Call for Participation
Day 1 SUNDAY March
23, 2003 (Four tutorials)
8:30 – 12:30
PM (in Parallel)
2 :00 – 6:00 PM (in Parallel)
Tutorial 4 : TBD
Spray Computers: Explorations in Self-Organization for Pervasive Computing
Professor Franco Zambonelli
Dipartimento di Scienze e Metodi dell'Ingegneria
Universita' di Modena e Reggio Emilia Via Allegri 13, 42100 Reggio Emilia, Italy
Description and Motivation of the Tutorial
Advances in miniaturization, MEMS, wireless communication,
and distributed coordination, will make it possible to
deploy myriads of small communication-enabled computer-based sensors and
actuators in our everyday environments ("smart clouds"). The number
of potential applications of this scenario are endless, ranging from
smart clothes and intelligent interactive environments to self-assembly
materials and self-repairing artifacts. However, for such potentials to be
realized, there is the need of novel approaches to distributed
systems development and management.
On the one hand, to avoid the
unaffordable efforts related to the placement, configuration, and
maintainance of such systems, there is the need of approaches enabling
of deploying components via, say, a spray-like process, and let them
self-organize their activities and self-retune their overall behavior
depending on specific contingencies (e.g., localized faults and
On the other hand, the autonomous and decentralized
nature of the activities in such scenarios, together with the possibly
unpredictable dynamics of the operating environments, is likely to
make those systems exhibit unexptected, "emergent" behaviours - as recent
observations in other types of decentralized networks suggest. Therefore,
there is also the need of appropriate methodologies to predict and
control the emergence of such behaviours and, when possible,
offensively exploit them for the achievement of otherwise
impossible complex distributed tasks.
The tutorial aims at exploring the above issues with a strong application-orientation
(by showing via practical examples and via simulations where and why the above issues arise) and
with a touch of inter-disciplinarity (by analysing potentially-related
research findings in different areas).
To this end, the tutorial is organized as follow.
- it introduces the possible future application scenarios,
as suggested by a brief survey of several recent advances
in microelectronics, communication, and software technology.
it introduces the cloak of invisibility as a challenging
case study, and exploit it as a way to survey and analyse a
relevant number of issues and technologies in self-organization
(i.e., self-localization, routing in dynamic amorphous networks,
fault-tolerance, spontaneous re-organizations).
it introduces the concept of emergent behaviors in complex
networks, by analysing the most relevant examples and by discussing
the implications for pervasive computing scenarios.
it briefly analyses open issues and promising research directions.
The tutorial will give attendees a broad perspective
on the state of the art both in the area of self-organization
technologies/applications (as they pertain to pervasive computing)
and in those areas (such as network sciences, macroecology, complex
systems) which are most likely to impact on future researches in the area.
Level of the Tutorial
Introductory. No background knowledge required.
Detailed Outline of the Tutorial
- A Scenario of 2027
- identification of a set of possible (futuristics and visionary) applications
- Enabling Technologies, The State of the Art in:
- MEMS and smart dusts
- wireless communications
- distributed coordination
- self-organization and networks science
- A Case Study: The Cloak of Invisibility
- the invisible wall: overview, hardware and software issues, related applications
- the spray of invisibility: overview, hardware and software issues, related applications
- the invisible fabric: overview, hardware and software issues, related applications
- From Self-Organization to Emergent Organization
- what is emergence?
- self-organization vs. emergent organization
- examples of emergence: social networks, wide-area networks, and macroecological systems
- demos and simulations
- the case of pervasive computing networks: experiences and speculations
- defending from emergence
- exploiting emergence: intelligent paintings, self-assembly materials, optimization networks, robust networks
- Open Research Directions + Conclusions + Questions
- distributed intelligence and multiagent systems
- programming-level support for self-organizing systems and for spray computers
- general-purpose methodologies
- In the Slides:
- pointers to relevant literature
- pointers to relevant research projects
About the Lecturer
Franco Zambonelli is professor in Computer Science at the University
of Modena and Reggio Emilia, since 2001. He obtained the Laurea degree
in Electronic Engineering in 1992, and the PhD in Computer Science
in 1997, both from the University of Bologna.
His current research interests include: distributed and pervasive computing,
multiagent systems, agent-oriented software engineering. In these areas,
he has published over 90 papers in international fora, co-edited
five books, and has been invited speaker in several workshops and
He is member of the management committee of the European Network of Excellence
"Agentlink II" and, within the same network, coordinator of the Special
Interest Group on "Methodologies and Software Engineering for Agent Systems".
He is a member of IEEE, ACM, AIIA, and TABOO.
"Mobile Commerce: Issues, Applications and Technologies"
Professor Upkar Varshney
Department of CIS, Georgia State University
Nearly all e-commerce applications envisioned and developed so far assume fixed or stationary users with wired infrastructure. This is likely to change as with the emergence and wide spread adoption of wireless and mobile networks, devices, and middleware, many new applications, termed "mobile commerce", are beginning to receive some interest in research and development community. According to estimates by Gartner Group, in 2004, at least 40% of consumer-to-business e-commerce will be initiated from smart phones. A study from the Wireless Data and Computing Service, a division of Strategy Analytics, reports that the worldwide mobile commerce market may rise to $200 Billion by 2004. The report predicts that transactions via wireless devices will generate about $14 Billion a year. In many European countries and Japan with significant wireless penetration, the mobile commerce market is already taking off and reaching billions of dollars a year.
It is to be noted that mobile commerce may require significantly different approaches in design, development, and implementation of applications due to the inherent characteristics of wireless networks and mobile devices. Many interesting and important challenges include design and development of mobile commerce applications, networking requirements, transactions and security issues, business models and strategies. Mobile commerce will also significantly benefit from research in mobile devices, mobile middleware, and wireless network infrastructure. The purpose of this tutorial is to address the important research problems in mobile commerce. We expect that such a tutorial will further fuel the research and development work towards solving many of the research problems in mobile commerce. The tutorial will present and discuss various issues in mobile commerce both from technologies and business application point of views. We will examine how new m-commerce a!
pplications can be designed and supported by wireless and mobile networks and mobile middleware. Many new classes of applications, a proposed mobile commerce framework, requirements, adoption issues, and new opportunities will be presented. As location-based and location-aware services may be some of the first few mobile commerce applications, we will address such applications and how these could be supported by the wireless infrastructure. We will also discuss guidelines for developers of mobile commerce applications.
This tutorial will concentrate on applications, technologies, and related business, regulatory, and implementation issues with mobile commerce.
Mobile Commerce Applications
Frameworks for mobile commerce
Emerging applications (including location and user sensitive mobile advertising, mobile financial applications, mobile inventory, proactive service management, wireless re-engineering)
Design and development of mobile commerce applications (new constraints, approaches, interoperability, processing and storage, desirable features)
Mobile Commerce Technologies
Networking infrastructure requirements for mobile commerce (quality of service, location management, multicast, roaming across networks, reliability)
Location management for mobile commerce (indoors vs outdoors, precision, performance and transaction requirements, multiple location technologies)
Location-aware and user-specific service discovery
Devices, middleware, and operating systems support
Security and transactions in mobile commerce (mobile commerce transactions over wireless networks, new and current security paradigms for m-commerce)
Business, Regulatory, and Implementation Issues
Business models for mobile commerce (pricing and new ways of charging, revenue generation and division among carriers and operators)
Introduction of mobility in business processes
Role of carriers, developers, and regulators
Experiences with implementation of mobile commerce applications
Diverse approaches to mobile commerce (US, Japan, and European) due to technological, cultural, pricing, and regulatory differences
The tutorial will be very useful to people working or planning to enter in the areas of mobile commerce and wireless networks with interest in technology or applications. Professors, graduate students, and industry professionals may want to attend the tutorial.
About the Lecturer
Prof. Upkar Varshney is on the faculty of Computer Information Systems at Georgia State University, Atlanta. He received a Bachelor of Engineering in Electrical Engineering with Honors from University of Roorkee (now Indian Institute of Technology, IIT-Roorkee), MS in Computer Science and a Ph.D. in Telecommunications & Networking, from the University of Missouri-Kansas City. His research and teaching interests include mobile commerce, mobile and wireless networking, and, wireless dependability. He has written over 50 papers in these topics. He has been credited with some of the early research on mobile commerce. Some of his papers are the most widely cited references in mobile commerce.
Prof. Varshney has delivered several keynote speeches and has presented more than 20 extremely well received tutorials and workshops at major international conferences including ACM Mobicom (1999, 2001 and 2002), IEEE WCNC (1999 and 2002), and HICSS (1998, 1999, and 2001). He received Myrone T. Greene Outstanding Teaching Award from Georgia State University in 2000 and RCB College Teaching Award in 2002. He has organized and/or chaired sessions at major international conferences. He is an editor for IEEE Computer and is also on the editorial board of International Journal of Mobile Communications. Recently, he (with Ron Vetter) guest-edited a special issue of ACM Mobile Networks and Applications (MONET) on m-commerce.
Security Issues in Pervasive Wireless IP Networks
Dr. Subir Das, and Dr. Anthony McAuley
Telcordia Technologies Inc.
Dr. Archan Misra
IBM Watson Research
Description and Motivation of the Tutorial
Authentication, authorization, accounting (AAA) and privacy issues have become major issues of concern over new pervasive wireless environments. In particular, the
commercial objectives of providing ubiquitous connectivity to a large, and sometimes transiently connected, set of customers and devices make many conventional
security solutions and architectures inappropriate and infeasible. Moreover, many emerging pervasive computing scenarios employ newer devices (e.g., RFID), which
impose significant constraints on the processing and memory overheads. Providing security (infrastructure as well as user-level) between the network and the pervasive
devices becomes a challenging task, and requires advances in functions such as dynamic user authentication and authorization, dynamic and fast security associations for
roaming or intermittently connected users. Clearly, current approaches, such as traditional offline user subscription mechanisms or device-specific authentication schemes,
will not work under conditions of device and provider heterogeneity and intermittent connectivity. In addition to the conventional concerns of security and authentication,
pervasive computing environments require more serious attention to issues of privacy and access control. Since pervasive devices often generate personalized data (e.g.,
traffic routes and speeds from automobiles, or currently used application from a laptop), it is very important to develop a scalable architecture for ensuring data integrity and
availability to authorized applications/services. This tutorial provides an overview of solutions and challenges in network and transport layers authentication, accounting and
authorization between the provider and the device, and in application-layer privacy and policy-based access control to pervasive data sources and context information.
After a brief overview of pervasive wireless IP network architecture, the tutorial will provide a closer look at security issues in such environments. Security issues
covered will include research issues and open challenges in the following areas:
Protocols and techniques for network AAA and access control
Link-layer-based authentication mechanisms and security (e.g., IEEE 802.1x, RFID)
IP and higher-layer based authentication mechanisms and security (e.g., PANA, RADIUS, Diameter)Data integrity: Standard protocols and techniques (IPSec, IKE, Kerberos)
Dynamic subscriber management and provider selection architectures (e.g., PANA, HTTP-redirect or Web-based login).
Security issues in roaming and handoff management (e.g., Mobile IP-AAA, SIP-AAA)
Securing networking protocols
Protecting DoS attacks
Protecting MiTM attacks
Pervasive service discovery and security
Authentication and Access Control in Service Discovery (e.g., JINI, SLP, SAHARA)
Security and Access Control for Pervasive Data
Security in Data Composition and Access Architectures (e.g., Role-based, Credential-based, etc.)
Audience of the Tutorial
The tutorial is intended for service providers, researchers, educators and graduate students who are interested in understanding the security and authentication aspects
of current and emerging wireless pervasive environments. In addition, those working outside this area, but interested in the operational challenges and solutions
associated with commercial wireless networking, can also get a high level overview of the architectural and protocol solutions used to counteract security threats and
privacy concerns in emerging wireless IP networks and pervasive application scenarios.
Subir Das is a Research Scientist in the Wireless IP networking research department, Telcordia Technologies Inc., Morristown, NJ
since 1999. He received his Ph.D. in Computer Engineering from E & ECE Department, Indian Institute of Technology, Kharagpur. From
1997-98, Dr. Das was a faculty member in the same Department. His current research interests include mobility management in 3G
wireless access systems, security in wireless IP networks, auto-configuration, security of ad hoc mobile networks, and wireless multimedia,.
Anthony McAuley received his PhD from Hull University, England in 1985. He worked as a research fellow in Caltech form 1985-1987. Since
1987 he has been at Telcordia Technologies and is currently a Director in the Wireless IP Networking Research group. His current research
projects include protocols for complete network auto-configuration and architectures and protocols for 3rd generation IP wireless and home
Archan Misra is currently a Research Staff Member at IBM's T J Watson Research Center in Hawthorne, NY, where his current research projects
include distributed, wide-area data composition and querying of pervasive data, architectures for rapidly deployable 802.11-based
hotspot services, and protocols for high-performance wireless data forwarding. While working at Telcordia Technologies from 1997-2000, he
worked extensively on IP-based mobility management solutions and dynamic network auto-configuration protocols. Archan received his
Ph.D. in Electrical and Computer Engineering from the University of Maryland at College Park in 2000.