13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

A New Framework for Build<strong>in</strong>g Secure Collaborative Systems 165As a result, M2MI offers these key advantages over exist<strong>in</strong>g systems:• M2MI-based systems do not require central servers; <strong>in</strong>stead, applications run collectivelyon the proximal devices themselves.• M2MI-based systems do not require network adm<strong>in</strong>istration to assign addresses todevices, set up rout<strong>in</strong>g, and so on, s<strong>in</strong>ce method <strong>in</strong>vocations are broadcast to allnear<strong>by</strong> devices. Consequently,• M2MI is well-suited for an ad hoc network<strong>in</strong>g environment where central serversmay not be available and devices may come and go unpredictably.• M2MI-based systems allow to decrypt an encrypt method <strong>in</strong>vocations us<strong>in</strong>g sessionkeys [9].• M2MI-based systems do not need complicated ad hoc rout<strong>in</strong>g protocols that consumememory, process<strong>in</strong>g, and network bandwidth resources [10]. Consequently,• M2MI is well-suited for small mobile devices with limited resources and batterylife.• M2MI simplifies system development <strong>in</strong> several ways. By us<strong>in</strong>g M2MI's highlevelmethod call abstraction, developers avoid hav<strong>in</strong>g to work with low-level networkmessages. S<strong>in</strong>ce M2MI does not need to discover target devices explicitly orset up <strong>in</strong>dividual connections, developers need not write the code to do all that.• M2MI simplifies system deployment <strong>by</strong> elim<strong>in</strong>at<strong>in</strong>g the need for always-on applicationservers, lookup services, code-base servers, and so on; <strong>by</strong> elim<strong>in</strong>at<strong>in</strong>g thesoftware that would otherwise have to be <strong>in</strong>stalled on all these servers; and <strong>by</strong>elim<strong>in</strong>at<strong>in</strong>g the need for network configuration.M2MI's key technical <strong>in</strong>novations are these:• M2MI layers an object oriented abstraction on top of broadcast messag<strong>in</strong>g, lett<strong>in</strong>gthe application developer work with high-level method calls <strong>in</strong>stead of low-levelnetwork messages.• M2MI uses dynamic proxy synthesis to create remote method <strong>in</strong>vocation proxies(stubs and skeletons) automatically at run time - as opposed to exist<strong>in</strong>g remotemethod <strong>in</strong>vocation systems, which compile the proxies, offl<strong>in</strong>e and which mustdeploy the proxies ahead of time.This paper is organized as follows: the next chapter describes the target environmentfor M2MI based systems; the follow<strong>in</strong>g chapter discusses the M2MI paradigm followed<strong>by</strong> a chapter show<strong>in</strong>g how M2MI can be used to develop applications and servicediscovery frameworks. The last two chapters discuss a dynamic fault tolerant keymanagement system.Target EnvironmnetM2MI's target doma<strong>in</strong> is ad hoc collaborative systems: systems where multiple userswith comput<strong>in</strong>g devices, as well as multiple standalone devices like pr<strong>in</strong>ters, cameras,and sensors, all participate simultaneously (collaborative); and systems where thevarious devices come and go and so are not configured to know about each otherahead of time (ad hoc). Examples of ad hoc collaborative systems <strong>in</strong>clude:

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!