1 / 12

Prof David S. Rosenblum, UCL and collaborators from Imperial College London Oxford University

UbiVal Fundamental Approaches to Validation of Ubiquitous Computing Applications and Infrastructures. Prof David S. Rosenblum, UCL and collaborators from Imperial College London Oxford University University College London University of Birmingham. Project Rationale.

rodd
Download Presentation

Prof David S. Rosenblum, UCL and collaborators from Imperial College London Oxford University

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. UbiValFundamental Approaches to Validation of Ubiquitous Computing Applications and Infrastructures Prof David S. Rosenblum, UCL and collaborators from Imperial College London Oxford University University College London University of Birmingham EPSRC WINES Workshop 23 April 2007

  2. Project Rationale • Very many demonstration projectsin ubiquitous computing • Example applications and support technologies • But very little work on engineering foundations for ubiquitous computing • Many unique engineering challenges • Mobility • Context-awareness • Adaptive • Leading to significant challenges for validation EPSRC WINES Workshop 23 April 2007

  3. Research Objectives • Develop a comprehensive suite of validation techniques for mobile, adaptive, context-aware ubiquitous systems • Model checking • Testing • Simulation • … and useful combinations of these EPSRC WINES Workshop 23 April 2007

  4. Research Objectives • Develop the necessary additional scientific and engineering foundations to support the validation techniques • Probabilistic representations • Realistic mobility models • Transparent instrumentation techniques EPSRC WINES Workshop 23 April 2007

  5. Research Objectives • Evaluate the validation techniques on significant case studies • Cityware (from WINES 1) • Case studies from industrial partners • BT • HP • QinetiQ • Other WINES projects EPSRC WINES Workshop 23 April 2007

  6. Work Plan and Consortium Rosenblum WP1 Planning, Integration and Consistency WP7 Evaluation Studies Elbaum, Sama&Rodrigues MascoloMoustakas KwiatkowskaGhicaNorman&Khokhar WP2 ProbabilisticModel Checking WP3 Testing WP4 Simulation RyanSmyth Dulay Mostarda WP5 Instrumentation andTrace Generation WP6 Security Properties LupuMostarda EPSRC WINES Workshop 23 April 2007

  7. Current WorkTesting • Context-Aware Program Points (CAPPs) • Model of how context changes affect program flow • Test Suite Enhancement • Run test cases to discover concurrency faults • Explore interleavings of context handler invocations • ContextNotifier • Framework for specifying context change rules • TestingEmulator • Highly flexible and controllable device emulator EPSRC WINES Workshop 23 April 2007

  8. Current WorkSimulation • Social Mobility Model • A mobility model based on social network theory that can be plugged into a simulator to move nodes realistically • Model validated with real connectivity traces • Connectivity Trace Generator • Given: A set of traces collected in a deployment • Generate: A set of synthetic traceswith contact, inter-contact time and degree distributionsimilar to those of the original traces,for an arbitrary number of nodes EPSRC WINES Workshop 23 April 2007

  9. Current WorkProbabilistic Model Checking • IEEE 802.15.4/ZigBee Case Study (ISoLA 2006) • Recent (2003/2005) wireless network standard • Short range, low complexity, low data rates, low power • Analyse the Contention Resolution Protocol CSMA-CA • Wireless devices cannot listen during own transmissions • Solution: randomised, exponential backoff • Model Is Generic, Parametric, Reusable • Includes beacon synchronisation and timing parameters • Generation of individual models on-demand • Enabling/disabling of features such as acknowledgement, backoff limit, retransmission limit • Analysis of Energy-Performance Tradeoff EPSRC WINES Workshop 23 April 2007

  10. Current WorkSecurity • Flawed Systems Pose a Risk to Business and Society • Example:Bluesnarfing allows an attacker to access private data and even make phone calls • Verification Frameworks Fail to Identify Attacks • Weaknesses of Direct Anonymous Attestation (DAA) protocol demonstrated in recent paper at ESAS 2007 • Changing Landscape: Emerging security requirements/threats cannot be verified • Current work aims to develop suitable techniques for the verification of protocols EPSRC WINES Workshop 23 April 2007

  11. Overall Project Outcome An interoperable suite of tools embodying sound methods for valdating ubiquitous systems applied to significant case studies and disseminated to academia and industry EPSRC WINES Workshop 23 April 2007

  12. Thank Youhttp://www.ubival.org/ EPSRC WINES Workshop 23 April 2007

More Related