Skip to main content

Dynamic Device Configuration in Ubiquitous Environments

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 92))

Abstract

The need of devices in crisis management to be configured dynamically by detecting device characteristics i.e. polices defined by the user or organization, contextual information relevant to a given scenario etc is of paramount importance. Where such information can either be already predefined or the user is allowed to define such information via automatically generated input User Interface (UI) associated to one or more extensible markup languages. Hence, the layout of the devices and behavior will be automatically configured based on policy settings and contextual information in a dynamic manner as such information changes. We present a method that allows dynamic configuration of devices that improves information systems flexibility via realizing dynamic configuration of components and enhancing management and functionality of such devices and security issues within the environment. Moreover, as this method will provide an instant configuration of devices at runtime, the components can provide and be used with uninterrupted running ability.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Weiser, M.: The computer for the 21st century. ACM SIGMOBILE Mobile Computing and Communications Review 3(3), 3–11 (1999)

    Article  Google Scholar 

  2. Judith, G., Franz, S.: Information System Flexibility and the Performance of Business Processes. Journal of the Association for Information Systems (JAIS), 1–43 (2005)

    Google Scholar 

  3. Lu, L., Zongyong, L., Ruibo, L.: Improving Information System Flexibility through Remote Dynamic Component Configuration. In: 2006 International Conference on Service Systems and Service Management 2006 (2006)

    Google Scholar 

  4. Lee, J.-J., Huang, C.-Y., Lee, L.-Y., Lei, C.-L.: Design and implementation of secure communication channels over UPnP networks. In: 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), pp. 307–312 (2007)

    Google Scholar 

  5. OSGi: The OSGi Service Platform - Dynamic services for networked devices (2008), www.osgi.org (cited 2005)

  6. Lee, J.-J., et al.: Design and implementation of secure communication channels over UPnP networks, Institute of Electrical and Electronics Engineers Computer Society, Piscataway, NJ 08855-1331, United States, Seoul, South Korea (2007)

    Google Scholar 

  7. DLNA: DLNA Overview and Vision Whitepaper (2006), http://www.dlna.org/en/industry/about/dlna_white_paper_2006.pdf (cited 2008)

  8. HAVi: The HAVi Specification (2004), http://www.havi.org/HAVi_1.1.pdf (cited 2006)

  9. ePerSpace: Towards the era of personal services at home and everywhere (2005), http://www.ist-eperspace.org/ (cited 2005)

  10. Merabti, M., et al.: Managing Distributed Networked Appliances in Home Networks. Proceedings of the IEEE 96(1), 166–185 (2008)

    Article  Google Scholar 

  11. Mol, J.J.D., et al.: Free-riding, fairness, and firewalls in P2P file-sharing. IEEE, Piscataway (2008)

    Google Scholar 

  12. Li, J.: On peer-to-peer (P2P) content delivery. Peer-to-Peer Networking and Applications 1(1), 45–63 (2008)

    Article  Google Scholar 

  13. Abdullahi, A., Qi, S., Madjid, M.: Situation Awareness in Systems of Systems Ad-hoc Environments. In: Proceedings 5th International Conference Global Security, Safety, and Sustainability, ICGS3 2009, London, UK, September 1-2, vol. 45, pp. 27–34. Springer, Heidelberg (2009)

    Google Scholar 

  14. Haifeng, Y., Michael, K., Gibbons, P.B., Flaxman, A.D.: SybilGuard: Defending Against Sybil Attacks via Social Networks. IEEE/ACM Transactions on Networking 16(3), 576–589 (2008)

    Article  Google Scholar 

  15. Benjamin, A., Geoff, H.: Detecting Man-in-the-Middle Attacks by Precise Timing. In: Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, pp. 81–86 (2009)

    Google Scholar 

  16. Bo, Z., Abdullahi, A., Oliver, D., David, L.-J., Madjid, M., Qi, S., Adrian, W., Rachel, C., Glyn, J., Arnold, K.L.Y.: Data Flow Security Analysis for System-of-Systems in a Public Security Incident. In: The 3rd Conference on Advances in Computer Security and Forensics (ACSF 2008), Liverpool, UK (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Arabo, A., Shi, Q., Merabti, M. (2010). Dynamic Device Configuration in Ubiquitous Environments. In: Tenreiro de Magalhães, S., Jahankhani, H., Hessami, A.G. (eds) Global Security, Safety, and Sustainability. ICGS3 2010. Communications in Computer and Information Science, vol 92. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15717-2_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15717-2_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15716-5

  • Online ISBN: 978-3-642-15717-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics