motivation by niusheng11

VIEWS: 17 PAGES: 31

									                  “ECORN”
Trusted Wireless Short Range Communications

         Faculty of Engineering and Science
             Agder University College
                      Norway




                                              1
Research @ HIA IKT

   System modeling & transformations (Prof. A Prinz)
   Context description, reasoning, & aggregation (Prof. R. Nossum)
   Business innovation and user aspects (Prof. P.E. Pedersen)
   Web mining technology & accessibility (Dr. M. Snaprud)
   System security and business strategies (Prof. J.J. Gonzalez)
   Security, privacy and trust (Prof. V. Oleshchuk)
   Learning, adaptive automata (Dr. O.-C. Granmo, Prof. Oomen)
   Wireless networking and resource awareness (Prof. F. Reichert)
   Channel models, MIMO techniques
    and especially Mobile-to-Mobile aspects (Prof. M. Pätzold)


                                                                      2
Wireless networking and resource awareness
Prof. F. Reichert, HiA IKT “Agder Mobility Lab”


   Mobile network architectures and protocols
   Short Range Communications
   Resource Awareness & Discovery
   Wireless residential networking & services
   Mobile terminal evolution
   SIP/IMS – “All-IP”
   IP independent mobile routing (future area)




                                                  3
  Wireless networking and resource awareness
  Towards Trusted Ubiquitous Communications & Services


               “I’m connected             “I’m connected                “I have
User           to the “WEB” ”        to the direct environment      whatever I need
Experience                                  around me”                 at hand”
              Few Interactive
             Mobile Applications


               “Swissknife” Phones       Peer-2-Peer-             Federated Trust
New Key       Java/J2ME/XML WS         Mobile Networking         & Identity Solutions
Enablers        Digital MultiMedia       Widely deployed         Virtual, networked
             WiFi Home Networking      WiFi Access Services      device components
                                                                 & service extensions


                     WiFi                 WiFi, UWB, …                  Multi-Access
Wireless         100 Mpbs++                500 Mpbs++                    “All-IP”
Networks                                                                 Ambient
               2G, 2.5G, 3G                IMS, 4G                       Networks


                   Today                     2010                          2020

                                                                                        4
Business innovation and user aspects
Professor Per E. Pedersen, HiA, adj. prof. NHH


 Business models for heterogeneous services and networks
 Service innovation by electronic service standardization,
  service integration and self-services
 Service adoption and technology readiness
 Mobile service adoption and commercial effects of mobile
  services
 Online and interactive marketing
 Cross media services and service integration




                                                              5
  Business innovation and user aspects
  Non-intrusive and innovative service integration


             “User initiated   “Service integrators”         “Seamless
User          integration                                  integration by
Experience    of services ”                            all service providers”



                Innovative           Service             Consolidation
New Key           users of       standardization        of standards and
               heterogeneous    and experimental        business models
Enablers                         business models
                  services



                  WiFi            WiFi, UWB, …                Multi-Access
Wireless      100 Mpbs++           500 Mpbs++                  “All-IP”
Networks                                                       Ambient
             2G, 2.5G, 3G          IMS, 4G                     Networks


                Today                2010                         2020

                                                                                6
Context description, reasoning, & aggregation
Prof. Dr. Rolf Nossum, HiA IKT



   Formal theories of context and trust in multi-agent systems
   Context-sensitive knowledge processing and management
   Mechanised reasoning by autonomous agents
   Knowledge management in the web
   Ontology-based knowledge acquisition and retrieval




                                                                  7
  Context description, reasoning, & aggregation
  Towards context-aware computing



                                                                      ambient
Experience       useful devices            adaptive devices
                                                                   computing power




              disparate theories of                                trusted wireless
                                         integrated models of
Enablers                                trust, context, security
                                                                     short-range
             trust, context, security                              communication




                     Today                       2010                   2020



                                                                                      8
    Channel Models, MIMO Techniques, and
          Mobile-to-Mobile Aspects
                 Prof. Dr.-Ing. M. Pätzold, HiA IKT


   Mobile communications
   Modelling, analysis, and simulation of mobile fading channels
   Multi-input multi-output (MIMO) techniques
   Space-time coding schemes
   Transmission techniques, especially MIMO-OFDM
   Mobile-to-mobile communications
   Performance analysis of mobile communication systems




                                                                    9
  Channel Models, MIMO Techniques, and
  Mobile-to-Mobile Aspects
  Towards Trusted Ubiquitous Communications & Services

                     connected
               “I’m “… ”                        “…”
                                          “I’m connected                 “…”
                                                                        “I have
User           to the “WEB” ”        to the direct environment      whatever I need
Experience                                  around me”                 at hand”
               today’s trends
              Few Interactive
             Mobile Applications


                        your
               “Swissknife” Phones             your
                                          Peer-2-Peer                   your
                                                                  Federated Trust
New Key                trend
              Java/J2ME/XML WS                 Networking
                                       Mobile trend                    vision
                                                                 & Identity Solutions
Enablers        Digital MultiMedia       Widely deployed
                                            your trend                    networked
                                                                 Virtual,your
             WiFi Home Networking      WiFi Access Services             components
                                                                 device vision
                                                                 & service extensions


                      your
                     WiFi                 WiFi, UWB, …                  Multi-Access
Wireless         100 trend
                     Mpbs++                500 Mpbs++                    “All-IP”
Networks                                                                 Ambient
               2G, 2.5G, 3G                IMS, 4G                       Networks


                   Today                     2010                          2020

                                                                                        10
System modeling & transformations
Prof. Andreas Prinz, HiA IKT “OSYS group”




   explicit description of model structures
   description of model transformations
   automatic code generation
   explicit description of semantics
   formal description and analysis of protocols and systems




                                                               11
  System modeling & transformations
  Towards correct programming

                ad-hoc modeling          domain specific           agreement on
Software      using fixed languages          modeling              best practice
Engineering     simple domain             languages and       for defining languages
               specific languages     tool support for them     including patterns


                     individual            integrated             only correct
Correct            methods for           environments            programming
                proving correctness       for correct                  =
Programming                              programming              engineering



                       your
                      WiFi               WiFi, UWB, …                Multi-Access
Wireless          100 trend
                      Mpbs++              500 Mpbs++                  “All-IP”
Networks                                                              Ambient
                 2G, 2.5G, 3G             IMS, 4G                     Networks


                    Today                   2010                        2020

                                                                                       12
Open Source, Web mining, and Accessibility
Dr. M. Snaprud, HiA IKT “OSYS group”

   Automatic web accessibility evaluation
   Open Source applications
   Software Engineering based on Open Source
   Platforms for on-line collaboration
   ICT policy
   Measurements of the status and effects of eGovernment
   Quantifiable indicators in eDemocracy




                                                            13
  Open Source, Web mining, and Accessibility
  Towards an Information Society for All

               “Problems accessing      “All static information is     “All relevant
User          some information and        accessible, but some      information and
Experience    services with different    services do not work. ” services are accessible”
                  terminals etc.”



                    A Unified     UWEM is defined and             Common criteria for
New Key           Web Evaluation       approved.                 European accessibility
Enablers       Methodology (UWEM)  Wider use of Open               requirements for
                     is formed        Source tools                Public procurement



             Different guidelines and    Harmonised guidelines      Large scale evaluation
Automatic     many ways to use them     implementations based on        established as
web access                                unified methdodology            element of
evaluation        W3C, Section 508...                                    eDemocracy
                                               W3C/WCAG2.0

                     Today                       2010                        2020
                                                                                             14
Learning Automata
Dr. O.-C. Granmo (HiA), Prof. B. J. Oommen (HiA & Carleton)


 Learning and Adaptivity in Unknown Stochastic Environments
   –   Resource Allocation
   –   Routing
   –   QoS Control
   –   Monitoring
   –   Optimization
   –   …




                                                               15
  Learning Automata
  Towards Self-Optimizing Pervasive Computing


User               Self-Optimizing        Self-Optimizing       Self-Optimizing
Experience      Routing, Access Control,                        Constellations of
                     Monitoring, ...     Computing Devices     Computing Devices



              Learning Automata for     Integration of Learning Pervasive Learning
New Key      Routing, Access Control,          Automata             Automata
Enablers                                      Approaches         Solutions Found
                  Monitoring, ...



                      WiFi                    WiFi, UWB, …          Multi-Access
Wireless          100 Mpbs++                   500 Mpbs++            “All-IP”
Networks                                                             Ambient
                 2G, 2.5G, 3G                  IMS, 4G               Networks


                     Today                       2010                      2020

                                                                                     16
Security, privacy and trust
Prof. V. Oleshchuk



   Formal models for security, privacy and trust in mobile systems
   Privacy and ID management issues in mobile computing
   Security and trust aspects in ubiquitous computing
   Location and identity privacy preserving issues
   Privacy preserving information retrieval
   Security, privacy and anonymity in medical information systems




                                                                      17
Security, privacy and trust
Towards Trusted Ubiquitous Communications & Services


               “I’m connected          “I’m securely connected
User                                                               “I have whatever I need
               to the “WEB” ”         to the direct environment
                                                                       at hand securely
Experience                           around me with preserving
              Few Interactive                                           and privately”
                                             my privacy”
             Mobile Applications


                Disparate security      Integrated security          Federated context-
                 solutions with            solutions for           aware, self-adaptable,
New Key                                   P2P /Ad Hoc               trust based security
Enablers          (very limited)        mobile networking           solutions preserving
                privacy protection      preserving privacy        privacy and anonymity.


                     WiFi                WiFi, UWB, …
                                                                    Multi-Access
Wireless         100 Mpbs++               500 Mpbs++                 “All-IP”
Networks                                                             Ambient
                2G, 2.5G, 3G              IMS, 4G                    Networks


                   Today                         2010                         2020

                                                                                             18
Security and Quality in Organizations
Prof. Jose J. Gonzalez


 Security as continuous improvement process
 Security management
 Effectiveness of Computer Security Incident Response Teams
  (CSIRTs)
 Lifetime of software vulnerabilities
 Patching policies for software vulnerabilities
 Security and safety in eOperations in the oil & gas industry
 Security in organizational transition to adjacencies
 Human factors in security


                                                                 19
Trusted Wireless Short Range Communications




                                              20
WiFi - a disruptive technology


 Today in most laptops and home networks
 in 2-3 years in most main stream phones, cameras, mp3 players,
  game pads, media servers/renderers, …




 SonyEricsson P990   Nokia N80   i-Mate SP5   Qtek 9100   Kodak EasyShare One
                     with UPnP   Qtek 8310


                                                                                21
                                   http://www.boingo.com/

New Business (and early threats)




                                                        22
      WiFi/Cellular Convergence




 http://www.cbronline.com/article_news.asp?guid=C0AB6620-5C75-49A9-95B9-0F30F14C3884




http://www.cbronline.com/article_feature.asp?guid=69843555-B5CF-45D6-BB2A-EA839C616C89




                                                                                         http://www.azairenet.com/products.html

                                                                                                                                  23
New Voice Services for WiFi Phones & PDAs




   http://www.skype.com/download/screenshots.html?os=pocketpc   http://www.sjlabs.com/




                                                                                         24
New WiFi-enabled Services for Mobile Phones




                                    WiFi
                                   e-books




                                              25
Home Media Control




                            MUSIC

   Media Server                                        Media Renderer


                  Control                    Control




                             Control Point

                                                                        26
Interactive TV

     Content
     Provider


    Interactive
    TV Provider



          WiFi

                                            Control (IR, WiFi, via provider, …)
      EPG, infos, payments
      SMS2TV, MMS2TV, …




                             WiFi enabled
                               device
                                                                                  27
Wireless Short Range Communication




              Wireless Short Range Communications
               interconnects all devices & services
                      WiFi, UWB, UPnP/DLNA, …




to Internet




                                                      28
WiFi supports direct Peer-to-Peer Links




                        Peer-2-Peer link




            WiFi
         Access Point



                                           29
  Wireless Short Range Communications


                                  Access
                                  Point 2

                                          “Internet”        Remote Service,
                                                            e.g. news service
            UPnP       Internet Access
            DLNA      & Remote Services

                                                       Home, Workplace
           WiFi, BT     Local Access                   School, Sports Club, …
                       & Local Services
            UWB
                                 Access
                                 Point 1

Wireless
 Peers                                 Local              Local Service
                                      Network
                                                          e.g. file service

                                                                              30
Research Issues

   user privacy and security; bootstrapping of ownership of devices; secure discovery of
    services and devices; trustful establishment of relations between users, networks, and
    services; distributed identity management; wireless ad-hoc protocols in a mixed
    infrastructure and peer-to-peer network; new mobile-to-mobile radio channel models
    and handling; combinations of multi-access and multi-homing for short-range and
    long-distance links; models and tools to abstract technical and business processes
    across system layers and business domains; architectures to describe, monitor, and
    enforce policies by all involved parties; new business models and operator
    opportunities; …




                                                                                             31

								
To top