17
From Ubiquitous Computing to Internet of Everything: Challenges and Opportunities Paul Patras

From Ubiquitous Computing to Internet of Everything ... · Internet Protocol addresses, be embedded in complex systems and use sensors to obtain information from their environment

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: From Ubiquitous Computing to Internet of Everything ... · Internet Protocol addresses, be embedded in complex systems and use sensors to obtain information from their environment

FromUbiquitousComputingtoInternetofEverything:

ChallengesandOpportunitiesPaulPatras

Page 2: From Ubiquitous Computing to Internet of Everything ... · Internet Protocol addresses, be embedded in complex systems and use sensors to obtain information from their environment

Hypeorgenuineevolution?

1988

MarkWeiss(XeroxPARC)– UbiquitousComputing

“…hundredsofwirelesscomputingdevicesperpersonperoffice,ofallscales[…]ThisisdifferentfromPDA's,dynabooks,orinformationatyourfingertips.Itisinvisible,everywherecomputingthatdoesnotliveonapersonaldeviceofanysort,butisinthewoodworkeverywhere.[…]itshighestidealistomakeacomputersoimbedded,sofitting,sonatural,thatweuseitwithouteventhinkingaboutit.”

1999- 2002

NeilGershenfeld (MITMediaLab)“inretrospectitlooksliketherapidgrowthoftheWorldWideWebmayhavebeenjustthetriggerchargethatisnowsettingofftherealexplosion,asthingsstarttousetheNet.”

KevinAshton(Auto-ID@MIT)– InternetofThings

“Weneedaninternetforthings,astandardizedwayforcomputerstounderstandtherealworld”

2005

ITUInternetReport:TheInternetofThings

“alwaysoncommunications,inwhichnewubiquitoustechnologies(suchasradio-frequencyidentificationandsensors)promiseaworldofnetworkedandinterconnecteddevices(e.g.fridge,television,vehicle,garagedoor,etc.)thatproviderelevantcontentandinformationwhateverthelocationoftheuser– heraldingthedawnofanewera,oneinwhichtheinternet(ofdataandpeople)acquiresanewdimensiontobecomeanInternetofThings.”

2009

EC,IoT — AnactionplanforEurope

“networkofinterconnectedobjects,frombookstocars,fromelectricalappliancestofood[…].TheseobjectswillsometimeshavetheirownInternetProtocoladdresses,beembeddedincomplexsystemsandusesensorstoobtaininformationfromtheirenvironment[…]and/oruseactuatorstointeractwithit”.

2013

Cisco– coins InternetofEverything

“TheInternetofEverything(IoE)bringstogetherpeople,processes,data,andthingstomakenetworkedconnectionsmorerelevantandvaluablethaneverbefore– turninginformationintoactionsthatcreatenewcapabilities,richerexperiences,andunprecedentedeconomicopportunityforbusinesses,individuals,andcountries.”

Page 3: From Ubiquitous Computing to Internet of Everything ... · Internet Protocol addresses, be embedded in complex systems and use sensors to obtain information from their environment

Numerousopportunities

Healthcareandassistedliving

Transportation

Environmentmonitoringandagriculture

Smartbuildings

Manymore

Page 4: From Ubiquitous Computing to Internet of Everything ... · Internet Protocol addresses, be embedded in complex systems and use sensors to obtain information from their environment

Interconnectingmanydevicesthatexchange(big)dataischallengingHowtomodelandpredictthebehaviourofcomplexsystems?Howtoensurereliableconnectivityandoptimallysharecommunictions infrastructure?Howtoaggregatelargedatasetsandexploitonlycontextspecificinformationinreal-time?Howtopreserveuserprivacywhileachievingsomeutilityfromdataprocessing?HowtoensureInternet-connected‘things’aresecureandeasytouse?

Page 5: From Ubiquitous Computing to Internet of Everything ... · Internet Protocol addresses, be embedded in complex systems and use sensors to obtain information from their environment

Differentperspectivesneeded

UKresearcherswroteUbicomp manifestoin2006* – somechallengesfacingubiquitoussystemdesignstillhold

Theoreticalperspective: rigorousmodelsthatcapturesystembehaviouratdifferentlevelsofabstraction.

Engineeringperspective:architecturalandnetworkchallengesposedbylargescale,heterogeneous,anddynamicnature.

Experienceperspective:understandwhatprinciplesunderpinhuman-machineinteractionandhowaubiquitouscomputingsocietymightbeshapedfromasocio-technicalperspective.

*D.Chalmers,M.Chalmers,J.Crowcroft,M.Kwiatkowska,R.Milner,E.O’Neill,T.Rodden,V.Sassone,M.Sloman,“UbiquitousComputing:Experience,DesignandScience”,AGrandChallengeinComputingResearchsponsoredbytheUKComputingResearchCommittee,2006.

Page 6: From Ubiquitous Computing to Internet of Everything ... · Internet Protocol addresses, be embedded in complex systems and use sensors to obtain information from their environment

Applicationspecificchallenges

Computationally/energyconstrainedvsunconstraineddevices

Communicationtype(decentralisedvsscheduledandrange(longvsshort)

Userinterface(display,keys,touch,voice,gestures)

Page 7: From Ubiquitous Computing to Internet of Everything ... · Internet Protocol addresses, be embedded in complex systems and use sensors to obtain information from their environment

Example:Wristbandfitnesstrackers(activity,sleep,heartratemonitoring)

Page 8: From Ubiquitous Computing to Internet of Everything ... · Internet Protocol addresses, be embedded in complex systems and use sensors to obtain information from their environment

Operationmodel

Adaptedfromsecurelist.com

Page 9: From Ubiquitous Computing to Internet of Everything ... · Internet Protocol addresses, be embedded in complex systems and use sensors to obtain information from their environment

Surveillanceat10,000m

13devicesdetectedwithin<1minute

Page 10: From Ubiquitous Computing to Internet of Everything ... · Internet Protocol addresses, be embedded in complex systems and use sensors to obtain information from their environment

Securitystillanafterthought

• Interceptingsensitivepersonalinformationispossible• Injectionoffakeactivityreportstogainrewards• Compromisingvictim’spersonalstatistics

H.Fereidooni,J.Classen,T.Spink,P.Patras,M.Miettinen,A.-R.Sadeghi,M.Hollick,M.Conti,"BreakingFitnessRecordswithoutMoving:ReverseEngineeringandSpoofingFitbit",toappearinProc.RAID,Atlanta,GA,USA,Sept.2017.

Page 11: From Ubiquitous Computing to Internet of Everything ... · Internet Protocol addresses, be embedded in complex systems and use sensors to obtain information from their environment

SmartHomesArangeofappliancescontrollableviaamobileapp

Source:eurocomms.com

Page 12: From Ubiquitous Computing to Internet of Everything ... · Internet Protocol addresses, be embedded in complex systems and use sensors to obtain information from their environment

Obviousbenefits…

• Lowercarbonfootprint

• Personalisation(accesscontrol)

• Increasedcomfortandsafety(?)

Page 13: From Ubiquitous Computing to Internet of Everything ... · Internet Protocol addresses, be embedded in complex systems and use sensors to obtain information from their environment

…comewithrisks

• Communicationagainwirelessandsubjecttoabuse

• Controlviasoftware(app)– riskofmalwareandprivilegesabuse

• Hijackingandweaponisation

Page 14: From Ubiquitous Computing to Internet of Everything ... · Internet Protocol addresses, be embedded in complex systems and use sensors to obtain information from their environment

Example:Takingdownasurveillancecamera

Wirelesscamera Homewirelessrouter

Rogueaccesspoint

De-authenticationImpersonatehomerouter

Re-authentication+Videostreaminterception

Page 15: From Ubiquitous Computing to Internet of Everything ... · Internet Protocol addresses, be embedded in complex systems and use sensors to obtain information from their environment

Example:FakingIoT deviceandexploitinggenerousapppermission

Page 16: From Ubiquitous Computing to Internet of Everything ... · Internet Protocol addresses, be embedded in complex systems and use sensors to obtain information from their environment

Example:FakingIoT deviceandexploitinggenerousapppermission

• Possibletoaskphoneapptosendphotostakenbyuser,listofcontacts,andothersensitiveinformation

Page 17: From Ubiquitous Computing to Internet of Everything ... · Internet Protocol addresses, be embedded in complex systems and use sensors to obtain information from their environment

Whatwecando

Helpdesignsystemswithscalabilityinmind.

Worktoachievestrongencryptionwithlimitedcomputingcapabilities.

Standardisesecuritybydesign.

Definesustainabledevelopmentofnewdevices.

Traindevelopers/engineersthatunderstandembeddedsystems,programming,andsecurity.