The attacker in ubiquitous computing environments: formalising the threat model