57
User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Embed Size (px)

Citation preview

Page 1: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

User Access of Public Shared Devices in Pervasive Computing

Environments

David JeaIan Yap

Mani SrivastavaNESL, UCLA EE

Page 2: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Overview

• Scenario:

• Goal:– To explore how to use body sensor networks with per

vasive computing devices to support health-care applications.

• Public Shared Devices:– Sensors or actuators that are embedded in our surrou

ndings and serve as information sources.

Page 3: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Outline

• Introduction

• Related Work

• Problem Statement

• Proposed Solution

• Preliminary Design

• Prototype Experiments

• Next Steps

Page 4: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Bermuda Triangle of health care

• Thousands of “handoffs” occur in hospitals every day and devastating mistakes can happen during them.

• Recent trends have increased the risk during handoffs.– Nurse shortage and more temporary staffs.– Fewer working hours for medical interns and more fre

quent handoffs.– Ever-growing tangle of wires and tubes. (“the spaghet

ti effect”)• All about unnoticed & unrectified small mistakes

– If you add them up they correlated strongly!!

*Gautam Naik, “New Formula: A Hospital Races to Learn Lessons of Ferrari Pit Stop”, The Wall Street Jounal, Nov. 2006*Laura Landro, ”Hospitals combat errors at the ‘hand-off’, the Wall Street Journal, June 28. 2006

Page 5: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Technical Errors per Handover –A case study from Britain’s largest children’s hospital

Great Ormond Street Hospital

*This is only a partial diagram, some materials have been removed due to space constraints and their irrelevance to this talk.*K. R. Catchpole, et al., “Patient handover from surgery to intensive care: using Formula 1 pit-stop and aviation modelsto improve safety and quality”, Pediatric Anesthesia 2007.

Page 6: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Human Factors

• I've lost track of the number of times I've checked on my ER patients and found them totally disconnected from their monitoring devices. Usually it's because they were taken out of the department for tests and when they were returned, they were just put in the room without being reattached.

• Patients also have a habit of removing their own SpO2 sensors, BP cuffs and even tele because they "got tired of it."

*Quoted from a reply from a RN-ASN (Registered Nurse, Associate of Science In Nursing) that answers the questions the author has posted on online forum.

Page 7: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Challenges

• Many Challenges– Prehandover: Are the devices set yet?– Equipment and technology handover– Information handover: How does information flow?– Information omissions: Did you miss something?

• Our research aim following two challenges in the equipment and technology handover– Is the patient physically attaching to a device?– How to associate-disassociate-reassociate a device w

ith a patient?

Page 8: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Design Considerations

• The two questions should be addressed with these cretiria in mind.– Devices are wireless connected

• Less noticeable "hardware" may also help lessen patient anxiety.*

• How to achieve demonstrative identity?

– Intuitive & friendly interface that minimizes user-interaction.

• Something that the demented can't play with (and) remove would be wonderful. **

*Quote from a certified emergency nurse working in a Level I trauma center & burn center.**Quote from a LPN(licensed practical nurse) / LVN(licensed vocational nurse)***Both are the replys that the author has received from the questions asked on online forums

Page 9: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Introduction

• Pervasive computing devices– Shared by the public– Temporarily participate in a user's BSN to

provide private services or data.

• Three phases to access a device:– Login, Maintain a session, and Logout

• Four Aspects:– selectivity, identity, usability, security

Page 10: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Introduction

• Selectivity?(Multiple devices)

• Identity? (Multiple users)

• Usability?

• Security?

PINCODE?

Page 11: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Related Work

• Device Association: Commodity– Bluetooth

• Numeric Comparison Model: The user manually compares and confirms integrity checksum.

• Passkey Entry Model: Display the secret passkey on first device and type it into the second device.

• Out-of-band Model: Near Field Communication (NFC) to exchange of key commitments

– Wi-Fi Protected Setup• In-band: user entering shared secret passkey• Out-of-band: USB Flash or NFC

– Wireless USB• Cable model: Key transfer on wired USB• Numric Model: The user compares short integrity checksum

*J Suomalainen, el al., “Security Associations in Personal Networks: A Comparative Analysis.” Technical Report NRC-TR-2007-004, Nokia Research Center, 2007.

Page 12: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Related Work

• Device Pairing: Out-of-Band

– Resurrecting Duckling Security Model(F Stajano, R Anderson, 1999): Physical Contact

– Talking To Strangers (D Balfanz, et al., 2002): Infrared

• Location-limited channel: user can precisely control which devices s/he is communicating with.

– Seeing is Believing, (J M McCune, et al., 2005): Video

– Loud and Clear, (M T Goodrich, et al., 2006): Audio

Page 13: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Related Work

• Context-based Access Control– Zero-Interaction Authentication (M Corner, B Noble, 2

002)

– Context-Aware User Authentication, Proximity-Based Login (J E Bardram, et al., 2003)

– Proximity Based Access Control (S Gupta, et al., 2006)

– Generalized Role-Based Access Control (GRBAC) , (M J Moyer, et al., 2001)

– Dynamic Role Based Access Control model (DRBAC) , (G Zhang, et al., 2004)

Page 14: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Problem StatementExisting Wireless Technology

Location-limited channels

Context-based

Login Low usability, especially when logging into multiple nodes

Moderate usability, user must visit nodes one by one

No selectivity among nodes

Logout Receives a command and/or lost signal

Logged out when heartbeat signal lost

Logged out when the context changes

Page 15: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Problem Statement

Existing Wireless Technology

Location-limited channels

Context-based

Maintain a session

Without explicitly logging out the nodes, a possible identity confusion

Either only one node at a time or the allowed proximity is rather constrained

To continuously detect the context

Page 16: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Design Pitfall

• The context to gain access control of a device is not necessarily the context to maintain a session and/or the context to release the access control.

• Moreover, the fact that someone is connected to a device is insufficient to describe whether the same user is using it.

Page 17: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Proposed Solution

• Initiation-context– Binds the devices to the user– Location-limited channels for selectivity and usability.

• Session-context– The user connection state for this usage session.– Security: Trust and Privacy

• Govern-context– The physical state of the user to the device.– Identity: if the user is physically using the device.

Page 18: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Design Guideline

• State Diagram

Start

Login

DataCollection

Logout

Initiation-context Maintain aSession

Govern-context

Session-context

Session-context

Govern-context

Session-context

Stop

Page 19: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Prototype System and Experiments

Blinking LED(User ID, MOD)

EKE: proof-of-knowledge, session key

Context Proximity: Matchmaking to establish Govern-Context and Session-Context

Mismatch of context: Detachment and Termination

(1) (2)

(3) (4)

Page 20: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Technical Details

• Initiation Context: LED channel– The Blinking LED (BSN Node) – The Illumimote Light Sensor (Ambient Node) – Protocol:

• The BSN generates a random number and flashes it (w/ synchronization symbol) on the LED channel.

• The light sensing module of the ambient sensor node reads in the LED sequence.

• Password authenticated key exchange protocols (EKE) to authenticate both parties and establish a session key.

• Govern Context: Accelerometer– One accelerometer to the user and one accelerometer to the bik

e trainer. – Two accelerometers experience similar phenomenon that have c

lose dominant frequencies (context matching).

Page 21: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Experiment Setups

LED

Body Sensor Networks

Gateway

Authtication

Context / Data Source

Authentication / Cluster Head

Accelerometer

Context / Data Source

AccelerometerLightBluetooth

Ambient Sensors

Base Station

Page 22: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Physical Setups

BSN node,LED sensor, Initiation context

Ambient Sensor, Light sensor, Cluster head

BSN node, Accelerometer, Data Source

Ambient Sensor, Accelerometer, Data Source (mount on pedal)

Experiment Setup

BSN Base Station

The second user is on the bike. He has no BSN.

Ambient Sensor, Accelerometer, Data Source (mount on pedal)

Page 23: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Experiment Results

• The first user on the bike• Context match

– The BSN node on foot and the ambient sensor on pedal have close dominant frequency

• Gevern Context true: the base station allows data of ambient sensors to be displayed

• The second user on the bike• Context mismatch• Gevern Context false: the BSN base station (o

f first user) now disables data streams from ambient sensors

Page 24: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Context Matching using Coherence

• “Are you with me?”, J. Lester, et al., UWash

Page 25: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Scenario 1

• User A rides on Bike A• Coherence

– 0.3Hz to 3.5 Hz

• Mean: 0.956075• Std: 0.05319

400

450

500

550

600

650

700

750

1 8 15 22 29 36 43 50 57 64 71 78 85 92 99 106 113 120 127

0.75

0.8

0.85

0.9

0.95

1

0.3906 0.7812 1.1719 1.5625 1.9531 2.3438 2.7344 3.125 3.5156

f (Hz)

Coh

eren

ce

Page 26: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Scenario 2

• User A rides on Bike B,

User B rides on Bike A,

In sync intentionally.• Coherence

– 0.3Hz to 3.5 Hz

• Mean: 0.706725• Std: 0.29166

300

350

400

450

500

550

600

650

700

1 9 17 25 33 41 49 57 65 73 81 89 97 105 113 121129

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

0.3906 0.7812 1.1719 1.5625 1.9531 2.3438 2.7344 3.125 3.5156

f(Hz)

Coh

eren

ce

Page 27: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Discussion

• Inconclusive result due to high packet loss rates (25% - 50%), corrupted packets, and limited subjects.

• Sensors are mounted on two different entities (bike pedal and user ankle), thus signals in higher frequencies are uncorrelated.– 0 to 10Hz in “Are you with me?” work– 0.3 to 3.5 Hz in this work

Page 28: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Next Step – Estranged Nodes

• The estranged devices requires a transfer of ownership from one BSN to a different BSN.

Page 29: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Reliable Transfer of Ownership for Estranged Embedded Devices

Ian Yap David Jea

Mani SrivastavaNESL, UCLA EE

Page 30: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Outline

• Introduction

• Overview of Node Estrangement Problem

• Related Work

• Disassociation

• Reassociation

• Group security

• Implementation Overview

Page 31: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Disaster Relief

Page 32: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Problem?

• If a sensor node belonging to one patient is accidentally/intentionally put on another patient, this node should recognize being under a foreign network and estranged by former network

• Former network also needs to take action in disowning the estranged node to revoke its access

Page 33: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Hospital

Page 34: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Problem too?

• Display device currently paired with patient is moved away to the bedside of another patient.

• This display device needs to be disassociated with first patient and reassociated with second patient

Page 35: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

What is an estrangement?

• An estranged device has violated some principle/rule of the BSN it was part of and is no longer its member

• In this work, a device becomes estranged when:

1. it is not on a person who is/was using it

2. it no longer performs the expected functionality for the person using it

Page 36: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

How to detect estrangement?

• Biometric data – Works for biometric sensors of a BSN– Major assumption: An estranged node will honestly

report that it fails to collect the biometric data.

• Distance bounding– Non-biometric sensors or other devices– An estimation to whether the devices are within the

vicinity of the BSN. – Major assumption: The right equipment to do distance

bounding available

Page 37: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

• “BSN (Central) Interface Device”– Yes, this is a ComPuTer– Central Computing Device and Data Repository– Directs all BSN operations and regulates access/performs

induction/disassociation of nodes– Comprises of several components in this implementation– Is usually a mobile device

• “Body Sensor”– Provides one specific context data collected on the patient it is being

used by

• “SPO2 Sensor”– A special pulse oximeter sensor that can measure the patient’s heart-

rate based on the light absorption level of an LED-illuminated skin

Terminology for this work

Figures not to scale

Page 38: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Some Related Work

• Biometric key to associate BSN sensors– Arizona State University [Cherukuri03] : Heart-Rate Variation– Chinese University of Hong Kong [Poon05] : Inter-Pulse Interval

• Bind external devices to BSNs– Phillips Research Labs[Baldus04] : Custom-made touch-based pen to

associate devices– Univ. of Florida[Zhang05] : Location-aware Sensor Network

• However, they do not tackle the problem of disassociation and reassociation of relationships among these internal or external nodes.

Page 39: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Three Variables of the Problem

• Human awareness vs unawareness of estrangement

– Is a human conscious of estrangement?

• Central Device for one or multiple patients

– What is the role of the Central Device?

• Untrusted estranged device vs trusted estranged device

– Malicious or harmless estranged device?

Page 40: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Proposed solutions for permutations of problem

Central device on every unique patient

Central device for more than one patient

Defending against Malicious Attack

Non-biometric context such as distance-bounding necessary

Non-biometric context such as distance-bounding necessary

Defending against harmless mistake

Biometric context reported by estranged device

Biometric context reported by estranged context

Page 41: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Disassociation

• Former BSN needs to prevent estranged node from ever eavesdropping

• Whatever confidential information estranged node has should be invalidated, but this is only guaranteed if that node can be trusted

• New BSN recalculates new shared group key for its remaining nodes

Page 42: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Reassociation

• Estranged node plans to join a new BSN

• New BSN needs to detect presence of a new node

• Estranged node will become part of the new BSN

Page 43: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Overview of Group Key

• Group key is necessary to provide a shared secret among the BSN’s members

• However, the group key needs to efficiently deal with nodes that enter or leave dynamically

• My group key protocol is a modification of the algorithm presented in [Cho ‘05]

• Their protocol uses public and private keys which I have replaced with the LED proximity-based authentication

Page 44: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Adding new node

Body Sensor i

BSN Central DeviceZkeyi

LED authentication

Computes Gkey

Xi and Over the insecure channel

Computes Gkey

Page 45: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Implementation

• Solve the non-malicious estranged device problem with the use of dynamic context detection

• The dynamic context to monitor is the heart-beat rate’s variation

• Proof of concept of using body sensor data to recognize device estrangement

Page 46: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Demo BSN System Architecture

Body Sensor Gateway

BSN Interface Device

Bluetooth

Wearable BSN

ZigBee ZigBee

Body Sensor(Accelerometer)

Body Sensor(Accelerometer)

Body Sensor (SpO2)

BSN CentralCommand

LED

Light Sensor

Page 47: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Body Sensor Gateway

Body Sensor Manager

HTTP Web Server

AJAX Front-End

Python

Python

Javascript/HTML

C

Bluetooth

IPC RPC

HTTP

BSN Interface Device

BSN Interface Device

Written in: Component Name: Where it is running:

Body Sensor RealmC MicaZ

ZigBee

BSN Interface Device

BSN Interface Device’s ZigBee Gateway

Brief Software Architecture

Page 48: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Tale of Two Patients

Patient A Patient B

Patient A has an SPO2 on him

Patient B does not

IBM laptop Nokia N770

Page 49: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Patient A Patient B

The SPO2 sensor is Authenticated

IBM laptop Nokia N770

Page 50: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Patient A Patient B

The SPO2 measures Patient A’s heart-rate

IBM laptop Nokia N770

Page 51: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Setting Estrangement Rules on Patient A

Page 52: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Patient A Patient B

SPO2 moved to Patient B

IBM laptop Nokia N770

Page 53: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Patient A Patient B

Patient A’s Interface Device detects estrangement due to change in HeartBeat Rate

Recommends for Disassociation

IBM laptop Nokia N770

Page 54: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Patient A Patient B

After Disassociation, new group recalculated, and device available for use

Patient B is allowed to induct SPO2 into his BSN

IBM laptop Nokia N770

Page 55: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Conclusion & Future Directions

• This thesis has come together based on research through an array of fields spanning body sensor networks, secure device pairing, and context-aware systems/protocols.

• The solution presented here demonstrates the detection of an estranged device based on the biometric data it has collected, and also the procedure to resolve it

• I hope this can potentially open up more research.1.Other contexts for detection of estrangement2.Syntax to define rules of estrangement3.Malicious estranged device cases

Page 56: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

Acknowledgments

• Much appreciation goes out to :– Advisor Prof Mani Srivastava– David Jea– Zainul Charbiwala– Jonathan Friedman– Rest of NESL for the technical advice and

equipment support

Page 57: User Access of Public Shared Devices in Pervasive Computing Environments David Jea Ian Yap Mani Srivastava NESL, UCLA EE

END