TASK 1:
DETAIL
DESCRIPTION OF DELIVERABLES
In this report there are two tasks as shown in the below discussion;
In the task 2 it has two question the first
about the significance of the context information in the pervasive computing
environment. And the 2nd question is about the application area of
pervasive computing.
Now in the task 3 there are three question,
the first is about the WAP architecture and the 2nd is about the security
problem in the WAP, and the third question is about the application of the WAP
architecture.
OVERVIEW OF
PROPOSED PLAN OF TASK 2
The proposed plan of task 2 is;
·
Role/importance
of context information in pervasive computing environment.
·
Outline
the pervasive computing applications area.
TASK 2
IMPORTANCE OF CONTEXT INFORMATION IN PERVASIVE
COMPUTING ENVIRONMENT
In pervasive computing, basic services are
provided by smart devices like sensors etc. more complex and advance service
can be provided when these different device act together. Context can be
defined as the set of information which completely or partly situation of some
entity. The context information can be broadly categorized into two types which
are low level context information also known as implementation context, high
level context information also known as application context (Soylu et al , 2009). Implementation context is usually
gathered through sensor data or application logs. Application context is
derived from implementation context. The notion of context is there in many
scientific domains but in case of pervasive computing the context of any
application in terms of its physical parameters is very important. In pervasive
computing, physical context which is acquired using sensor data is the most
important type of context. These sensor data are very important for the
functioning of different devices in pervasive computing. The context
information also depends on the type of task at hand e.g. if we were to derive
<<high temperature>> from context about a room, it is not
sufficient because we would need to know about what kind of room are we talking
about, are we talking about an air-conditioned room or a sauna (Euzenat et al
, 2006).
As the main purpose of ubiquitous computing
to make an environment which has computing and computational abilities and it
must also integrate with human users. To make these pervasive computing systems
minimally disruptive, it is very important make them context aware so that they
are aware about the basic information about a user like their identity, their
location, their activity etc. Making pervasive computing systems context aware
also make them more flexible and adaptable at the same time. Making pervasive
computing systems context aware makes them proactive.
A
proactive system is the one which records user’s intent and give solution proactively
also keeping in mind that it does not irritate the user. If context awareness
is added to the system, it can use that information to make proactiveness
better and can make better decision if it adds user context with user intent
information. Adding context information in ubiquitous system also make them
more invisible to the user which is a very important characteristic in these
system as they have to ensure minimal intrusion in a user’s life. Without
context awareness, users will have to enter the input data in the system which
defeats the purpose of invisibility. In case the context is provided, the
system can gather input data without user’s intervention. Another important
thing that context awareness adds to the ubiquitous adaptability. In case there
is mismatch between supply and demand, the system should be able to adjust
itself according to new demand and that is impossible without the context
information e.g. a smart vacuum cleaner won’t be able to clean the full house
without running out of battery if it is not location aware (Foley , 2006).
PERVASIVE COMPUTING APPLICATIONS AREA
About 30 years ago the idea of ubiquitous
computing was predicted and it was predicted there would be computing devices
in almost every object we interact with. These devices interact with user and
are visible at the same time. We can find pervasive computing applications
everywhere we see (Barbosa, 2015).
The pervasive computing has different application
from the home care and health environments monitoring as well as intelligent
system of transport. Between the myriad
tools which is expected to support the various application integrity circuit
·
Speech
recognition
·
Gesture
re-cognition (Hu,et al , 2010)
TASK 3
WAP LAYERED ARCHITECTURE.
WAP (wireless Application protocol) is an
industry standard which has find its application in various communication
networks and business applications. WAP application architecture can be divided
into different layers just like TCP/IP protocol where it is optimized
specifically for wireless communication. In each layer of WAP there is a
standard interface defined which can be used by the upper layer in the stack to
interact with the lower layer. Following are the layers in a WAP architecture:
1.
WAE:
Wireless Application Environment
2.
WSP:
Wireless Session Protocol
3.
WTP:
Wireless Transaction Protocol
4.
WTLS:
Wireless Transport Layer Security Protocol
5.
WDP:
Wireless Datagram protocol
WAE can be considered a common suite which can be used to develop and
run application on various wireless communication network. With the help of WSP
WAE can provide session-oriented services with are based on WTP and WDP which
are stateless/connection services. WTP is protocol which provide transaction
like services, it can also provide unreliable one-way request (like UCP in web)
or reliable one-way or two-way requests (like TCP in web). As an optional
service it also provides user to user reliability and also band response as
well. It also supports asynchronous transactions. As WAP is TCP/IP architecture
which has security concern WTLS adds security of WAP and is based of Transport
Layer Security (TLS) and is optimized for narrow bandwidth communications. Its
main features are providing data integrity, authentication, privacy and protection
in case of DoS attacks. WDP is the transport protocol in WAP architecture and
provides upper layer an interface which is agnostic of the topology of the
upper layer means it will work regardless of the underlying wireless network.
The bottom layer is the underlying wireless network (Ahmadpanah et
al , 2016).
ROLE OF THE WAP GATEWAY ASSOCIATED BY SECURITY
PROBLEMS
WTLS protocol is responsible for security in
WAP architecture, it accepts the raw data from the upper layer and then apply
compression and encryption algorithms to this data before transmitting it. It
is a record protocol which means it takes care of the data integrity and
decrypted. Received data is then decrypted and decomposed before passing it to
the upper layers. The record protocol is further divided into 4 protocol which
Change Cipher spec protocol (CCP_, handshake protocol (HP), Alert protocol
(AP), Application Data protocol (ADP). First of all, the security parameters
are agreed upon between sender and receiver in the handshake phase, and after
that change cipher spec message is sent. There are three types of alert message
which are warning, critical and fatal. If an alert message labelled as fatal is
sent, the communication is terminated both by sender and receiver right away.
While the other connection that use the same secure connection can continue. In
case of critical alert message, the secure connection is terminated.
All the error handling is done with the use
of alert messages. The cryptographic parameters of a secure connection are
established during handshake and these are various parameter like protocol
versions being used, used crypto algorithms etc. To secure the connection
encryption key or initial values which are used to compute keys are exchanged
in a secure manner. Privacy is attained by encrypting the communication
channel. Data integrity is attained using Message Authentication Codes (MAC).
The algorithm for MAC is decided as the same time the encryption algorithm is
decided between sender and receiver. The client sends the list of MAC protocol
with the top protocol having the most preference and server sends the decided
MAC protocol in the initial hello message. There are many MAC algorithms which
WTLS supports like MD5, and SHA etc. These are the different ways in which WAP
addresses different security issue like authentication, privacy, data integrity
etc (Radhamani et al , 2002).
IMPORTANT WAP APPLICATIONS
WAP is being used in many important
applications. It is being used in mobile commerce application which carry out
various financial transactions. There are now mobile banking programs which
incorporates different elements which private information services, WAP and
security. All existing mobile phone can use mobile banking systems, WAP make
mobile banking secure which is fundamental requirement for any banking system.
One example of such mobile banking system provider In Materna. WAP is used to
distribute games across mobiles we can go to different websites like www.digitalbridges.com which supplies games over WAP and buy games.
WAP is also used to download ringtones in mobiles and its popularity is
increasing day by day. WAP is used for internet emails as well, people can be
notified about new email on their mobiles with WAP Push protocol. WAP has so
many other applications in addition to these (Eng.tau.ac.il, 2019).
REFERENCES of
Mobile and Pervasive Computing
Ahmadpanah et al , S. . H., 2016. Wireless Application
Protocol Architecture Overview. Conference: 3rd National Conference on
Computer Engineering and IT Management, At Tehran.
Barbosa, J. L. V.,
2015. Ubiquitous Computing, s.l.: s.n.
Eng.tau.ac.il, 2019. Applications
for WAP. [Online]
Available at: http://www.eng.tau.ac.il/~sharon/WAP/apps.htm
Euzenat et al , J.,
2006. A Context Information Manager for Pervasive Computing Environments.
Foley , A., 2006. Context
Awareness – Why is this characteristic important to applications in a
ubiquitous computing environment?, s.l.: IC03329721|Ubiquitous Computing
Assignment.
Hu,et al , B., 2010.
Special issue: pervasive computing technology and its applictaions. WIRELESS
COMMUNICATIONS AND MOBILE COMPUTING, Volume 10, p. 1281–1282.
Radhamani et al , G.,
2002. Security Issues in WAP WTLS Protocol. IEEE.
Soylu et al , A., 2009.
Context and Adaptivity in Pervasive ComputingEnvironments: Links with Software
Engineeringand Ontological Engineering. JOURNAL OF SOFTWARE, 4(9).