Abstract
In this paper, we exemplify outdoor distributed computing and point out the key challenges. We present Split Smart Messages, a lightweight, portable, network failure resilient and relatively secure middleware that enables a large subset of outdoor distributed computing applications. We also present a Service Discovery, Interaction and Payment Protocol (SDIPP) tailored for mobile phones. We evaluate our middleware and protocol on Sony Ericsson P900 phones and present experimental results.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
MIDP Profile. http://wireless.java.sun.com/midp/
Soot: a Java Optimization Framework. http://www.sable.mcgill.ca/soot/
Jini Network Technology. http://wwws.sun.com/software/jini
Location privacy protection act (2001), http://www.theorator.com/bills107
Microsoft Upnp Specification
Miscrosoft Authenticode Technology. http://msdn.microsoft.com/library/default.asp
OTA Provisioning. http://java.sun.com/products/midp
Owl web ontology language. http://www.w3.org/TR/owl-features/
PersonalJava. http://java.sun.com/j2me/
Sony Felica Technology. http://www.sony.net/Products/felica
UDDI. http://www.uddi.org
White Paper: Salutation Architecture (1998), http://www.salutation.org/whitepaper/originalwp.pdf
Bluetooth Specification Part E. Service Discovery Protocol (SDP) (1999), http://www.bluetooth.com
Aalto, L., Gothlin, N., Korhonen, J., Ojala, T.: Bluetooth and wap push based location-aware mobile advertising system. In: Proceedings of the 2nd international conference on Mobile systems, applications, and services, Boston, MA, June 2004, pp. 49–58 (2004)
Adjie-Winoto, W., Schwartz, E., Balakrishnan, H., Lilley, J.: The design and implementation of an intentional naming system. In: Proceedings of the seventeenth ACM symposium on Operating systems principles, Charleston, SC, December 1999, pp. 186–201. ACM Press, New York (1999)
Arbaugh, W., Farber, D., Smith, J.: A secure and reliable bootstrap architecture. In: IEEE Symposium on Security and Privacy, Oakland, CA, May 1997, pp. 65–71. IEEE Computer Society Press, Los Alamitos (1997)
Bahl, P., Padmanabhan, V.N.: RADAR: An in-building RF-based user location and tracking system. In: INFOCOM (2), Tel-Aviv, Israel, March (2000)
Balan, R., Flinn, J., Satyanarayanan, M., Sin, S., Yang, H.: The case for cyber foraging. In: Proceedings of 10th ACM SIGOPS European Workshop, Saint Emilion, France, September 2002, ACM Press, New York (2002)
Bao, L., Intille, S.S.: Activity recognition from user-annotated acceleration data. In: Ferscha, A., Mattern, F. (eds.) PERVASIVE 2004. LNCS, vol. 3001, Springer, Heidelberg (2004)
Borcea, C., Intanagonwiwat, C., Saxena, A., Iftode, L.: Self-Routing in Pervasive Computing Environments using Smart Messages. In: Proceedings of the 1st IEEE International Conference on Pervasive Computing and Communications (PerCom), Dallas-Fort Worth, Texas, March 2003, pp. 87–96. IEEE Computer Society Press, Los Alamitos (2003)
Borisov, N., Brewer, E.: Active certificates: A framework for delegation (2000)
Bouchenak, S., Hagimont, D.: Pickling threads state in the java system. In: Proceedings of the Technology of Object-Oriented Languages and Systems (TOOLS 33), Santa Barbara, CA, August (2000)
Carriero, N., Gelernter, D.: Linda in Context. Communications of the ACM 32(4), 444–458 (1989)
Chen, H., Finin, T., Joshi, A.: An ontology for context-aware pervasive computing environments. Knowledge Engineering Review (Special Issue on Ontologies for Distributed Systems) 18(3), 197–207 (2003)
Wetherall, D.: Active Network Vision Reality: Lessons from a Capsule-based System. In: Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP), Charleston, SC, December 1999, pp. 64–79. ACM Press, New York (1999)
Dabrowski, C., Mills, K., Elder, J.: Understanding consistency maintenance in service discovery architectures during communication failure. In: Proceedings of the third international workshop on Software and performance, Rome, Italy, July, pp. 168–178 (2002)
Fall, K.: A delay tolerant network architecture for challenged internets. In: Proceedings of SIGCOMM, Karlsruhe, Germany, August (2003)
Farmer, W.M., Guttman, J.D., Swarup, V.: Security for mobile agents: Authentication and state appraisal. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) Computer Security - ESORICS 96. LNCS, vol. 1146, Springer, Heidelberg (1996)
Glassman, S., Manasse, M., Abadi, M., Gauthier, P., Sobalvarro, P.: The Millicent protocol for inexpensive electronic commerce. In: Proceedings of the 4th World Wide Web Conference , Boston, MA, December, pp. 603–618 (1995)
Gray, R., Cybenko, G., Kotz, D., Rus, D.: Mobile agents: Motivations and state of the art. In: Bradshaw, J. (ed.) Handbook of Agent Technology, MIT Press, Cambridge (2002)
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the First International Conference on Mobile Systems, Applications, and Services (MobiSys), San Fransisco, CA, May (2003)
Guttman, E.: Service location protocol: Automatic discovery of ip network services. IEEE Internet Computing 3(4), 71–80 (1999), doi:10.1109/4236.780963
Hui, P., Chaintreau, A., Scott, J., Gass, R., Crowcroft, J., Diot, C.: Pocket switched networks and human mobility in conference environments. In: WDTN ’05: Proceeding of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking, Philadelphia, PA, August 2005, ACM Press, New York (2005)
Iftode, L., Borcea, C., Ravi, N., Kang, P., Zhou, P.: Smart phone: An embedded system for universal interactions. In: Proceedings of the tenth International Workshop on Future Trends in Distributed Computing Systems, Suzhou, China, May (2004)
Jansen, W., Karygiannis, T.: Nist special publication 800-19 - mobile agent security (2000)
Kang, P., Borcea, C., Xu, G., Saxena, A., Kremer, U., Iftode, L.: Smart Messages: A Distributed Computing Platform for Networks of Embedded Systems. The Computer Journal, Special Focus-Mobile and Pervasive Computing 47(4), 475–494 (2004)
Karnik, N., Tripathi, A.: Agent Server Architecture for the Ajanta Mobile-Agent System. In: Proceedings of the 1998 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA), Las Vegas, NV, July, pp. 66–73 (1998)
Kindberg, T., Barton, J., Morgan, J., Becker, G., Caswell, D., Debaty, P., Gopal, G., Frid, M., Krishnan, V., Morris, H., Schettino, J., Serra, B., Spasojevic, M.: People, places, things: Web presence for the real world
Lehman, T., Cozzi, A., Xiong, Y., Gottschalk, J., Vasudevan, V., Landis, S., Davis, P., Khavar, B., Bowman, P.: Hitting the distributed computing sweet spot with tspaces. Computer Networks: The International Journal of Computer and Telecommunications Networking 35(4), 457–472 (2001)
Moore, J., Hicks, M., Nettles, S.: Practical Programmable Packets. In: Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), Anchorage, AK, April 2001, pp. 41–50. IEEE Computer Society Press, Los Alamitos (2001)
Necula, G.C.: Proof-carrying code. In: Conference Record of POPL ’97: The 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Paris, France, January 1997, ACM Press, New York (1997)
Nidd, M.: Service Discovery in DEAPspace. In: IEEE Personal Communications (August 2001)
Noble, B.D., Satyanarayanan, M., Narayanan, D., Tilton, J.E., Flinn, J., Walker, K.R.: Agile application-aware adaptation for mobility. In: SOSP ’97: Proceedings of the sixteenth ACM symposium on Operating systems principles, St. Malo, France, October 1997, ACM Press, New York (1997)
Ravi, N., Borcea, C., Kang, P., Iftode, L.: Portable Smart Messages for Ubiquitous Java-enabled Devices. In: The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous), Boston, MA, August (2004)
Ordille, J.J.: When agents roam, who can you trust? In: First Conference on Emerging Technologies and Applications in Communications (etaCOM), Portland, OR, May (1996)
Ousterhout, J.K., Levy, J.Y., Walsh, B.M.: The Safe-Tcl Security Model. Technical Report SMLI TR-97-60, Sun Microsystems (1997)
Boddupalli, P., Al-Bin-Ali, F., Davies, N., Friday, A., Storz, O., Wu, M.: Payment support in ubiquitous computing environments. In: Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications, Monterey, CA, October 2003, IEEE Computer Society Press, Los Alamitos (2003)
Peine, H., Stolpmann, T.: The Architecture of the Ara Platform for Mobile Agents. In: Rothermel, K., Popescu-Zeletin, R. (eds.) MA 1997. LNCS, vol. 1219, pp. 50–61. Springer, Heidelberg (1997)
Priyantha, N.B., Chakraborty, A., Balakrishnan, H.: The cricket location-support system. In: MobiCom ’00: Proceedings of the 6th annual international conference on Mobile computing and networking, Boston, MA, August (2000)
Ranganathan, M., Acharya, A., Sharma, S., Saltz, J.: Network-aware Mobile Programs. In: Proceedings of the USENIX 1997 Annual Technical Conference, Anaheim, CA, January, pp. 91–104 (1997)
Ravi, N., Dandekar, N., Mysore, P., Littman, M.: Activity recognition from accelerometer data. In: Proceedings of the Seventeenth Conference on Innovative Applications of Artificial Intelligence(IAAI), Pittsburgh, PA, July (2005)
Ravi, N., Gruteser, M., Iftode, L.: Non-inference: An information flow control model for location-based services. In: Proceedings of the Third International Conference on Mobile and Ubiquitous Systems (Mobiquitous), San Jose, CA, July (2006)
Ravi, N., Shankar, P., Frankel, A., Elgammal, A., Iftode, L.: Indoor localization using camera phones. In: Proceedings of the Workshop on Mobile Computing Systems and Applications(WMCSA), Washington, USA, April (2006)
Ravi, N., Stern, P., Desai, N., Iftode, L.: Accessing ubiquitous services using smart phones. In: Third International Conference on Pervasive Computing and Communications, Kauai, Hawaii, March (2005)
Roman, M., Campbell, R.: Gaia: Enabling active spaces. In: Proceedings of 9th ACM SIGOPS European Workshop, Kolding, Denmark, September 2000, ACM Press, New York (2000)
Salber, D., Dey, A.K., Abowd, G.D.: The context toolkit: Aiding the development of context-enabled applications. In: Proceedings of CHI, Pittsburgh, PA, May (1999)
Scott, D., Sharp, R., Madhavapeddy, A., Upton, E.: Using visual tags to bypass bluetooth device discovery. SIGMOBILE Mobile Computing and Communications Review 9(1), 41–53 (2005)
Thompson, M., Johnston, W., Mudumbai, S., Hoo, G., Jackson, K., Essiari, A.: Certificate-based access control for widely distributed resources. In: Proceedings of the Eighth USENIX Security Symposium, Monterey, CA, June (1999)
Wahbe, R., Lucco, S., Anderson, T.E., Graham, S.L.: Efficient software-based fault isolation. In: SOSP ’93: Proceedings of the fourteenth ACM symposium on Operating systems principles, Asheville, NC, December 1993, pp. 203–216. ACM Press, New York (1993)
Want, R., Hopper, A., Falco, V., Gibbons, J.: The active badge location system. ACM Transactions on Information Systems 10(1), 91–102 (1992)
Zhu, F., Mutka, M., Ni, L.: Splendor: A secure, private, and location-aware service discovery protocol supporting mobile services. In: First International Conference on Pervasive Computing and Communications, Dallas-Fort Worth, Texas, March (2003)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Ravi, N., Iftode, L. (2007). Outdoor Distributed Computing with Split Smart Messages. In: Kordon, F., Sztipanovits, J. (eds) Reliable Systems on Unreliable Networked Platforms. Monterey Workshop 2005. Lecture Notes in Computer Science, vol 4322. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71156-8_9
Download citation
DOI: https://doi.org/10.1007/978-3-540-71156-8_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-71155-1
Online ISBN: 978-3-540-71156-8
eBook Packages: Computer ScienceComputer Science (R0)