 Threat analysis Tuomas Aura CS-C3130 Information security Aalto University, autumn 2017 Outline What is security Threat analysis Threat modeling example Systematic threat modeling 2 WHAT IS SECURITY 3

More information

Challenges for Future Networked Embedded Systems

Challenges for Future Networked Embedded Systems Challenges for Future Networked Embedded Systems I.G. Niemegeers Centre for Wireless and Personal Communication (CWPC) Delft University of Technology PROGRESS Workshop 2006 Networks and Connected Systems

More information

Lecture 20: Future trends in mobile computing. Mythili Vutukuru CS 653 Spring 2014 April 7, Monday

Lecture 20: Future trends in mobile computing. Mythili Vutukuru CS 653 Spring 2014 April 7, Monday Lecture 20: Future trends in mobile computing Mythili Vutukuru CS 653 Spring 2014 April 7, Monday Future topics Improving capacity Dynamic spectrum access Massive MIMO Heterogeneous networks Pervasive

More information

Unit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1

Unit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1 1 Outcome 1 A description of mobile device internet connectivity using two current Wi-Fi methods. A description of mobile device internet connectivity using two current GSM mobile telephony methods. A

More information

Physical Tamper Resistance

Physical Tamper Resistance Physical Tamper Resistance (Ross Anderson s book Security Engineering - Chapter 16) Tamper: VERB (tamper with) Interfere with (something) in order to cause damage or make unauthorized alterations. someone

More information

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester. Contact Hrs / week: 4 Total hrs: 64

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester. Contact Hrs / week: 4 Total hrs: 64 Govt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester Subject: Mobile Computing Contact Hrs / week: 4 Total hrs: 64 Table of Contents SN Topic Hours Marks 1 Introduction

More information

15-441: Computer Networking. Wireless Networking

15-441: Computer Networking. Wireless Networking 15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing

More information

Choosing the Right. Ethernet Solution. How to Make the Best Choice for Your Business

Choosing the Right. Ethernet Solution. How to Make the Best Choice for Your Business Choosing the Right Ethernet Solution How to Make the Best Choice for Your Business TABLE OF CONTENTS Introduction 3 CH. 1 Why Do Organizations Choose Ethernet? 4 CH. 2 What Type of Ethernet Solutions Will

More information

The Internet of Things. Steven M. Bellovin November 24,

The Internet of Things. Steven M. Bellovin November 24, The Internet of Things Steven M. Bellovin November 24, 2014 1 What is the Internet of Things? Non-computing devices...... with CPUs... and connectivity (Without connectivity, it s a simple embedded system)

More information

Smart Dust : Dispersed, Un-tethered Geospatial Monitoring. Dr. Raja R. Kadiyala Chief Technology Officer CH2M HILL - Oakland, CA

Smart Dust : Dispersed, Un-tethered Geospatial Monitoring. Dr. Raja R. Kadiyala Chief Technology Officer CH2M HILL - Oakland, CA Smart Dust : Dispersed, Un-tethered Geospatial Monitoring Dr. Raja R. Kadiyala Chief Technology Officer CH2M HILL - Oakland, CA raja@ch2m.com Drivers and Trends Sensing, Communication and Computation MEMS

More information

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks 15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks Scenarios and Roadmap Point to point wireless networks (last lecture) Example: your laptop to CMU wireless Challenges: Poor and variable

More information

New Technologies and Services: Change and Convergence

New Technologies and Services: Change and Convergence ITU-D Regional Development Forums 2010 on NGN and Broadband (ARB, EUR & CIS Regions): NGN and Broadband, Opportunities and Challenges New Technologies and Services: Change and Convergence John Visser,

More information

Pervasive and Mobile Computing. Dr. Atiq Ahmed. Introduction Network Definitions Network Technologies Network Functions 1/38

Pervasive and Mobile Computing. Dr. Atiq Ahmed. Introduction Network Definitions Network Technologies Network Functions 1/38 Department of Computer Science & Information Technology University of Balochistan Course Objectives To discuss the fundamental problems in the emerging area of mobile and pervasive computing, along with

More information

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these

More information

Peer-to-peer Sender Authentication for . Vivek Pathak and Liviu Iftode Rutgers University

Peer-to-peer Sender Authentication for  . Vivek Pathak and Liviu Iftode Rutgers University Peer-to-peer Sender Authentication for Email Vivek Pathak and Liviu Iftode Rutgers University Email Trustworthiness Sender can be spoofed Need for Sender Authentication Importance depends on sender Update

More information

Congestion? What Congestion? Mark Handley

Congestion? What Congestion? Mark Handley Congestion? What Congestion? Mark Handley Is there a problem to be solved? TCP has done a pretty good job since 1988 of matching offered load to available capacity and avoiding congestion collapse. Doesn

More information

CS551 Ad-hoc Routing

CS551 Ad-hoc Routing CS551 Ad-hoc Routing Bill Cheng http://merlot.usc.edu/cs551-f12 1 Mobile Routing Alternatives Why not just assume a base station? good for many cases, but not some (military, disaster recovery, sensor

More information

Policy-Based Context-Management for Mobile Solutions

Policy-Based Context-Management for Mobile Solutions Policy-Based Context-Management for Mobile Solutions Caroline Funk 1,Björn Schiemann 2 1 Ludwig-Maximilians-Universität München Oettingenstraße 67, 80538 München caroline.funk@nm.ifi.lmu.de 2 Siemens AG,

More information

CDN TUNING FOR OTT - WHY DOESN T IT ALREADY DO THAT? CDN Tuning for OTT - Why Doesn t It Already Do That?

CDN TUNING FOR OTT - WHY DOESN T IT ALREADY DO THAT? CDN Tuning for OTT - Why Doesn t It Already Do That? CDN Tuning for OTT - Why Doesn t It Already Do That? When you initially onboarded your OTT traffic to a CDN, you probably went with default settings. And to be honest, why wouldn t you? A standard media

More information

Body Sensor Network Security

Body Sensor Network Security 1 Body Sensor Network Security Close coupling of BSNs and security why network security is important information is sensitive, what it takes to protect it, how its different from WSNs how encryption is

More information

Wireless networks: from cellular to ad hoc

Wireless networks: from cellular to ad hoc Wireless networks: from cellular to ad hoc The three wireless waves Wave #1: cellular telephony Still, biggest profit maker Wave #2 : wireless Internet access Most Internet access on US campuses is wireless

More information

Wireless (Select Models Only) User Guide

Wireless (Select Models Only) User Guide Wireless (Select Models Only) User Guide Copyright 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by its

More information

HCI Lecture 14. Special Issues: Ubiquitous computing

HCI Lecture 14. Special Issues: Ubiquitous computing HCI Lecture 14 Special Issues: Ubiquitous computing Barbara Webb Key points: Making the computer part of the environment Mobile devices Implicit input Ambient output Continuous interaction Issues for design

More information

Automotive Cyber Security

Automotive Cyber Security Automotive Cyber Security Rajeev Shorey (Ph.D.) Principal Scientist TCS Innovation Labs Cincinnati, USA & Bangalore, India Copyright 2013 Tata Consultancy Services Limited Connected Vehicles Chennai, 18

More information

Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition

Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition Chapter 7 Hacking Mobile Phones, PDAs, and Handheld Devices Objectives After completing this chapter,

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #11 - Identity Mgmt.; Routing Security 2016 Patrick Tague 1 Class #11 Identity threats and countermeasures Basics of routing in ad hoc networks

More information

SYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS

SYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS SYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS David Murotake, (SCA Technica, Inc. Nashua NH, USA; david.murotak@scatechnica.com) Antonio Martin (SCA Technica, Inc., Nashua NH, USA;

More information

Applying Semantic Web in Mobile and Ubiquitous Computing: Will Policy-Awareness Help?

Applying Semantic Web in Mobile and Ubiquitous Computing: Will Policy-Awareness Help? Applying Semantic Web in Mobile and Ubiquitous Computing: Will Policy-Awareness Help? Ora Lassila Research Fellow Nokia Research Center Burlington, MA, USA Cambridge November 2005 1 NOKIA lassila-isvc2005-slides.ppt

More information

Using the Semantic Web in Ubiquitous and Mobile Computing

Using the Semantic Web in Ubiquitous and Mobile Computing Using the Semantic Web in Ubiquitous and Mobile Computing Ora Lassila Research Fellow, Software & Applications Laboratory, Nokia Research Center Elected Member of Advisory Board, World Wide Web Consortium

More information

Mesh Networking Principles

Mesh Networking Principles Technology, N. Jones Research Note 8 July 2003 Mesh Topologies Promise Resilient Wireless Networks Mesh architecture will become an essential element of wireless networking because it is easy to install,

More information

Seamless integration of heterogeneous wireless network technologies -?/!

Seamless integration of heterogeneous wireless network technologies -?/! Seamless integration of heterogeneous wireless network technologies -?/! Jochen Schiller Computer Systems & Telematics Freie Universität Berlin Germany schiller@computer.org Prof. Dr.-Ing. Jochen Schiller,

More information

Fiber in the backhaul : Powering mobile Broadband

Fiber in the backhaul : Powering mobile Broadband Fiber in the backhaul : Powering mobile Broadband Gamal Hegazi / Lead Architect Founding Board member FTTH Council Members and Mission MENA council members are from the main FTTH industry players of the

More information

4G Mobile Communications

4G Mobile Communications 4G Mobile Communications Welcome to 4G The term 4G is used broadly to include several types of broadband wireless access communication systems, not only cellular telephone systems. One of the terms to

More information

Easy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications

Easy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications Infineon Network Use Case Easy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications Providing Infineon customers with an easy path to integrating TPM support into their products and systems

More information

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may

More information

ECE 158A: Lecture 13. Fall 2015

ECE 158A: Lecture 13. Fall 2015 ECE 158A: Lecture 13 Fall 2015 Random Access and Ethernet! Random Access! Basic idea: Exploit statistical multiplexing Do not avoid collisions, just recover from them When a node has packet to send Transmit

More information

Security Philosophy. Humans have difficulty understanding risk

Security Philosophy. Humans have difficulty understanding risk Android Security Security Philosophy Humans have difficulty understanding risk Safer to assume that Most developers do not understand security Most users do not understand security Security philosophy

More information

Securing V2X communications with Infineon HSM

Securing V2X communications with Infineon HSM Infineon Security Partner Network Securing V2X communications with Infineon HSM Savari and Infineon The Sign of Trust for V2X Products SLI 97 www.infineon.com/ispn Use case Application context and security

More information

CEN 538 Wireless LAN & MAN Networks

CEN 538 Wireless LAN & MAN Networks King Saud University College of Computer and Information Sciences Department of Computer Engineering CEN 538 Wireless LAN & MAN Networks Dr. Ridha OUNI rouni@ksu.edu.sa LMS web site References Text book

More information

Securing emerging wireless networks and services

Securing emerging wireless networks and services Securing emerging wireless networks and services 4 th ESTI security workshop, 13-14 January 2009 - ETSI, Sophia Antipolis, France Ganesh Sundaram, Distinguished Member of Technical Staff Wireless Advanced

More information

Computer Science 461 Final Exam May 22, :30-3:30pm

Computer Science 461 Final Exam May 22, :30-3:30pm NAME: Login name: Computer Science 461 Final Exam May 22, 2012 1:30-3:30pm This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor Code pledge

More information

...IEEE What is IEEE compliance. Introduction. WaveLAN Sales Bulletin May IEEE Committee

...IEEE What is IEEE compliance. Introduction. WaveLAN Sales Bulletin May IEEE Committee WaveLAN Sales Bulletin May 1998 What is IEEE 802.11 compliance Introduction Over the past months there have been rapid developments in the wireless LAN industry which culminated in the recent approval

More information

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput

More information

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE s3security.com Security Professional Services S3 offers security services through its Security Professional Services (SPS) group, the security-consulting

More information

Distributed Systems. Chapter 1: Introduction

Distributed Systems. Chapter 1: Introduction Distributed Systems (3rd Edition) Chapter 1: Introduction Version: February 25, 2017 2/56 Introduction: What is a distributed system? Distributed System Definition A distributed system is a collection

More information

Chapter 5 Local Area Networks. Computer Concepts 2013

Chapter 5 Local Area Networks. Computer Concepts 2013 Chapter 5 Local Area Networks Computer Concepts 2013 5 Chapter Contents Section A: Network Building Blocks Section B: Wired and Wireless Technologies Section C: Network Setup Section D: Sharing Files Section

More information

SECURITY OF CPS: SECURE EMBEDDED SYSTEMS AS A BASIS

SECURITY OF CPS: SECURE EMBEDDED SYSTEMS AS A BASIS SECURITY OF CPS: SECURE EMBEDDED SYSTEMS AS A BASIS Christoph Krauß, christoph.krauss@aisec.fraunhofer.de Dagstuhl Seminar 11441: Science and Engineering of CPS, November 2011 Overview Introduction Securing

More information

Assignment Project Whitepaper ITEC495-V1WW. Instructor: Wayne Smith. Jim Patterson

Assignment Project Whitepaper ITEC495-V1WW. Instructor: Wayne Smith. Jim Patterson Project Whitepaper ITEC495-V1WW Instructor: Wayne Smith Jim Patterson Table of Contents 1. Abstract Page 3 2. Introduction Page 3 3. Analysis Page 4 4. Solution Discussion Page 7 5. Evaluation Criteria

More information

WEB SEARCH, FILTERING, AND TEXT MINING: TECHNOLOGY FOR A NEW ERA OF INFORMATION ACCESS

WEB SEARCH, FILTERING, AND TEXT MINING: TECHNOLOGY FOR A NEW ERA OF INFORMATION ACCESS 1 WEB SEARCH, FILTERING, AND TEXT MINING: TECHNOLOGY FOR A NEW ERA OF INFORMATION ACCESS BRUCE CROFT NSF Center for Intelligent Information Retrieval, Computer Science Department, University of Massachusetts,

More information

Wireless Attacks and Countermeasures

Wireless Attacks and Countermeasures Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections

More information

King Fahd University of Petroleum & Minerals Computer Engineering g Dept

King Fahd University of Petroleum & Minerals Computer Engineering g Dept King Fahd University of Petroleum & Minerals Computer Engineering g Dept COE 540 Computer Networks Term 121 Dr. Ashraf S. Hasan Mahmoud Rm 22-420 Ext. 1724 Email: ashraf@kfupm.edu.sa 9/1/2012 Dr. Ashraf

More information

Green Lights Forever: Analyzing the Security of Traffic Infrastructure

Green Lights Forever: Analyzing the Security of Traffic Infrastructure Green Lights Forever: Analyzing the Security of Traffic Infrastructure RAJSHAKHAR PAUL Outline Introduction Anatomy of a Traffic Infrastructure Case Study Threat Model Types of Attack Recommendation Broader

More information

Mobile Ad Hoc Networks: Basic Concepts and Research Issues

Mobile Ad Hoc Networks: Basic Concepts and Research Issues Mobile Ad Hoc s: Basic Concepts and Research Issues Ing. Alessandro Leonardi aleonardi@dieei.unict.it Wireless s Generations (1/3) Generation 1G 2G 2.5G 3G 4/5G Time 1980s 1990s Late1990s 2000s (2010 full

More information

SO YOU THINK YOU ARE PROTECTED? THINK AGAIN! NEXT GENERATION ENDPOINT SECURITY

SO YOU THINK YOU ARE PROTECTED? THINK AGAIN! NEXT GENERATION ENDPOINT SECURITY SO YOU THINK YOU ARE PROTECTED? THINK AGAIN! NEXT GENERATION ENDPOINT SECURITY www.securelink.net BACKGROUND Macro trends like cloud and mobility change the requirements for endpoint security. Data can

More information

Wireless Security Background

Wireless Security Background Wireless Security Background Wireless Networks The need for mobile computing Laptops, PDAs, Bluetooth devices Smart phones Enabling technology Wireless communication Two important characteristics Wireless

More information

INTERNET OF THINGS (IoT) DESIGN CONSIDERATIONS FOR EMBEDDED CONNECTED DEVICES ANDREW CAPLES SENIOR PRODUCT MARKETING MANAGER, NUCLEUS

INTERNET OF THINGS (IoT) DESIGN CONSIDERATIONS FOR EMBEDDED CONNECTED DEVICES ANDREW CAPLES SENIOR PRODUCT MARKETING MANAGER, NUCLEUS INTERNET OF THINGS (IoT) DESIGN CONSIDERATIONS FOR EMBEDDED CONNECTED DEVICES ANDREW CAPLES SENIOR PRODUCT MARKETING MANAGER, NUCLEUS E M B E D D E D S O F T W A R E W H I T E P A P E R w w w. m e n t

More information

Last time. Security Policies and Models. Trusted Operating System Design. Bell La-Padula and Biba Security Models Information Flow Control

Last time. Security Policies and Models. Trusted Operating System Design. Bell La-Padula and Biba Security Models Information Flow Control Last time Security Policies and Models Bell La-Padula and Biba Security Models Information Flow Control Trusted Operating System Design Design Elements Security Features 10-1 This time Trusted Operating

More information

Study on Computer Network Technology of Digital Library

Study on Computer Network Technology of Digital Library International Symposium on Computers & Informatics (ISCI 2015) Study on Computer Network Technology of Digital Library Yanming Sui LinYi University, Linyi, China suiyanming@lyu.edu.cn Abstract With the

More information

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps

More information