Panoply: active middleware for managing ubiquitous computing interactions

In the near future, our mobile devices will act as our personal representatives in the digital domain. As users move from place to place, their devices will associate with new environments and express their preferences and influence in their environments. Application development within this new paradigm, however, can be difficult, as applications require dynamic network configuration, mobility management, localization, and social and application context. To that end, I have developed Panoply, Java-based middleware that assists developers in quickly developing ubiquitous computing applications that can leverage location, social groupings, and user and application interests. Additionally, Panoply provides active device management, enabling dynamic, flexible, and simple network configuration, policy-based admission control, secure mediation of interactions, and dynamic discovery and coordination within network-based device communities. Using Panoply, I have developed a number of interesting applications, including the Smart Party—a location-aware social multimedia application, a group-driven locative media application, and a device quarantine and update management solution for mobile devices. We have shown substantial benefits can be gained from Panoply, including security benefits, scalability benefits, and also application-level benefits from device cooperation and coordination.

[1]  Venkatraman Ramakrishna,et al.  Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Interactions , 2007 .

[2]  Gianpaolo Cugola,et al.  Using a Publish/Subscribe Middleware to Support Mobile Computing , 2001 .

[3]  S. M. Heemstra de Groot,et al.  A Network Architecture for Personal Networks , 2005 .

[4]  Roy H. Campbell,et al.  Cerberus: a context-aware security scheme for smart spaces , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[5]  Sandeep K. S. Gupta,et al.  Supporting persistent social groups in ubiquitous computing environments using context-aware ephemeral group service , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.

[6]  Timothy Sohn,et al.  iCAP: Interactive Prototyping of Context-Aware Applications , 2006, Pervasive.

[7]  Buddhika Kottahachchi Building Access Controls for Intelligent Environments , 2004 .

[8]  Bill N. Schilit,et al.  Place Lab: Device Positioning Using Radio Beacons in the Wild , 2005, Pervasive.

[10]  James H. Aylor,et al.  Computer for the 21st Century , 1999, Computer.

[11]  Matthew Chalmers,et al.  Delivering real-world ubiquitous location systems , 2005, CACM.

[12]  Tiago Martins,et al.  InAuthoring environment: interfaces for creating spatial stories and gaming activities , 2006, ACE '06.

[13]  Staffan Björk,et al.  Pirates! Using the Physical World as a Game Board , 2001, INTERACT.

[14]  Joseph F. McCarthy,et al.  A Multi-Agent System for Meting Out Influence in an Intelligent Environment , 1999, AAAI/IAAI.

[15]  Konrad Tollmar,et al.  Activity Zones for Context-Aware Computing , 2003, UbiComp.

[16]  Mira Mezini,et al.  Engineering Event-Based Systems with Scopes , 2002, ECOOP.

[17]  Gregory D. Abowd,et al.  Social Disclosure of Place: From Location Technology to Communication Practices , 2005, Pervasive.

[18]  Klara Nahrstedt,et al.  Gaia: A Middleware Infrastructure to Enable Active Spaces1 , 2002 .

[19]  Hector Garcia-Molina,et al.  Elections in a Distributed Computing System , 1982, IEEE Transactions on Computers.

[20]  Jason Cleverly,et al.  Creating assemblies:: aboard the Ghost Ship , 2002, CSCW '02.

[21]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[22]  Dieter Schmalstieg,et al.  A Handheld Augmented Reality Museum Guide , 2005 .

[23]  Shane Markstrum,et al.  Enabling Secure Ubiquitous Interactions , 2003, Middleware Workshops.

[24]  Jakob E. Bardram,et al.  The AWARE architecture: supporting context-mediated social awareness in mobile cooperation , 2004, CSCW.

[25]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[26]  Ajay Kulkarni,et al.  Building Agent-Based Intelligent Workspaces , 2002, International Conference on Internet Computing.

[27]  Ben J. C. Clayton,et al.  Rapid Authoring of Mediascapes , 2004, UbiComp.

[28]  Stuart Cheshire,et al.  Dynamic Configuration of IPv4 Link-Local Addresses , 2005, RFC.

[29]  Thomas Butter,et al.  Distribution of Fingerprints for 802.11-Based Positioning Systems , 2007, 2007 International Conference on Mobile Data Management.

[30]  Peter L. Reiher,et al.  Negotiating Agreements Using Policies in Ubiquitous Computing Scenarios , 2007, IEEE International Conference on Service-Oriented Computing and Applications (SOCA '07).

[31]  Joseph F. McCarthy,et al.  MusicFX: an arbiter of group preferences for computer supported collaborative workouts , 1998, CSCW '98.

[32]  P. Fishburn,et al.  Voting Procedures , 2022 .

[33]  Krishna P. Gummadi,et al.  Exploiting Social Interactions in Mobile Systems , 2007, UbiComp.

[34]  Ralph E. Droms,et al.  Authentication for DHCP Messages , 2001, RFC.

[35]  Barry Nalebuff,et al.  An Introduction to Vote-Counting Schemes , 1995 .

[36]  Jinhyung Kim,et al.  A Rule-Based Publish-Subscribe Message Routing System for Ubiquitous Computing , 2006, UCS.

[37]  Michael H. Coen,et al.  Meeting the Computational Needs of Intelligent Environments: The Metaglue System , 2000 .

[38]  Jim Waldo,et al.  The Jini architecture for network-centric computing , 1999, CACM.

[39]  Antonio Corradi,et al.  AGAPE: a location-aware group membership middleware for pervasive computing environments , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.

[40]  Ralph E. Droms,et al.  DHCP Options and BOOTP Vendor Extensions , 1993, RFC.

[41]  Diana K. Smetters,et al.  Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute , 2004, USENIX Security Symposium.

[42]  Brian D. Noble,et al.  Zero-interaction authentication , 2002, MobiCom '02.

[43]  Rattapoom Tuchinda Access Control Mechanism for Intelligent Environments Related Work , 2002 .

[44]  Anupam Joshi,et al.  A Secure Infrastructure for Service Discovery and Access in Pervasive Computing , 2003, Mob. Networks Appl..

[45]  Robbert van Renesse,et al.  Using Sparse Capabilities in a Distributed Operating System , 1986, ICDCS.

[46]  Martin Jacobsson,et al.  Personal network federations , 2010 .

[47]  Srdjan Capkun,et al.  GPS-free Positioning in Mobile Ad Hoc Networks , 2001, Proceedings of the 34th Annual Hawaii International Conference on System Sciences.

[48]  P. Reiher,et al.  Mobile contagion: simulation of infection & defense , 2005, Workshop on Principles of Advanced and Distributed Simulation (PADS'05).

[49]  Allan C. Rubens,et al.  Remote Authentication Dial In User Service (RADIUS) , 1997, RFC.

[50]  Paul Dourish,et al.  Re-place-ing space: the roles of place and space in collaborative systems , 1996, CSCW '96.

[51]  Martin Dzbor,et al.  BuddySpace : Enhanced Presence Management for Collaborative Learning , Working , Gaming and Beyond Submission to JabberConf Europe 2002 , 2002 .

[52]  Tim Kindberg,et al.  A Web-based nomadic computing system , 2001, Comput. Networks.

[53]  Roy H. Campbell,et al.  Super spaces: a middleware for large-scale pervasive computing environments , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[54]  Bill Serra,et al.  People, Places, Things: Web Presence for the Real World , 2000, Proceedings Third IEEE Workshop on Mobile Computing Systems and Applications.

[55]  Bernard Aboba,et al.  Extensible Authentication Protocol (EAP) , 2004, RFC.

[56]  Krzysztof Z. Gajos,et al.  Hyperglue: Designing High-Level Agent Communication for Distributed Applications , 2006 .

[57]  Leonard Kleinrock,et al.  Nomadicity: Anytime, Anywhere in a Disconnected World , 1996, Mob. Networks Appl..

[58]  Tim Finin,et al.  A Security Architecture Based on Trust Management for Pervasive Computing Systems , 2002 .

[59]  Krzysztof Z. Gajos,et al.  Design Principles for Resource Management Systems for Intelligent Spaces , 2001, IWSAS.

[60]  Michael K. Reiter,et al.  Seeing-is-believing: using camera phones for human-verifiable authentication , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[61]  R.A. Brooks,et al.  The Intelligent Room project , 1997, Proceedings Second International Conference on Cognitive Technology Humanizing the Information Age.

[62]  Kenton O'Hara,et al.  Jukola: democratic music choice in a public space , 2004, DIS '04.

[63]  M. D. Mickunas,et al.  A Middleware for Enabling Personal Ubiquitous Spaces , 2004 .

[64]  Michael Sirivianos,et al.  Loud and Clear: Human-Verifiable Authentication Based on Audio , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).

[65]  Tim Kindberg,et al.  Secure Spontaneous Device Association , 2003, UbiComp.

[66]  Daniel C. DuVarney,et al.  Model-carrying code: a practical approach for safe execution of untrusted applications , 2003, SOSP '03.

[67]  Mario Gerla,et al.  BlueTorrent: Cooperative Content Sharing for Bluetooth Users , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).

[68]  Wen-Tai Hsieh,et al.  Semantic Web technologies for context-aware museum tour guide applications , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[69]  David Hales,et al.  SLACER: a self-organizing protocol for coordination in peer-to-peer networks , 2006, IEEE Intelligent Systems.

[70]  Yasuyoshi Inagaki,et al.  Touch-and-connect: a connection request framework for ad-hoc networks and the pervasive computing environment , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[71]  William Adjie-Winoto,et al.  The design and implementation of an intentional naming system , 2000, OPSR.

[72]  Philippe Raab Can Endogenous Group Formation Prevent Coordination Failure? A Theoretical and Experimental Investigation , 2005, SSRN Electronic Journal.

[73]  Su Young Kwak DESIGNING A HANDHELD INTERACTIVE SCAVENGER HUNT GAME TO ENHANCE MUSEUM EXPERIENCE , 2004 .