13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

A New Framework for Build<strong>in</strong>g Secure Collaborative Systems 165As a result, M2MI offers these key advantages over exist<strong>in</strong>g systems:• M2MI-based systems do not require central servers; <strong>in</strong>stead, applications run collectivelyon the proximal devices themselves.• M2MI-based systems do not require network adm<strong>in</strong>istration to assign addresses todevices, set up rout<strong>in</strong>g, and so on, s<strong>in</strong>ce method <strong>in</strong>vocations are broadcast to allnear<strong>by</strong> devices. Consequently,• M2MI is well-suited for an ad hoc network<strong>in</strong>g environment where central serversmay not be available and devices may come and go unpredictably.• M2MI-based systems allow to decrypt an encrypt method <strong>in</strong>vocations us<strong>in</strong>g sessionkeys [9].• M2MI-based systems do not need complicated ad hoc rout<strong>in</strong>g protocols that consumememory, process<strong>in</strong>g, and network bandwidth resources [10]. Consequently,• M2MI is well-suited for small mobile devices with limited resources and batterylife.• M2MI simplifies system development <strong>in</strong> several ways. By us<strong>in</strong>g M2MI's highlevelmethod call abstraction, developers avoid hav<strong>in</strong>g to work with low-level networkmessages. S<strong>in</strong>ce M2MI does not need to discover target devices explicitly orset up <strong>in</strong>dividual connections, developers need not write the code to do all that.• M2MI simplifies system deployment <strong>by</strong> elim<strong>in</strong>at<strong>in</strong>g the need for always-on applicationservers, lookup services, code-base servers, and so on; <strong>by</strong> elim<strong>in</strong>at<strong>in</strong>g thesoftware that would otherwise have to be <strong>in</strong>stalled on all these servers; and <strong>by</strong>elim<strong>in</strong>at<strong>in</strong>g the need for network configuration.M2MI's key technical <strong>in</strong>novations are these:• M2MI layers an object oriented abstraction on top of broadcast messag<strong>in</strong>g, lett<strong>in</strong>gthe application developer work with high-level method calls <strong>in</strong>stead of low-levelnetwork messages.• M2MI uses dynamic proxy synthesis to create remote method <strong>in</strong>vocation proxies(stubs and skeletons) automatically at run time - as opposed to exist<strong>in</strong>g remotemethod <strong>in</strong>vocation systems, which compile the proxies, offl<strong>in</strong>e and which mustdeploy the proxies ahead of time.This paper is organized as follows: the next chapter describes the target environmentfor M2MI based systems; the follow<strong>in</strong>g chapter discusses the M2MI paradigm followed<strong>by</strong> a chapter show<strong>in</strong>g how M2MI can be used to develop applications and servicediscovery frameworks. The last two chapters discuss a dynamic fault tolerant keymanagement system.Target EnvironmnetM2MI's target doma<strong>in</strong> is ad hoc collaborative systems: systems where multiple userswith comput<strong>in</strong>g devices, as well as multiple standalone devices like pr<strong>in</strong>ters, cameras,and sensors, all participate simultaneously (collaborative); and systems where thevarious devices come and go and so are not configured to know about each otherahead of time (ad hoc). Examples of ad hoc collaborative systems <strong>in</strong>clude:

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!