Skip to main content

Outdoor Distributed Computing with Split Smart Messages

  • Conference paper
Reliable Systems on Unreliable Networked Platforms (Monterey Workshop 2005)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4322))

Included in the following conference series:

  • 276 Accesses

Abstract

In this paper, we exemplify outdoor distributed computing and point out the key challenges. We present Split Smart Messages, a lightweight, portable, network failure resilient and relatively secure middleware that enables a large subset of outdoor distributed computing applications. We also present a Service Discovery, Interaction and Payment Protocol (SDIPP) tailored for mobile phones. We evaluate our middleware and protocol on Sony Ericsson P900 phones and present experimental results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. MIDP Profile. http://wireless.java.sun.com/midp/

  2. Soot: a Java Optimization Framework. http://www.sable.mcgill.ca/soot/

  3. i-mode. http://www.nttdocomo.com/corebiz/imode

  4. Jini Network Technology. http://wwws.sun.com/software/jini

  5. Location privacy protection act (2001), http://www.theorator.com/bills107

  6. Microsoft Upnp Specification

    Google Scholar 

  7. Miscrosoft Authenticode Technology. http://msdn.microsoft.com/library/default.asp

  8. OTA Provisioning. http://java.sun.com/products/midp

  9. Owl web ontology language. http://www.w3.org/TR/owl-features/

  10. PersonalJava. http://java.sun.com/j2me/

  11. Sony Felica Technology. http://www.sony.net/Products/felica

  12. UDDI. http://www.uddi.org

  13. White Paper: Salutation Architecture (1998), http://www.salutation.org/whitepaper/originalwp.pdf

  14. Bluetooth Specification Part E. Service Discovery Protocol (SDP) (1999), http://www.bluetooth.com

  15. Aalto, L., Gothlin, N., Korhonen, J., Ojala, T.: Bluetooth and wap push based location-aware mobile advertising system. In: Proceedings of the 2nd international conference on Mobile systems, applications, and services, Boston, MA, June 2004, pp. 49–58 (2004)

    Google Scholar 

  16. Adjie-Winoto, W., Schwartz, E., Balakrishnan, H., Lilley, J.: The design and implementation of an intentional naming system. In: Proceedings of the seventeenth ACM symposium on Operating systems principles, Charleston, SC, December 1999, pp. 186–201. ACM Press, New York (1999)

    Chapter  Google Scholar 

  17. Arbaugh, W., Farber, D., Smith, J.: A secure and reliable bootstrap architecture. In: IEEE Symposium on Security and Privacy, Oakland, CA, May 1997, pp. 65–71. IEEE Computer Society Press, Los Alamitos (1997)

    Google Scholar 

  18. Bahl, P., Padmanabhan, V.N.: RADAR: An in-building RF-based user location and tracking system. In: INFOCOM (2), Tel-Aviv, Israel, March (2000)

    Google Scholar 

  19. Balan, R., Flinn, J., Satyanarayanan, M., Sin, S., Yang, H.: The case for cyber foraging. In: Proceedings of 10th ACM SIGOPS European Workshop, Saint Emilion, France, September 2002, ACM Press, New York (2002)

    Google Scholar 

  20. Bao, L., Intille, S.S.: Activity recognition from user-annotated acceleration data. In: Ferscha, A., Mattern, F. (eds.) PERVASIVE 2004. LNCS, vol. 3001, Springer, Heidelberg (2004)

    Google Scholar 

  21. Borcea, C., Intanagonwiwat, C., Saxena, A., Iftode, L.: Self-Routing in Pervasive Computing Environments using Smart Messages. In: Proceedings of the 1st IEEE International Conference on Pervasive Computing and Communications (PerCom), Dallas-Fort Worth, Texas, March 2003, pp. 87–96. IEEE Computer Society Press, Los Alamitos (2003)

    Chapter  Google Scholar 

  22. Borisov, N., Brewer, E.: Active certificates: A framework for delegation (2000)

    Google Scholar 

  23. Bouchenak, S., Hagimont, D.: Pickling threads state in the java system. In: Proceedings of the Technology of Object-Oriented Languages and Systems (TOOLS 33), Santa Barbara, CA, August (2000)

    Google Scholar 

  24. Carriero, N., Gelernter, D.: Linda in Context. Communications of the ACM 32(4), 444–458 (1989)

    Article  Google Scholar 

  25. Chen, H., Finin, T., Joshi, A.: An ontology for context-aware pervasive computing environments. Knowledge Engineering Review (Special Issue on Ontologies for Distributed Systems) 18(3), 197–207 (2003)

    Google Scholar 

  26. Wetherall, D.: Active Network Vision Reality: Lessons from a Capsule-based System. In: Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP), Charleston, SC, December 1999, pp. 64–79. ACM Press, New York (1999)

    Google Scholar 

  27. Dabrowski, C., Mills, K., Elder, J.: Understanding consistency maintenance in service discovery architectures during communication failure. In: Proceedings of the third international workshop on Software and performance, Rome, Italy, July, pp. 168–178 (2002)

    Google Scholar 

  28. Fall, K.: A delay tolerant network architecture for challenged internets. In: Proceedings of SIGCOMM, Karlsruhe, Germany, August (2003)

    Google Scholar 

  29. Farmer, W.M., Guttman, J.D., Swarup, V.: Security for mobile agents: Authentication and state appraisal. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) Computer Security - ESORICS 96. LNCS, vol. 1146, Springer, Heidelberg (1996)

    Google Scholar 

  30. Glassman, S., Manasse, M., Abadi, M., Gauthier, P., Sobalvarro, P.: The Millicent protocol for inexpensive electronic commerce. In: Proceedings of the 4th World Wide Web Conference , Boston, MA, December, pp. 603–618 (1995)

    Google Scholar 

  31. Gray, R., Cybenko, G., Kotz, D., Rus, D.: Mobile agents: Motivations and state of the art. In: Bradshaw, J. (ed.) Handbook of Agent Technology, MIT Press, Cambridge (2002)

    Google Scholar 

  32. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the First International Conference on Mobile Systems, Applications, and Services (MobiSys), San Fransisco, CA, May (2003)

    Google Scholar 

  33. Guttman, E.: Service location protocol: Automatic discovery of ip network services. IEEE Internet Computing 3(4), 71–80 (1999), doi:10.1109/4236.780963

    Article  Google Scholar 

  34. Hui, P., Chaintreau, A., Scott, J., Gass, R., Crowcroft, J., Diot, C.: Pocket switched networks and human mobility in conference environments. In: WDTN ’05: Proceeding of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking, Philadelphia, PA, August 2005, ACM Press, New York (2005)

    Google Scholar 

  35. Iftode, L., Borcea, C., Ravi, N., Kang, P., Zhou, P.: Smart phone: An embedded system for universal interactions. In: Proceedings of the tenth International Workshop on Future Trends in Distributed Computing Systems, Suzhou, China, May (2004)

    Google Scholar 

  36. Jansen, W., Karygiannis, T.: Nist special publication 800-19 - mobile agent security (2000)

    Google Scholar 

  37. Kang, P., Borcea, C., Xu, G., Saxena, A., Kremer, U., Iftode, L.: Smart Messages: A Distributed Computing Platform for Networks of Embedded Systems. The Computer Journal, Special Focus-Mobile and Pervasive Computing 47(4), 475–494 (2004)

    Google Scholar 

  38. Karnik, N., Tripathi, A.: Agent Server Architecture for the Ajanta Mobile-Agent System. In: Proceedings of the 1998 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA), Las Vegas, NV, July, pp. 66–73 (1998)

    Google Scholar 

  39. Kindberg, T., Barton, J., Morgan, J., Becker, G., Caswell, D., Debaty, P., Gopal, G., Frid, M., Krishnan, V., Morris, H., Schettino, J., Serra, B., Spasojevic, M.: People, places, things: Web presence for the real world

    Google Scholar 

  40. Lehman, T., Cozzi, A., Xiong, Y., Gottschalk, J., Vasudevan, V., Landis, S., Davis, P., Khavar, B., Bowman, P.: Hitting the distributed computing sweet spot with tspaces. Computer Networks: The International Journal of Computer and Telecommunications Networking 35(4), 457–472 (2001)

    Google Scholar 

  41. Moore, J., Hicks, M., Nettles, S.: Practical Programmable Packets. In: Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), Anchorage, AK, April 2001, pp. 41–50. IEEE Computer Society Press, Los Alamitos (2001)

    Google Scholar 

  42. Necula, G.C.: Proof-carrying code. In: Conference Record of POPL ’97: The 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Paris, France, January 1997, ACM Press, New York (1997)

    Google Scholar 

  43. Nidd, M.: Service Discovery in DEAPspace. In: IEEE Personal Communications (August 2001)

    Google Scholar 

  44. Noble, B.D., Satyanarayanan, M., Narayanan, D., Tilton, J.E., Flinn, J., Walker, K.R.: Agile application-aware adaptation for mobility. In: SOSP ’97: Proceedings of the sixteenth ACM symposium on Operating systems principles, St. Malo, France, October 1997, ACM Press, New York (1997)

    Google Scholar 

  45. Ravi, N., Borcea, C., Kang, P., Iftode, L.: Portable Smart Messages for Ubiquitous Java-enabled Devices. In: The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous), Boston, MA, August (2004)

    Google Scholar 

  46. Ordille, J.J.: When agents roam, who can you trust? In: First Conference on Emerging Technologies and Applications in Communications (etaCOM), Portland, OR, May (1996)

    Google Scholar 

  47. Ousterhout, J.K., Levy, J.Y., Walsh, B.M.: The Safe-Tcl Security Model. Technical Report SMLI TR-97-60, Sun Microsystems (1997)

    Google Scholar 

  48. Boddupalli, P., Al-Bin-Ali, F., Davies, N., Friday, A., Storz, O., Wu, M.: Payment support in ubiquitous computing environments. In: Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications, Monterey, CA, October 2003, IEEE Computer Society Press, Los Alamitos (2003)

    Google Scholar 

  49. Peine, H., Stolpmann, T.: The Architecture of the Ara Platform for Mobile Agents. In: Rothermel, K., Popescu-Zeletin, R. (eds.) MA 1997. LNCS, vol. 1219, pp. 50–61. Springer, Heidelberg (1997)

    Google Scholar 

  50. Priyantha, N.B., Chakraborty, A., Balakrishnan, H.: The cricket location-support system. In: MobiCom ’00: Proceedings of the 6th annual international conference on Mobile computing and networking, Boston, MA, August (2000)

    Google Scholar 

  51. Ranganathan, M., Acharya, A., Sharma, S., Saltz, J.: Network-aware Mobile Programs. In: Proceedings of the USENIX 1997 Annual Technical Conference, Anaheim, CA, January, pp. 91–104 (1997)

    Google Scholar 

  52. Ravi, N., Dandekar, N., Mysore, P., Littman, M.: Activity recognition from accelerometer data. In: Proceedings of the Seventeenth Conference on Innovative Applications of Artificial Intelligence(IAAI), Pittsburgh, PA, July (2005)

    Google Scholar 

  53. Ravi, N., Gruteser, M., Iftode, L.: Non-inference: An information flow control model for location-based services. In: Proceedings of the Third International Conference on Mobile and Ubiquitous Systems (Mobiquitous), San Jose, CA, July (2006)

    Google Scholar 

  54. Ravi, N., Shankar, P., Frankel, A., Elgammal, A., Iftode, L.: Indoor localization using camera phones. In: Proceedings of the Workshop on Mobile Computing Systems and Applications(WMCSA), Washington, USA, April (2006)

    Google Scholar 

  55. Ravi, N., Stern, P., Desai, N., Iftode, L.: Accessing ubiquitous services using smart phones. In: Third International Conference on Pervasive Computing and Communications, Kauai, Hawaii, March (2005)

    Google Scholar 

  56. Roman, M., Campbell, R.: Gaia: Enabling active spaces. In: Proceedings of 9th ACM SIGOPS European Workshop, Kolding, Denmark, September 2000, ACM Press, New York (2000)

    Google Scholar 

  57. Salber, D., Dey, A.K., Abowd, G.D.: The context toolkit: Aiding the development of context-enabled applications. In: Proceedings of CHI, Pittsburgh, PA, May (1999)

    Google Scholar 

  58. Scott, D., Sharp, R., Madhavapeddy, A., Upton, E.: Using visual tags to bypass bluetooth device discovery. SIGMOBILE Mobile Computing and Communications Review 9(1), 41–53 (2005)

    Article  Google Scholar 

  59. Thompson, M., Johnston, W., Mudumbai, S., Hoo, G., Jackson, K., Essiari, A.: Certificate-based access control for widely distributed resources. In: Proceedings of the Eighth USENIX Security Symposium, Monterey, CA, June (1999)

    Google Scholar 

  60. Wahbe, R., Lucco, S., Anderson, T.E., Graham, S.L.: Efficient software-based fault isolation. In: SOSP ’93: Proceedings of the fourteenth ACM symposium on Operating systems principles, Asheville, NC, December 1993, pp. 203–216. ACM Press, New York (1993)

    Chapter  Google Scholar 

  61. Want, R., Hopper, A., Falco, V., Gibbons, J.: The active badge location system. ACM Transactions on Information Systems 10(1), 91–102 (1992)

    Article  Google Scholar 

  62. Zhu, F., Mutka, M., Ni, L.: Splendor: A secure, private, and location-aware service discovery protocol supporting mobile services. In: First International Conference on Pervasive Computing and Communications, Dallas-Fort Worth, Texas, March (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Fabrice Kordon Janos Sztipanovits

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Ravi, N., Iftode, L. (2007). Outdoor Distributed Computing with Split Smart Messages. In: Kordon, F., Sztipanovits, J. (eds) Reliable Systems on Unreliable Networked Platforms. Monterey Workshop 2005. Lecture Notes in Computer Science, vol 4322. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71156-8_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-71156-8_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-71155-1

  • Online ISBN: 978-3-540-71156-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics