Experimental Challenges in Wireless Sensor Networks – Environment, Mobility, and Interference

Total Page:16

File Type:pdf, Size:1020Kb

Experimental Challenges in Wireless Sensor Networks – Environment, Mobility, and Interference Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology 965 Experimental Challenges in Wireless Sensor Networks – Environment, Mobility, and Interference OLOF RENSFELT ACTA UNIVERSITATIS UPSALIENSIS ISSN 1651-6214 ISBN 978-91-554-8448-4 UPPSALA urn:nbn:se:uu:diva-179807 2012 Dissertation presented at Uppsala University to be publicly examined in Polhemssalen, Ångströmlaboratoriet, Lägerhyddsvägen 1, Uppsala, Friday, October 12, 2012 at 13:15 for the degree of Doctor of Philosophy. The examination will be conducted in English. Abstract Rensfelt, O. 2012. Experimental Challenges in Wireless Sensor Networks – Environment, Mobility, and Interference. Acta Universitatis Upsaliensis. Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology 965. 172 pp. Uppsala. ISBN 978-91-554-8448-4. Wireless sensor networks are used to collect sensor data in different applications such as environmental monitoring, smart building control, and health care applications. Wireless sensor nodes used are typically small, low-cost, and battery powered. The nodes are often hard to access after deployment, for example when they are in remote locations. Another property of wireless sensor networks is that their operation is dependent on the environment they operate in, both due to the specific sensor readings but also due to the effects on communication by factors such as fading and radio interference. This makes it important to evaluate a wireless sensor network in its intendent target environment before final deployment. To enable experiments with wireless sensor networks in their target environment, we have designed and implemented a testbed called Sensei-UU. It is designed to allow WSN experiments to be repeated in different locations, thus exposing effects caused by the environment. To allow this, the testbed is designed to be easily moved between experimental sites. One type of WSN applications Sensei-UU is aimed to evaluate is protocols where nodes are mobile. Mobile testbed nodes are low-cost robots which follow a tape track on the floor. The localization accuracy of the robot approach is evaluated and is accurate enough to expose a protocol to fading phenoma in a repeatable manner. Sensei-UU has helped us develop a lightweight interference classification approach, SoNIC, which runs on standard motes. The approach only use information from a standard cc2420 chipset available when packets are received. We believe that the classification accuracy is good enough to motivate specific transmission techniques avoiding interference. Keywords: Wireless Sensor Networks, Testbed, Mobility, Interference classification Olof Rensfelt, Uppsala University, Department of Information Technology, Computer Systems, Box 337, SE-751 05 Uppsala, Sweden. © Olof Rensfelt 2012 ISSN 1651-6214 ISBN 978-91-554-8448-4 urn:nbn:se:uu:diva-179807 (http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-179807) Dedicated to all hard-working torcedores and coffee farmers List of papers This thesis is based on the following papers, which are referred to in the text by their Roman numerals. I Olof Rensfelt, Lars-Åke Larzon, and Sven Westergren, “Vendetta - A Tool for Flexible Monitoring and Management of Distributed Testbeds.” In proceedings of 3rd IEEE International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM), 2007. II Olof Rensfelt, Frederik Hermans, Lars-Åke Larzon, and Per Gunningberg, “Sensei-UU: A Relocatable Sensor Network Testbed.” In the fifth ACM International Workshop on Wireless Network Testbeds, Experimental evaluation and Characterization (Wintech), 2010 © 2010 Association for Computing Machinery, Inc. Reprinted by permission. http://doi.acm.org/10.1145/1860079.1860091 III Olof Rensfelt, Frederik Hermans, Per Gunningberg, Lars-Åke Larzon and Erik Björnemo, “Repeatable Experiments with Mobile Nodes in a Relocatable WSN Testbed” In The Oxford Computer Journal, Volume 54, Number 12 (The Computer Journal 2011) IV Frederik Hermans, Olof Rensfelt, Lars-Åke Larzon, and Per Gunningberg, “A Light-weight Approach to Online Detection and Classification of Interference in 802.15.4-based Sensor Networks” In the ACM SIGBED Review, Special Issue on the Third International Workshop on Networks of Cooperating Object, Volume 9, Number 3, 2012 V Olof Rensfelt, Frederik Hermans, Thiemo Voigt, Edith Ngai, Lars-Åke Nordén, and Per Gunningberg, “SoNIC: Classifying and Surviving Interference in 802.15.4-based Sensor Networks” Technical Report 2012-022, Department of Information Technology, Uppsala University, 2012. Reprints were made with permission from the publishers. Other work In addition to the papers above, the following papers, posters, demos and workshops, represent work that I have participated in, presented, authored or co-authored. • Olof Rensfelt, Richard Gold, and Lars-Åke Larzon. “LUNAR over Blue- tooth.“ In Proceedings of the 4th Scandinavian Workshop on Wireless Ad-Hoc Networks (ADHOC 2004). • Christian Tschudin, Richard Gold, Olof Rensfelt, and Oskar Wibling. “LUNAR - A Lightweight Underlay Network Ad-hoc Routing Protocol and Implementation.“ In Next Generation Teletraffic and Wired/Wireless Advanced Networking (NEW2AN’04), TTY Paino, Tampere, Finland, p 300, 2004. • Olof Rensfelt and Lars-Åke Larzon. “Addressing heterogenity in peer to peer networks” In the 2nd Swedish National Computer Networking Workshop (SNCNW 2004) • Olof Rensfelt and Lars-Åke Larzon. “A bandwidth study of a DHT in a heterogeneous environment.” it:2007-017, ISSN 1404-3203, Techni- cal Report 2007-017, Department of Information Technology, Uppsala University, May 2006. • Sven Westergren, Olof Rensfelt, and Lars-Åke Larzon.“NoteNet” In the 4th Swedish National Computer Networking Workshop (SNCNW 2006) • Olof Rensfelt and Lars-Åke Larzon. “A bandwidth study of a DHT in a heterogeneous environment” In the 4th Swedish National Computer Networking Workshop (SNCNW 2006) • Sven Westergren, Peter Drugge, Olof Rensfelt and Lars-Åke Larzon. “NoteNet.” In the 4th Annual International Conference on Mobile Sys- tems, Applications and Services - Demonstration (MobiSys 2006) Upp- sala, Sweden. • Olof Rensfelt, Lars-Åke Larzon, and Sven Westergren.“Dtour - An Ap- proach to Reproducibility on PlanetLab” ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Com- puter Communications - Poster (SIGCOMM 2007) August 2007, Kyoto, Japan. • Olof Rensfelt, Frederik Hermans, Christofer Ferm, Per Gunningberg, Lars-Åke Larzon. “Building a Testbed for Heterogeneous Wireless Sen- sor Networks” In the 6th Swedish National Computer Networking Work- shop (SNCNW 2008) • Olof Rensfelt, Frederik Hermans, Christofer Ferm, Per Gunningberg, and Lars-Åke Larzon. “An Interactive Testbed for Heterogeneous Wire- less Sensor Networks.” In the 4th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS 2008) demo pro- ceedings: June 2008, Santorini, Greece. • Olof Rensfelt, Lars-Åke Larzon, Christofer Ferm, Frederik Hermans and Per Gunningberg. “SENSEI - a nomadic testbed with support for mo- bility” In the 7th Swedish National Computer Networking Workshop (SNCNW 2009) • Olof Rensfelt, Frederik Hermans,Christofer Ferm, Per Gunningberg, and Lars-Åke Larzon. “Sensei-UU: A Nomadic Sensor Network Testbed Supporting Mobile Nodes” it:2009-025, ISSN 1404-3203,Technical Re- port 2009-025, Department of Information Technology, Uppsala Univer- sity, October 2009. • Olof Rensfelt, Joel Samuelsson, Frederik Hermans, Per Gunningberg, Lars-Åke Larzon. “Playing Pacman with Sensei-UU: A relocatable testbed with support for mobile nodes”, The 8th Annual International Conference on Mobile Systems, Applications and Services, demonstra- tion proceedings (MobiSys 2010) June 2010, San Francisco, USA - Best demonstration award • Olof Rensfelt, Frederik Hermans, Per Gunningberg, and Lars-Åke Lar- zon “Repeatable Experiments with Mobile Nodes in a Relocatable WSN Testbed.” In the first International Workshop on Mobility in Wireless Sensor Networks (MobiSensor 2010) June 2010, Santa Barbara, USA. • Navid Hassanzadeh, Olaf Landsiedel, Frederik Hermans, Olof Rensfelt, Thiemo Voigt “Efficient Mobile Data Collection with Mobile Collect.” In the 8th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS 2012) May 2012, Hangzhou, China • Navid Hassanzadeh, Thiemo Voigt, Olaf Landsiedel, Frederik Hermans, Olof Rensfelt. “Do Sensor Networks Need Mobile MAC Protocols?” In the 3rd International Workshop on Networks of Cooperating Objects, (Conet 2012) April Beijing, China • Hjalmar Wennerström, Frederik Hermans, Olof Rensfelt, Christian Rohner, Lars-Åke Larzon. “A Long-Term Study on the Effects of Meteorological Conditions on 802.15.4 Links” In the 8th Swedish National Computer Networking Workshop (SNCNW 2012), June 2012, Stockholm, Swe- den. Implementations • mLUNAR. A light weight, multi hop ad hoc routing protocol that runs on Lego Mindstorms. It tunnels TCP/IP traffic over infrared. It was demoed at Mobicom 2002. • BTLUNAR. A port of LUNAR, a reactive ad hoc routing protocol, to run over the Linux Bluetooh stack BlueZ. • Bamboo for NS2. An implementation of the overlay network Bamboo for NS2. • Sensei-UU. A relocatable WSN testbed with support for mobile nodes. Contents 1 Introduction ................................................................................................ 15 1.1 Wireless Sensor Networks ............................................................
Recommended publications
  • Business Informatics 2 (PWIN) SS 2021 Lecture 04
    Lecture 04 Business Informatics 2 (PWIN) SS 2021 Information Systems III Mobile Information Systems Prof. Dr. Kai Rannenberg Chair of Mobile Business & Multilateral Security Johann Wolfgang Goethe University Frankfurt a. M. Special of the day . “Heads in the Clouds: Measuring the Implications of Universities Migrating to Public Clouds”, v2 (2021-04- 20) . By Tobias Fiebig, Seda Gürses, Carlos H. Gañán, Erna Kotkamp, Fernando Kuipers, Martina Lindorfer, Menghua Prisse, Taritha Sari (TU Delft, TU Wien) . https://arxiv.org/abs/2104.09462 . Typical IS article in general topic and structure . Topic: analysis of information systems of organisations and strategic considerations (in this case universities) . Structure: Introduction, Background, Methodology overview (focus, data set), Data analysis of case(s), Discussion, Limitations, Related work, Conclusion(s), Acknowledgements 2 Agenda . What is Mobility? . Mobile Infrastructure and Ecosystem . Mobile Information Systems . Conclusion on Challenges / Benefits of Mobile IS 3 Mobility What is mobility? Lat. mobilitas: (1) Flexibility, velocity, motion; and as “mobilitas animi”: (mental) fitness (2) But also (and quite ambivalent to (1)) changeability, inconstancy, unstableness [SkuStowPets1998] 4 Mobility . Social implications Mobility not just “humans’ independence from geographical constraints” . Spatial mobility . Temporal mobility . Contextual mobility [KakihaSorens2001] 5 Agenda . What is Mobility? . Mobile Infrastructure & Ecosystem . Mobile Voice & Data Communication Services . Mobile Devices . Smartcards and Subscriber Identity Module (SIM) . Mobile Operating Systems . Mobile Web Apps vs. Mobile Apps . App Markets . Mobile Infrastructure and Ecosystem . Conclusion on Challenges / Benefits of Mobile IS 6 Mobile Voice & Data Communication Services . Mobile device . Base station/mobile station/cell . Connection to the Internet User terminal 7 Mobile Voice & Data Communication Services Fundamental mobile communication services .
    [Show full text]
  • Palm OS Cobalt 6.1 in February 2004 6.1 in February Cobalt Palm OS Release: Last 11.2 Ios Release: Latest
    …… Lecture 11 Market Overview of Mobile Operating Systems and Security Aspects Mobile Business I (WS 2017/18) Prof. Dr. Kai Rannenberg . Deutsche Telekom Chair of Mobile Business & Multilateral Security . Johann Wolfgang Goethe University Frankfurt a. M. Overview …… . The market for mobile devices and mobile OS . Mobile OS unavailable to other device manufacturers . Overview . Palm OS . Apple iOS (Unix-based) . Manufacturer-independent mobile OS . Overview . Symbian platform (by Symbian Foundation) . Embedded Linux . Android (by Open Handset Alliance) . Microsoft Windows CE, Pocket PC, Pocket PC Phone Edition, Mobile . Microsoft Windows Phone 10 . Firefox OS . Attacks and Attacks and security features of selected . mobile OS 2 100% 20% 40% 60% 80% 0% Q1 '09 Q2 '09 Q3 '09 Q1 '10 Android Q2 '10 Q3 '10 Q4 '10 u Q1 '11 sers by operating sers by operating iOS Q2 '11 Worldwide smartphone Worldwide smartphone Q3 '11 Q4 '11 Microsoft Q1 '12 Q2 '12 Q3 '12 OS Q4 '12 RIM Q1 '13 Q2 '13 Q3 '13 Bada Q4' 13** Q1 '14 Q2 '14 s ystem ystem (2009 Q3 '14 Symbian Q4 '14 Q1 '15 [ Q2 '15 Statista2017a] Q3 '15 s ales ales to end Others Q4 '15 Q1 '16 Q2 '16 Q3 '16 - 2017) Q4 '16 Q1 '17 Q2 '17 3 . …… Worldwide smartphone sales to end …… users by operating system (Q2 2013) Android 79,0% Others 0,2% Symbian 0,3% Bada 0,4% BlackBerry OS 2,7% Windows 3,3% iOS 14,2% [Gartner2013] . Android iOS Windows BlackBerry OS Bada Symbian Others 4 Worldwide smartphone sales to end …… users by operating system (Q2 2014) Android 84,7% Others 0,6% BlackBerry OS 0,5% Windows 2,5% iOS 11,7% .
    [Show full text]
  • Mobile OS and Security Aspects
    …… Lecture 11 Market Overview of Mobile Operating Systems and Security Aspects Mobile Business I (WS 2015/16) Prof. Dr. Kai Rannenberg . Deutsche Telekom Chair of Mobile Business & Multilateral Security . Johann Wolfgang Goethe University Frankfurt a. M. Overview - Market Overview of Mobile Operating …… Systems and Security Aspects § The Market for mobile devices and mobile OS § Mobile OS unavailable to other device manufacturers § Overview § Palm OS § Apple iOS (Unix-based) § Manufacturer-independent mobile OS § Overview § Symbian platform (by Symbian Foundation) § Embedded Linux § Android (by Open Handset Alliance) § Microsoft Windows CE, Pocket PC, Pocket PC Phone Edition, Mobile § Microsoft Windows Phone 10 . § Firefox OS . § Security features of selected mobile OS . 2 Worldwide Smartphone Sales to End …… Users by Operating System (2009-2015) Market share Market . OS [Statista 2015a] 3 Worldwide Smartphone Sales to End …… Users by Operating System (Q2 2012) Android 64,2% Others 0,6% Symbian 5,9% Bada 2,7% BlackBerry OS 5,2% [Gartner2013] Windows 2,6% . iOS 18,8% . Android iOS Windows BlackBerry OS Bada Symbian Others 4 Worldwide Smartphone Sales to End …… Users by Operating System (Q2 2013) Android 79,0% Others 0,2% Symbian 0,3% Bada 0,4% BlackBerry OS 2,7% Windows 3,3% iOS 14,2% [Gartner2013] . Android iOS Windows BlackBerry OS Bada Symbian Others 5 Worldwide Smartphone Sales to End …… Users by Operating System (Q2 2014) Android 84,7% Others 0,6% BlackBerry OS 0,5% Windows 2,5% iOS 11,7% . Android iOS Windows BlackBerryBlackBerry OS Symbian Bada Others [Statista 2014a] 6 Worldwide Smartphone Sales to End …… Users by Operating System (Q2 2015) Android 82,8% Others 0,4% BlackBerry OS 0,3% Windows 2,6% iOS 13,9% .
    [Show full text]
  • Openmoko Neo1973 User Manual
    www.openmoko.com OpenMoko Neo1973 user manual 1 www.openmoko.com Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to providereasonable protection against harmful interference in a residential installation. Thisequipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures: Reorient or relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio/TV technician for help This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user’s authority to operate this equipment. IMPORTANT NOTE: FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment.
    [Show full text]
  • “3D Routing with Context Awareness”
    Universidade Federal de Pernambuco Centro de Informática Pós-Graduação em Ciência da Computação “3D Routing with Context Awareness” Breno Jacinto Duarte da Costa Advisor: Dr. Djamel Sadok Co-advisor: Dr. Eduardo Souto Recife, march 2009 UNIVERSIDADE FEDERAL DE PERNAMBUCO CENTRO DE INFORMÁTICA PÓS-GRADUAÇÃO EM CIÊNCIA DA COMPUTAÇÃO BRENO JACINTO DUARTE DA COSTA “3D routing with context awareness” THIS DISSERTATION HAS BEEN SUBMITTED TO THE COMPUTER SCIENCE CENTER OF THE FEDERAL UNIVERSITY OF PERNAMBUCO AS A PARTIAL REQUIREMENT TO OBTAIN THE DEGREE OF MASTER IN COMPUTER SCIENCE. ADVISOR: DR. DJAMEL SADOK CO- ADVISOR: DR. EDUARDO SOUTO RECIFE, MARCH/2009 ii 1 2 To my father and mother for creating me. To their parents for creating them. And so on. 3 Acknowledgments There’s a lot to thank for that words can never be enough. I know that there’s a tremendous force behind all this – the existence – and I also know that we are all here for a reason. So, in the deepest level, I’m writing this because of this bigger force, for which I can only feel but not fully understand, but that I’m thankful. Thankful for the chance of being here and learn, improving my spirit. I’m also thankful for everyone else that exists with me: they are a great source of learning as well. My parents are the first ones I should thank, since they created and raised me with care and responsibility. Especially my mother, she was a heroin for raising me and my brothers after my father was gone. Thank you mom, it’s a privilege to be your son.
    [Show full text]
  • Computer Engineering Subject
    DIRECTORATE OF TECHNICAL EDUCATION, CHENNAI-25 DIPLOMA EXAMINATIONS-APRIL-2019 DEPT : COMPUTER ENGINEERING SUBJECT : MOBILE COMPUTING QCODE/SUB CODE : 915/35262 PART -A 1. Define LAN.[ 2 marks] A local-area network (LAN) is a computer network that spans a relatively small area. Most often, LAN is confined to a single room, building or group of buildings, however, one LAN can be connected to other LANs over any distance via telephone lines and radio waves. 2. What is meant by Adhoc? [ 2 marks] An ad hoc network is a network that is composed of individual devices communicating with each other directly. The term implies spontaneous or impromptu construction because these networks often bypass the gatekeeping hardware or central access point such as a router 3. What is GSM network? [ 2 marks] GSM stands for Global System for Mobile Communication. GSM is the most widely accepted standard in telecommunications and it is implemented globally. It is a digital cellular technology used for transmitting mobile voice and data services. 4. Write the limitation of GPRS. [ 2 marks] Although GPRS will provide better data rates than is currently available, there are some limitations. • Speeds of 177.2kbps would require a user to use all eight timeslots without any error protection - which simply won't happen. Initial terminals are likely to use only 1-3 timeslots anyway, limiting the available bandwidth to a GPRS user. • When GPRS packets are sent to a destination they are sent in all different directions - allowing for the potential for one or some of those packets to be corrupted or even lost altogether during the data transmission over the radio link.
    [Show full text]
  • Smartphone Operating Systems Feature Comparison
    Computer Applications Mobile Operating Systems (MOS) Prof: Muhammad Moazam Ali Group Name: Twinkle 2 By: Hassam Rasheed (Leader) BAT11327 Daniyal Ali BAT11362 Junaid Siddique BAT11318 Umair Tariq BAT11315 Mobile Operating System A mobile operating system, also known as a mobile OS, a mobile platform, or a handheld operating system, is the operating system that controls a mobile device or information appliance—similar in principle to an operating system such as Windows, Mac OS, or Linux that controls a desktop computer or laptop. However, they are currently somewhat simpler, and deal more with the wireless versions of broadband and local connectivity, mobile multimedia formats, and different input methods. Typical examples of devices running a mobile operating system are Smartphone, personal digital assistants (PDAs), tablet computers and information appliances, or what are sometimes referred to as smart devices, which may also include embedded systems, or other mobile devices and wireless devices. Today's mobile devices are multi-functional devices capable of hosting a broad range of applications for both business and consumer use. PDAs and the ever-growing category of smart phones allow people to access the Internet for e-mail, instant messaging, text messaging and Web browsing, as well as work documents, contact lists and more. Mobile devices are often seen as an extension to your own PC. Work done on the road or away from the office can be synchronized with your PC to reflect changes and new information. History The increasing importance of mobile devices has triggered intense competition among technology giants, like Google, Microsoft, Apple, and Nokia in a bid to capture the bigger market share pre-emptively.
    [Show full text]
  • Rootkits on Smart Phones: Attacks and Implications
    Please do not remove this page Rootkits on Smart Phones: Attacks and Implications Bickford, Jeffrey; O’Hare, Ryan; Baliga, Arati; et.al. https://scholarship.libraries.rutgers.edu/discovery/delivery/01RUT_INST:ResearchRepository/12643455810004646?l#13643547520004646 Bickford, J., O’Hare, R., Baliga, A., Ganapathy, V., & Iftode, L. (2009). Rootkits on Smart Phones: Attacks and Implications. Rutgers University. https://doi.org/10.7282/T39W0JW4 This work is protected by copyright. You are free to use this resource, with proper attribution, for research and educational purposes. Other uses, such as reproduction or publication, may require the permission of the copyright holder. Downloaded On 2021/09/30 04:07:29 -0400 Rootkits on Smart Phones: Attacks and Implications Jeffrey Bickford, Ryan O’Hare, Arati Baliga, Vinod Ganapathy and Liviu Iftode Department of Computer Science Rutgers University ABSTRACT However, the increasing complexity of smart phones has also Smart phones are increasingly being equipped with operat- increased their vulnerability to attacks. Recent years have ing systems that compare in complexity with those on desk- witnessed the emergence of mobile malware, which are viruses top computers. This trend makes smart phone operating sys- and worms that infect smart phones. For instance, F-Secure tems vulnerable to many of the same threats as desktop op- reported an almost 400% increase in mobile malware within erating systems. a two year period from 2005-2007 [27]. Mobile malware typically use many of the same attack vectors as do malware This paper examines the threat posed by rootkits to smart for traditional computing infrastructures, but often spread phones. Rootkits are malware that stealthily achieve their via interfaces and services unique to smart phones, includ- goals by modifying operating system code and data, and ing Bluetooth, SMS and MMS.
    [Show full text]
  • Operating System
    …… Exercise 3 Technology Basics II Mobile Business I (WS 2018/19) Ahmed Seid Yesuf, M.Sc. Chair of Mobile Business & Multilateral Security . Johann Wolfgang Goethe University Frankfurt a. M. References …… § This set of slides is based upon the following lectures: § Lecture 8: Smart cards and Related Application Infrastructures § Lecture 9: Mobile Devices § Lecture 10: Concepts of Mobile Operating Systems § Lecture 11: Market Overview of Mobile Operating Systems and Security Aspects . 2 Exercise 1: …… Smartcards a) What are smart cards and what components do they consist of (=what do they contain)? . 1 . 3 …… Smartcards § Small computers with memory, operating system, software, processor, I/O and access control § Chip protected against manipulation § After being initialised with keys and other data smartcards are distributed . to their users. 1a 4 Smartcards …… Smartcard ground GND main in/output I/O CPU RAM memory reset signal RST operating power ROM system supply Vcc Access clock signal Clk Control application EEPROM data programming Vpp power . 1a . [Source: SecCommerce2002] 5 Exercise 1: …… Smartcards b) Why are they used and what role do smartcards play with respect to (i) security (ii) applications? . 1 . 6 …… Smartcards § Used when security of data (e.g. for keys, signatures, physical access control, payment) is needed in insecure environments § Examples: § Phone cards of Deutsche Telekom § Signature cards according to German Signature Law . § Smartcard applications for PC . § Smartcards for mobile communication (SIMs) 1b 7 Smartcards − Examples …… . 1b . 8 …… Why Smartcards? Protection needed against: § Unauthorised usage of services through forged user data § Duplication of a user’s credentials § „Cracking“ of credentials § Billing fraud . 1b 9 …… Example for faulty system design (CDMA) Duplication of intercepted user IDs .
    [Show full text]
  • Openmoko Linux是基於linux核心與自由軟體 (Free Software)的行動通訊平臺,同時也是全世界第一個真正100%開 This Document
    Openmoko E-courseware Text expand the openness to open learning Tsing Hua OpenLab. www.mokoversity.org Openmoko Inc. www.openmoko.com Creative Commons Attribution-Share Alike 3.0 License. Oct. 29, 2008. Revision 7. Text Text Text Openmoko 與 Mobile 2.0: 開放手機新機會 Creative Commons Attribution-Share Alike 3.0 License. Openmoko 專案 授權:以 LGPL/GPL v2 授權釋出 平臺:發展一個基於 Linux 的開放手機平臺 社群:Openmoko 開發者社群、於西方具有相當高的知名度 教育研究:開放源始碼適合教育與研究 3 Creative Commons Attribution-Share Alike 3.0 License. Creative Commons Attribution-Share Alike 3.0 License. Android 2008/2/18 !" 2:37 Android - An Open Handset Alliance Project Home Docs FAQ Blog Group Terms The Open Handset Alliance, a group of more than 30 technology and mobile companies, is developing Android: the first complete, open, and free mobile platform. To help developers get Getting Started started developing new applications, we're offering an early look at the Android Software 1. Learn about Android Development Kit. 2. Download the SDK 3. Join the community. Participate in our Open All applications are discussion group through email or the web. equal Android allows you to access core mobile device Android does not differentiate functionality through standard between the phone's basic API calls. and third-party applications -- even the dialer or home screen can be replaced. The Android Developer Challenge will award $10 million to developers who build great apps for Android. Breaking down Fast & easy Learn more! boundaries development Featured Videos Combine information from the The SDK contains what you web with data on the phone -- need to build and run Android such as contacts or applications, including a true geographic location -- to device emulator and create new user experiences.
    [Show full text]
  • Running a Standard Linux Distribution on a Smartphone
    CA R L VON O SS IETZKY DEPARTMENT FÜR INFORMATIK SYSTEMSOFTWARE UND VERTEILTE SYSTEME Running a standard Linux distribution on a smartphone Masterthesis Computer Science July 13, 2015 Sebastian Reichel (Matrikelnummer: 1104957) Otto-Wels-Str. 82 26133 Oldenburg Erstprüfer Prof. Dr.-Ing. Oliver Theel Zweitprüfer Eike Möhlmann, Dipl. Inform. Erklärung zur Urheberschaft Hiermit versichere ich, dass ich diese Arbeit selbstständig verfasst und keine anderen als die angegebenen Hilfsmittel und Quellen benutzt habe. Oldenburg, den July 12, 2015 Sebastian Reichel Contents 1. Introduction 2 2. Hardware Architecture6 3. Serial Access 12 4. Linux Kernel 23 4.1. N900 kernel support..................................... 25 4.2. Accelerometer......................................... 27 4.3. Modem............................................ 29 4.4. ARM Errata 430973..................................... 32 4.5. Bluetooth........................................... 33 4.6. Camera Subsystem...................................... 36 5. Userland 41 5.1. Graphical User Interface................................... 41 5.2. Wireless LAN......................................... 42 5.3. The modem.......................................... 43 6. Function tests 47 6.1. Updates & Security Updates................................. 47 6.2. Voice Calls.......................................... 47 6.3. Short Messages........................................ 48 6.4. Web Surfing.......................................... 49 6.5. Customization........................................
    [Show full text]
  • An Urgent Appeal from Wikipedia Founder Jimmy Wales Android
    Please read: An urgent appeal from Wikipedia founder Jimmy Wales Android (operating system) From Wikipedia, the free encyclopediaJump to: navigation, search Android Android 2.3 Company / developer Google Inc., Open Handset Alliance Programmed in C (core),[1] C++ (some third party libraries), Java (UI) Working state Current Source model Free and open source software Initial release 21 October 2008 (20081021) Latest stable release 2.3 (Gingerbread) Build: GRH47B / 16 December 2010; 5 days ago (20101216)[2] Supported platforms ARM, MIPS, Power Architecture, x86[citation needed] Kernel type Monolithic (modified Linux kernel) Default user interface Graphical License Apache 2.0 (some code are under the GPL v2[3]) Official website android.com Android is a mobile operating system initially developed by Android Inc. Android was purchased by Google in 2005.[4] Android is based upon a modified version of the Linux kernel. Google and other members of the Open Handset Alliance collabo rated to develop and release Android to the world.[5][6] The Android Open Source Project (AOSP) is tasked with the maintenance and further development of Androi d.[7] Unit sales for Android OS smartphones ranked first among all smartphone OS handsets sold in the U.S. in the second and third quarters of 2010,[8][9][10] w ith a third quarter market share of 43.6%.[11] Android has a large community of developers writing application programs ("apps" ) that extend the functionality of the devices. There are currently over 100,000 apps available for Android.[12][13] Android Market is the online app store run by Google, though apps can be downloaded from third party sites (except on AT&T, which disallows this).
    [Show full text]