Mobile Computing:
Research Survey
UMBC Spring 2012
05/05/2012 Mobile Computing: Research Survey 1
- Joseph Hennawy
Research Advisor: Dr. Anupam Joshi
UMBC Spring 2012
05/05/2012 Mobile Computing: Research Survey 2
Agenda
• Introduction
• Mobile Computing Fields of Challenge
• Data Management
• Security
• Data Mining
• Distributed Databases
• Conclusion & Potential Future Research
UMBC Spring 2012
05/05/2012 Mobile Computing: Research Survey 3
Introduction
The Uniqueness of the mobile environment
• Constrained Communications Capability
• Limited Power Resources
• Frequent Disconnects
• Asymmetric Communications
• Dynamic System Topology
• Limited Node Capabilities
05/05/2012
UMBC Spring 2012
4Mobile Computing: Research Survey
Knowledge Discovery in ubiquitous
environments
• Ubiquitous Technologies used
• Resource Awareness
• Ubiquities data collection
• Ubiquities data computing
05/05/2012
UMBC Spring 2012
5Mobile Computing: Research Survey
Knowledge Discovery in ubiquitous
environments
• Security and Privacy
• Human Computer Interface (HCI)
• Application Area
05/05/2012
UMBC Spring 2012
6Mobile Computing: Research Survey
Data Management challenges
In distributed computing three main
architectures are defined for exchanging data
between system elements:
• Client-server interaction model
• Client-proxy-server interaction model
• Peer-to-peer interaction model
05/05/2012
UMBC Spring 2012
7Mobile Computing: Research Survey
Data Management challenges
• Networking Challenges
• Device discovery
• Routing
• RF and wireless links
05/05/2012
UMBC Spring 2012
8Mobile Computing: Research Survey
Data Management challenges
• Context Awareness Challenges
• Service and Data Discovery
• Mobile location maintenance of network nodes.
• User context and profiling
05/05/2012
UMBC Spring 2012
9Mobile Computing: Research Survey
Data Management challenges
• Distributed Systems Data Management
Challenges
• Distributed Processing and threading
• Distributed systems messaging and communication
• Naming name spaces, and name resolution
• Synchronization
• Consistency and Replication
• Fault tolerance
05/05/2012
UMBC Spring 2012
10Mobile Computing: Research Survey
Developing intelligent Mobile Data
Management systems
• Cross layer intelligent collaboration
• Collaborative intelligence
• Context aware intelligence
05/05/2012
UMBC Spring 2012
11Mobile Computing: Research Survey
Security challenges
• No prior knowledge of participating nodes due to the dynamic
mature of the system.
• At any given point, the composition of the system can be
diverse enough that a centralized node identification, and
authentication is not feasible.
• The possibly fragmentary nature of the system also makes it
harder to perform security tasks as monitoring, intrusion
detection, etc.
• Mobile Systems wireless communications technologies are
broadcast in nature.
05/05/2012
UMBC Spring 2012
12Mobile Computing: Research Survey
Security challenges
• Wireless communications physical characteristics of such
networks make them vulnerable to security threats such as
intrusion, denial of service, masquerading, and tampering.
• Limited processing, memory, storage and power resources
make it harder to implement resource intensive security
processes and functions.
• The collaborative nature of these systems forces them to
disseminate valuable information about system components
and data, without central routing control, or monitoring.
05/05/2012
UMBC Spring 2012
13Mobile Computing: Research Survey
Intrusion Detection in Mobile Systems
• Traditionally intrusion detection techniques fall short in such
environment due to:
• Higher rates of false positives or vice versa due to the unreliable RF
communications environment
• Lack of consistent tracking mechanisms due to the dynamic nature of
the system.
• Lack of a solid definition of a misbehaving node, or fixing a reputation
associated with a given node, due to the heterogeneous nature of the
system, its communications mechanisms and protocols.
• Lake of definition or the existence of a single administrative domain.
• No global view of the networked system, and the reliance on
approximate and localized observations on making intrusion detection
mechanisms.
05/05/2012
UMBC Spring 2012
14Mobile Computing: Research Survey
Intrusion Detection in Mobile Systems
• There is a need for a Distributed Intrusion Detection Systems
(DIDS) that fits the mobile environment.
• Security system is envisioned to use light weight collaborative
data mining of various network and distributed system
communications stack.
• Mining activities will produce, enhance, and match patterns of
attacks, intrusions, misbehavior of particulate nodes.
• These patterns will be fed into machine learning intelligent
agents that will reason, adapt, and enhance, and ask for more
mining activities for a system, or a system segment security.
05/05/2012
UMBC Spring 2012
15Mobile Computing: Research Survey
Node identification, authentication &
privileges
• The assumption of an existing central authentication, and
resource privilege granting entity that does not suffer from
communication reachability issues is not valid.
• Research performed for devices to compute trust and beliefs
about neighboring peers and share them to produce a global
trust and belief picture.
• Research performed in implementing an authentication
framework of where a delegation scheme of authentications,
privileges and roles can be done in a mobile environment to
accommodate nodes joining a system, or a system segment.
05/05/2012
UMBC Spring 2012
16Mobile Computing: Research Survey
Node identification, authentication &
privileges
“ We believe that both trust modeling and authentication
distribution activities can be rolled up in a coherent framework
where both segments can interact to provide a back and forth
credentials, and trust metrics feedback based on the ongoing
member nodes dynamics.
The intrusion detection activities described above can enhance
the proposed framework to offer and intelligent and adaptable
security solution based on mobile data mining, autonomous
machine learning, and a distributed credentials and
authentication engines.”
05/05/2012
UMBC Spring 2012
17Mobile Computing: Research Survey
Data Mining Challenges
• Data mining combines techniques from a variety of field that
includes:
• Statistics
• Machine Learning
• Pattern Recognition
• Database Systems
• Information Retrieval
• World-Wide Web
• Visualization
• Application Specific Domains related to the data being mined
05/05/2012
UMBC Spring 2012
18Mobile Computing: Research Survey
Data Mining Challenges
• Data mining techniques includes:
• Summarization
• Sampling
• Approximation
• Clustering
• Pattern Recognition
• Classification
• Outlier Detection
05/05/2012
UMBC Spring 2012
19Mobile Computing: Research Survey
Data Mining Challenges
• Data Mining Fields related to distributed
systems:
• Stream Data Mining
• Moving Objects Mining
• Web and Text Data Mining
05/05/2012
UMBC Spring 2012
20Mobile Computing: Research Survey
Web and Text Data Mining
• Web mining can be decomposed into three
main styles of mining:
• Web Content Mining
• Web Structure Mining
• Web Usage Mining
05/05/2012
UMBC Spring 2012
21Mobile Computing: Research Survey
Web and Text Data Mining
• For its textual contents, web mining algorithms uses the
common textual data mining techniques such as :
• Information extraction
• Topic tracking
• Summarization
• Categorization
• Clustering
• Concept linkage
• Multimedia web contents and its integration with web textual
contents is still an open field for web mining research activities
with lots of potential promises.
05/05/2012
UMBC Spring 2012
22Mobile Computing: Research Survey
Distributed Databases Challenge
The breakdown of mobile querying
05/05/2012
UMBC Spring 2012
23Mobile Computing: Research Survey
Distributed Databases Challenge
• Mobile databases performance measures in term of reliability,
availability, correctness, and timeliness.
• The usage of heterogynous mobile communication
infrastructures and combining it with using different query
strategies. A layer of intelligence that detects available and
changing infrastructure characteristics and adapt query
strategies.
• Smart resource and data discovery, and fuses that with user
profiles and policies to produced smart automated or semi-
automated queries.
05/05/2012
UMBC Spring 2012
24Mobile Computing: Research Survey
Distributed Databases Challenge
• Sensor network and Mobile databases integration. Such an
integrate can offer a local, or global sensor view based on
database queries or processes or semi-processed sensor data.
• The definition of meta-data needed for multimedia database.
Researching the way the methods of meta-data are being
produced, the ways that meta-data can model multimedia
databases, and expanding the usage of meta-data to be a source
for upper level intelligence functions that builds semantics
based on them is needed.
05/05/2012
UMBC Spring 2012
25Mobile Computing: Research Survey
Distributed Databases Challenge
• Sensor network and Mobile databases integration. Such an
integrate can offer a local, or global sensor view based on
database queries or processes or semi-processed sensor data.
• The definition of meta-data needed for multimedia database.
Researching the way the methods of meta-data are being
produced, the ways that meta-data can model multimedia
databases, and expanding the usage of meta-data to be a source
for upper level intelligence functions that builds semantics
based on them is needed.
05/05/2012
UMBC Spring 2012
26Mobile Computing: Research Survey

More Related Content

PPTX
Cyber Security Architecture - A Systems Approach December 05 2012
PDF
SeaCat: SDN End-to-End Application Containment
PDF
Autonomous Pervasive Systems and the Policy Challenges of a Small World!
PDF
Who has the data ... and will breach the duty of confidence
PDF
WSN Security Research Directions
PDF
Monitoring the Data Center
PDF
NIST SP 800 30 Flow Chart
PPTX
Network Connected Medical Devices - A Case Study
Cyber Security Architecture - A Systems Approach December 05 2012
SeaCat: SDN End-to-End Application Containment
Autonomous Pervasive Systems and the Policy Challenges of a Small World!
Who has the data ... and will breach the duty of confidence
WSN Security Research Directions
Monitoring the Data Center
NIST SP 800 30 Flow Chart
Network Connected Medical Devices - A Case Study

What's hot (20)

PDF
PDF
Framework architecture for improving
PPTX
Critical systems engineering
PDF
Cyber security for manufacturers umuc cadf-ron mcfarland
DOC
IS311 questions
PPT
SGSB Webcast 2 : Smart grid and data security
PPTX
[Wroclaw #6] Medical device security
DOCX
Cloud computing risk assesment report
PPTX
Hm 418 harris ch11 ppt
PPS
02 ibm security for smart grids
PPT
T063500000200201 ppte
PPTX
Introduction to Critical Systems Engineering (CS 5032 2012)
PDF
AFAC session 2 - September 8, 2014
PDF
E1804012536
PPTX
The privacy and security implications of AI, big data and predictive analytics
PDF
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
PDF
IOT Forensic Challenges
PPTX
Medical Device Security: State of the Art -- NoConName, Barcelona, 2011
PDF
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Framework architecture for improving
Critical systems engineering
Cyber security for manufacturers umuc cadf-ron mcfarland
IS311 questions
SGSB Webcast 2 : Smart grid and data security
[Wroclaw #6] Medical device security
Cloud computing risk assesment report
Hm 418 harris ch11 ppt
02 ibm security for smart grids
T063500000200201 ppte
Introduction to Critical Systems Engineering (CS 5032 2012)
AFAC session 2 - September 8, 2014
E1804012536
The privacy and security implications of AI, big data and predictive analytics
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
IOT Forensic Challenges
Medical Device Security: State of the Art -- NoConName, Barcelona, 2011
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Ad

Similar to Mobile Computing - Research Survey May 05 2012 (20)

PPTX
Data management issues
PPT
Mobile computing
PPT
Mobile computing
PPT
Mobile computing
PPTX
1. Introduction to Mobile Computing-1.pptx
PPT
Sonu mobile computing
PDF
Data Mining For Intrusion Detection in Mobile Systems
PDF
Mobile computing
PPTX
Mobile computing
PPT
Chapter30
PPT
Chapter30 (1)
PDF
A Case Study On System Issues And Impact Of Mobility In Wireless Mobile Compu...
PPT
Mobile computing
PDF
Biometric System Penetration in Resource Constrained Mobile Device
PDF
Mobile Technology
PDF
Information Retrieval thru Cellular Devices
PPTX
M.Sc Mobile computing.pptx
DOCX
Mobile Computing by Tapesh Chalisgaonkar
PDF
Trustworthy Ubiquitous Computing 1st Edition Karin Bee
Data management issues
Mobile computing
Mobile computing
Mobile computing
1. Introduction to Mobile Computing-1.pptx
Sonu mobile computing
Data Mining For Intrusion Detection in Mobile Systems
Mobile computing
Mobile computing
Chapter30
Chapter30 (1)
A Case Study On System Issues And Impact Of Mobility In Wireless Mobile Compu...
Mobile computing
Biometric System Penetration in Resource Constrained Mobile Device
Mobile Technology
Information Retrieval thru Cellular Devices
M.Sc Mobile computing.pptx
Mobile Computing by Tapesh Chalisgaonkar
Trustworthy Ubiquitous Computing 1st Edition Karin Bee
Ad

Mobile Computing - Research Survey May 05 2012

  • 1. Mobile Computing: Research Survey UMBC Spring 2012 05/05/2012 Mobile Computing: Research Survey 1 - Joseph Hennawy Research Advisor: Dr. Anupam Joshi
  • 2. UMBC Spring 2012 05/05/2012 Mobile Computing: Research Survey 2 Agenda • Introduction • Mobile Computing Fields of Challenge • Data Management • Security • Data Mining • Distributed Databases • Conclusion & Potential Future Research
  • 3. UMBC Spring 2012 05/05/2012 Mobile Computing: Research Survey 3 Introduction The Uniqueness of the mobile environment • Constrained Communications Capability • Limited Power Resources • Frequent Disconnects • Asymmetric Communications • Dynamic System Topology • Limited Node Capabilities
  • 4. 05/05/2012 UMBC Spring 2012 4Mobile Computing: Research Survey Knowledge Discovery in ubiquitous environments • Ubiquitous Technologies used • Resource Awareness • Ubiquities data collection • Ubiquities data computing
  • 5. 05/05/2012 UMBC Spring 2012 5Mobile Computing: Research Survey Knowledge Discovery in ubiquitous environments • Security and Privacy • Human Computer Interface (HCI) • Application Area
  • 6. 05/05/2012 UMBC Spring 2012 6Mobile Computing: Research Survey Data Management challenges In distributed computing three main architectures are defined for exchanging data between system elements: • Client-server interaction model • Client-proxy-server interaction model • Peer-to-peer interaction model
  • 7. 05/05/2012 UMBC Spring 2012 7Mobile Computing: Research Survey Data Management challenges • Networking Challenges • Device discovery • Routing • RF and wireless links
  • 8. 05/05/2012 UMBC Spring 2012 8Mobile Computing: Research Survey Data Management challenges • Context Awareness Challenges • Service and Data Discovery • Mobile location maintenance of network nodes. • User context and profiling
  • 9. 05/05/2012 UMBC Spring 2012 9Mobile Computing: Research Survey Data Management challenges • Distributed Systems Data Management Challenges • Distributed Processing and threading • Distributed systems messaging and communication • Naming name spaces, and name resolution • Synchronization • Consistency and Replication • Fault tolerance
  • 10. 05/05/2012 UMBC Spring 2012 10Mobile Computing: Research Survey Developing intelligent Mobile Data Management systems • Cross layer intelligent collaboration • Collaborative intelligence • Context aware intelligence
  • 11. 05/05/2012 UMBC Spring 2012 11Mobile Computing: Research Survey Security challenges • No prior knowledge of participating nodes due to the dynamic mature of the system. • At any given point, the composition of the system can be diverse enough that a centralized node identification, and authentication is not feasible. • The possibly fragmentary nature of the system also makes it harder to perform security tasks as monitoring, intrusion detection, etc. • Mobile Systems wireless communications technologies are broadcast in nature.
  • 12. 05/05/2012 UMBC Spring 2012 12Mobile Computing: Research Survey Security challenges • Wireless communications physical characteristics of such networks make them vulnerable to security threats such as intrusion, denial of service, masquerading, and tampering. • Limited processing, memory, storage and power resources make it harder to implement resource intensive security processes and functions. • The collaborative nature of these systems forces them to disseminate valuable information about system components and data, without central routing control, or monitoring.
  • 13. 05/05/2012 UMBC Spring 2012 13Mobile Computing: Research Survey Intrusion Detection in Mobile Systems • Traditionally intrusion detection techniques fall short in such environment due to: • Higher rates of false positives or vice versa due to the unreliable RF communications environment • Lack of consistent tracking mechanisms due to the dynamic nature of the system. • Lack of a solid definition of a misbehaving node, or fixing a reputation associated with a given node, due to the heterogeneous nature of the system, its communications mechanisms and protocols. • Lake of definition or the existence of a single administrative domain. • No global view of the networked system, and the reliance on approximate and localized observations on making intrusion detection mechanisms.
  • 14. 05/05/2012 UMBC Spring 2012 14Mobile Computing: Research Survey Intrusion Detection in Mobile Systems • There is a need for a Distributed Intrusion Detection Systems (DIDS) that fits the mobile environment. • Security system is envisioned to use light weight collaborative data mining of various network and distributed system communications stack. • Mining activities will produce, enhance, and match patterns of attacks, intrusions, misbehavior of particulate nodes. • These patterns will be fed into machine learning intelligent agents that will reason, adapt, and enhance, and ask for more mining activities for a system, or a system segment security.
  • 15. 05/05/2012 UMBC Spring 2012 15Mobile Computing: Research Survey Node identification, authentication & privileges • The assumption of an existing central authentication, and resource privilege granting entity that does not suffer from communication reachability issues is not valid. • Research performed for devices to compute trust and beliefs about neighboring peers and share them to produce a global trust and belief picture. • Research performed in implementing an authentication framework of where a delegation scheme of authentications, privileges and roles can be done in a mobile environment to accommodate nodes joining a system, or a system segment.
  • 16. 05/05/2012 UMBC Spring 2012 16Mobile Computing: Research Survey Node identification, authentication & privileges “ We believe that both trust modeling and authentication distribution activities can be rolled up in a coherent framework where both segments can interact to provide a back and forth credentials, and trust metrics feedback based on the ongoing member nodes dynamics. The intrusion detection activities described above can enhance the proposed framework to offer and intelligent and adaptable security solution based on mobile data mining, autonomous machine learning, and a distributed credentials and authentication engines.”
  • 17. 05/05/2012 UMBC Spring 2012 17Mobile Computing: Research Survey Data Mining Challenges • Data mining combines techniques from a variety of field that includes: • Statistics • Machine Learning • Pattern Recognition • Database Systems • Information Retrieval • World-Wide Web • Visualization • Application Specific Domains related to the data being mined
  • 18. 05/05/2012 UMBC Spring 2012 18Mobile Computing: Research Survey Data Mining Challenges • Data mining techniques includes: • Summarization • Sampling • Approximation • Clustering • Pattern Recognition • Classification • Outlier Detection
  • 19. 05/05/2012 UMBC Spring 2012 19Mobile Computing: Research Survey Data Mining Challenges • Data Mining Fields related to distributed systems: • Stream Data Mining • Moving Objects Mining • Web and Text Data Mining
  • 20. 05/05/2012 UMBC Spring 2012 20Mobile Computing: Research Survey Web and Text Data Mining • Web mining can be decomposed into three main styles of mining: • Web Content Mining • Web Structure Mining • Web Usage Mining
  • 21. 05/05/2012 UMBC Spring 2012 21Mobile Computing: Research Survey Web and Text Data Mining • For its textual contents, web mining algorithms uses the common textual data mining techniques such as : • Information extraction • Topic tracking • Summarization • Categorization • Clustering • Concept linkage • Multimedia web contents and its integration with web textual contents is still an open field for web mining research activities with lots of potential promises.
  • 22. 05/05/2012 UMBC Spring 2012 22Mobile Computing: Research Survey Distributed Databases Challenge The breakdown of mobile querying
  • 23. 05/05/2012 UMBC Spring 2012 23Mobile Computing: Research Survey Distributed Databases Challenge • Mobile databases performance measures in term of reliability, availability, correctness, and timeliness. • The usage of heterogynous mobile communication infrastructures and combining it with using different query strategies. A layer of intelligence that detects available and changing infrastructure characteristics and adapt query strategies. • Smart resource and data discovery, and fuses that with user profiles and policies to produced smart automated or semi- automated queries.
  • 24. 05/05/2012 UMBC Spring 2012 24Mobile Computing: Research Survey Distributed Databases Challenge • Sensor network and Mobile databases integration. Such an integrate can offer a local, or global sensor view based on database queries or processes or semi-processed sensor data. • The definition of meta-data needed for multimedia database. Researching the way the methods of meta-data are being produced, the ways that meta-data can model multimedia databases, and expanding the usage of meta-data to be a source for upper level intelligence functions that builds semantics based on them is needed.
  • 25. 05/05/2012 UMBC Spring 2012 25Mobile Computing: Research Survey Distributed Databases Challenge • Sensor network and Mobile databases integration. Such an integrate can offer a local, or global sensor view based on database queries or processes or semi-processed sensor data. • The definition of meta-data needed for multimedia database. Researching the way the methods of meta-data are being produced, the ways that meta-data can model multimedia databases, and expanding the usage of meta-data to be a source for upper level intelligence functions that builds semantics based on them is needed.
  • 26. 05/05/2012 UMBC Spring 2012 26Mobile Computing: Research Survey