Immediate Download Pervasive Communications Handbook 1st Edition Syed Ijlal Ali Shah Ebooks 2024
Immediate Download Pervasive Communications Handbook 1st Edition Syed Ijlal Ali Shah Ebooks 2024
com
https://ebookgate.com/product/pervasive-communications-
handbook-1st-edition-syed-ijlal-ali-shah/
OR CLICK HERE
DOWLOAD NOW
https://ebookgate.com/product/beginning-node-js-1st-edition-basarat-
ali-syed-auth/
ebookgate.com
https://ebookgate.com/product/advertising-and-integrated-marketing-
communications-1st-edition-kruti-shah/
ebookgate.com
https://ebookgate.com/product/rfid-handbook-applications-technology-
security-and-privacy-1st-edition-syed-a-ahson/
ebookgate.com
Ubiquitous and Pervasive Commerce New Frontiers for
Electronic Business Computer Communications and Networks
1st Edition. Edition George Roussos (Editor)
https://ebookgate.com/product/ubiquitous-and-pervasive-commerce-new-
frontiers-for-electronic-business-computer-communications-and-
networks-1st-edition-edition-george-roussos-editor/
ebookgate.com
https://ebookgate.com/product/idries-shah-the-commanding-self-1st-
edition-idries-shah/
ebookgate.com
https://ebookgate.com/product/mobile-communications-handbook-3rd-ed-
edition-gibson/
ebookgate.com
https://ebookgate.com/product/the-arrl-image-communications-
handbook-1st-ed-edition-taggart/
ebookgate.com
https://ebookgate.com/product/handbook-of-industrial-chemistry-
organic-chemicals-handbooks-1st-edition-m-ali/
ebookgate.com
Pervasive
Communications
Handbook
Pervasive
Communications
Handbook
Edited by
Syed Ijlal Ali Shah
Mohammad Ilyas
Hussein T. Mouftah
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts
have been made to publish reliable data and information, but the author and publisher cannot assume
responsibility for the validity of all materials or the consequences of their use. The authors and publishers
have attempted to trace the copyright holders of all material reproduced in this publication and apologize to
copyright holders if permission to publish in this form has not been obtained. If any copyright material has
not been acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmit-
ted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented,
including photocopying, microfilming, and recording, or in any information storage or retrieval system,
without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright.
com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood
Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and
registration for a variety of users. For organizations that have been granted a photocopy license by the CCC,
a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used
only for identification and explanation without intent to infringe.
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
Preface.................................................................................................. ix
Editors.. ..................................................................................................xi
Contributors.........................................................................................xv
Section I Technology
1 Privacy-Preserving Anonymous Secure Communication
in Pervasive Computing.. ............................................................1-1
Sk. Md. Mizanur Rahman and Hussein T. Mouftah
2 Challenges in Testing Context-Aware Applications................. 2-1
Rana Ejaz Ahmed
3 Medium Access Control Protocols for Wireless Sensor
Networks in a Pervasive Computing Paradigm........................ 3-1
Muhammad K. Dhodhi, Syed Ijlal Ali Shah, and Marwan Fayed
4 On the Quality of Service Routing in Mobile
Ad Hoc Networks.. ...................................................................... 4-1
Jamal N. Al-Karaki and Ibrahim Al-Oqily
5 Power-Aware Video Compression for
Mobile Environments.. ............................................................... 5-1
Ishfaq Ahmad, Victor Yongfang Liang, and Zhihai (Henry) He
6 Low-Power Design for Smart Dust Networks........................... 6-1
Zdravko Karakehayov
7 Security Improvement of Slotted ALOHA in the Presence
of Attacking Signals in Wireless Networks.. ..............................7-1
Jahangir H. Sarker and Hussein T. Mouftah
v
vi Contents
The field of pervasive communication represents the next logical step in the evolution of
communication networks. It essentially means that in a pervasive communication envi-
ronment, we will all be able to communicate with others, whenever, wherever, and with
whatever communication device(s) we carry. We will be connected all the time and have
the ability to take our personal and corporate information with us wherever we go. This
ubiquitous communication ability includes one-to-one, one-to-many, and many-to-one
exchange of information.
This pervasive communication is being enabled by continuous advancements in mul-
tiple areas of research and development. First and foremost are developments in the
device and process technologies that are able to drastically reduce the size and power
requirements of sensing and communication devices, while doubling the processing
capacity every couple years. This reduction in size and power, while more than an equal
increase in the processing capacity, is enabling these technologies to be embedded in
every aspect of our daily lives. So much so that it is almost impossible to avoid sensors
even in our very basic mundane activities. These days sensors are embedded in the auto-
mobiles we drive, the cooking ranges we cook our food on, air conditioners, and the
communication devices we use.
Equally important are the advancements in application-level software and firmware,
and communication technology that seamlessly connect these sensors to the rest of the
world, in a manner that makes sense. These advances are making it possible for us to
develop appropriate human machine interfaces. Standardization of communication
protocols such as 802.17 (Zigbee) and 802.11n are further helping pervade the 24/7
online concept.
Examples of how the pervasive computing paradigm is changing our world are plenty;
however, we will mention only two possible examples. We all drive on highways; how-
ever, in a pervasive communication paradigm, the drivers will have a different user
experience than what they currently have. In a pervasive communications paradigm,
users will start receiving location- and need-specific information about the neighbor-
hood they are driving through. For example, information about local restaurants
(including discount coupons) could be presented to the driver if it is time for dinner.
Similarly, users may start receiving offers on hotels that are within, say, 5 miles of radius
of their location on the highway, if they are looking for hotels.
ix
x Preface
Dr. Syed Ijlal Ali Shah has more than 15 years of experience in the telecommunications
and datacom industry. He has contributed to leading-edge technology through aca-
demic papers, industrial contributions (products), and patents. He was a key member of
the team that worked on ATM switches and networks when the technology was first
introduced. He was also a key member of the team that worked on a new generation of
devices called Network Processors in early 2000. Network Processors like ATMs created
a paradigm shift on reconfigurable multiprotocol processors. He has worked and con-
tributed heavily to the definition and creation of new interconnect and switching
technology called RapidIO (RIO). RapidIO is an alternative backplane interconnect
technology to Ethernet and is the preferred interconnect technology in base stations.
Dr. Shah is currently with Freescale Semiconductor as a data path Systems Architect.
At Freescale Semiconductor, he has defined and worked on the architecture of Freescale’s
traffic management co-processor, the RapidIO Fabric, and has been a key contributor to
several other network-related projects.
Prior to Freescale/Motorola, Shah was an associate professor at the Lahore University
of Management Sciences (LUMS). And prior to LUMS, he was at Nortel as senior mem-
ber of the technical staff, where he helped define and architect packet switching prod-
ucts, and Quality of Service (QoS) and network dimensioning methodologies.
Dr. Shah holds a PhD and an MS in electrical engineering from Columbia University
and a master’s in engineering management from the University of Ottawa. He holds four
patents on call admission control algorithms for switches/routers and dynamic IP/ATM
congestion management, with several more pending. He was recently awarded the
“Engineering Award” by Freescale for his contributions. He has presented on IP/ATM
congestion control and traffic management at various conferences and invited sessions,
and has published over 35 industrial and academic papers in conferences and journals
on various aspects of QoS, network design and architecture, and all-optical networks,
wireless sensor networks, and Multicore processors.
He was the editor for the Traffic Management specification for the RapidIO Trade
Association from 2004 to 2006. He was also the Technical Committee co-chair for
Power.Org from 2007 to 2009, where he was instrumental in streamlining the technical
committee activities and aligning them with membership interests. He was the guest
editor for IEEE Communication Magazine on Fabric and Interconnect Standards and
xi
xii Editors
was the associate technical editor for the magazine from 2000 to 2002. His research
interests include sensor network design, QoS in IP networks, optical networks, wireless
networking, and pervasive communications.
Dr. Mohammad Ilyas received his BSc in electrical engineering from the University of
Engineering and Technology, Lahore, Pakistan, in 1976. From March 1977 to September
1978, he worked for the Water and Power Development Authority, Pakistan. In 1978, he
was awarded a scholarship for his graduate studies, and he completed his MS in electri-
cal and electronic engineering in June 1980 at Shiraz University, Shiraz, Iran. In
September 1980, he joined the doctoral program at Queen’s University in Kingston,
Ontario, Canada. He completed his PhD in 1983. His doctoral research was about
switching and flow control techniques in computer communication networks. Since
September 1983, he has been with the College of Engineering and Computer Science at
Florida Atlantic University, Boca Raton, Florida, where he is currently associate dean for
research and industry relations. From 1994 to 2000, he was chair of the Department of
Computer Science and Engineering. From July 2004 to September 2005, he served as
Interim Associate Vice President for Research and Graduate Studies. During the 1993–
1994 academic year, he was on his sabbatical leave with the Department of Computer
Engineering, King Saud University, Riyadh, Saudi Arabia.
Dr. Ilyas has conducted successful research in various areas, including traffic man-
agement and congestion control in broadband/high-speed communication networks,
traffic characterization, wireless communication networks, performance modeling, and
simulation. He has published 1 book, 8 handbooks, and over 150 research articles. He
has supervised 10 PhD dissertations and more than 37 MS theses to completion. He has
been a consultant to several national and international organizations. Dr. Ilyas is an
active participant in several IEEE technical committees and activities.
Dr. Ilyas is a senior member of IEEE and a member of ASEE.
Hussein T. Mouftah received his BSc and MSc from Alexandria University, Egypt, in
1969 and 1972, respectively, and his PhD from Laval University, Quebec, Canada, in
1975. He joined the School of Information Technology and Engineering (SITE) of the
University of Ottawa in 2002 as a Tier 1 Canada Research Chair Professor, where he
became a University Distinguished Professor in 2006. He has been with the ECE
Department at Queen’s University (1979–2002), where he was prior to his departure a
full professor and the department associate head. He has six years of industrial experi-
ence, mainly at Bell Northern Research of Ottawa (now Nortel Networks). He served as
editor-in-chief of the IEEE Communications Magazine (1995–1997) and IEEE ComSoc
director of Magazines (1998–1999), chair of the Awards Committee (2002–2003), direc-
tor of Education (2006–2007), and member of the Board of Governors (1997–1999 and
2006–2007). He has been a distinguished speaker of the IEEE Communications Society
(2000–2007). He is the author/coauthor of 7 books, 48 book chapters and more than
1000 technical papers, 12 patents, and 140 industrial reports. He is the joint holder of 12
best paper and/or outstanding paper awards. He has received numerous prestigious
awards, such as the 2007 Royal Society of Canada Thomas W. Eadie Medal, the 2007–
2008 University of Ottawa Award for Excellence in Research, the 2008 ORION
Editors xiii
Leadership Award of Merit, the 2006 IEEE Canada McNaughton Gold Medal, the 2006
EIC Julian Smith Medal, the 2004 IEEE ComSoc Edwin Howard Armstrong Achievement
Award, the 2004 George S. Glinski Award for Excellence in Research of the University of
Ottawa Faculty of Engineering, the 1989 Engineering Medal for Research and
Development of the Association of Professional Engineers of Ontario (PEO), and the
Ontario Distinguished Researcher Award of the Ontario Innovation Trust. Dr. Mouftah
is a fellow of the IEEE (1990), the Canadian Academy of Engineering (2003), the
Engineering Institute of Canada (2005), and the Royal Society of Canada RSC Academy
of Science (2008).
Contributors
xv
xvi Contributors
Yu-Chee Tseng
National Chiao-Tung University
Hsincho, Taiwan
I
Technology
1 Privacy-Preserving Anonymous Secure Communication
in Pervasive Computing Sk. Md. Mizanur Rahman and
Hussein T. Mouftah.................................................................................1-1
Security and Privacy Preservation for Pervasive
Communication • Privacy and Security Parameters • Anonymous
On-Demand Position-Based Secure Communication in Pervasive
Communications • User-Controllable Security and Privacy System
for Pervasive Computing • Conclusion • References
2 Challenges in Testing Context-Aware
Applications Rana Ejaz Ahmed.................................................................2-1
Introduction • Modeling Context-Aware Systems • Testing
Challenges • Recent Trends in Testing Context-Aware
Applications • Summary and Conclusions • References
3 Medium Access Control Protocols for Wireless Sensor Networks
in a Pervasive Computing Paradigm Muhammad K. Dhodhi,
Syed Ijlal Ali Shah, and Marwan Fayed...................................................3-1
Introduction • MAC Protocols • Conclusions and Future
Directions • References
4 On the Quality of Service Routing in Mobile Ad Hoc
Networks Jamal N. Al-Karaki and Ibrahim Al-Oqily...............................4-1
Introduction • Challenges of QoS Support in MANETs • QoS Routing
Protocols in MANETs • QoS Routing in WMNs • Open Issues in QoS
Routing in AHNs • Conclusion • References
5 Power-Aware Video Compression for Mobile
Environments Ishfaq Ahmad, Victor Yongfang Liang,
and Zhihai (Henry) He....................................................................................5-1
Introduction • Related Research Works • Complexity Scalable Video
Coding Design • Power Rate Distortion Analysis • Power and
Distortion Optimized Video Coding • Experimental
Results • References
I-1
I-2 Pervasive Communications Handbook
1.1 S
ecurity and Privacy Preservation for Pervasive
Communication
When someone is asked to use his/her office, what goes through his/her mind? Is it the
probability that may be it is for an overseas call? Is it the fear that may be it is for browsing
his/her profile or confidential documents lying on the table? Or in the case of a total
stranger, how it is known about the office? Certainly, it is not easy to deal with all these
questions at once in everyday life, but somehow it should be handled if it is arisen. As the
1-1
1-2 Pervasive Communications Handbook
reality of pervasive computing becomes more and more apparent, these types of requests
become more subtle, frequent, and potentially impacting [1]. Considering recent technol-
ogy and ongoing advances, devices embedded in smart environments and worn on our
bodies will communicate seamlessly about any number of different things. In such kind
of interactions, huge amounts of information are shared and exchanged [2]. Even though
this may be the means of enjoying context-based and other enhanced services, there is an
increased risk involved in some of these interactions and collaborations, if collaborators
are about to use our private possessions [3]. This further illustrates how combined assess-
ment of the interrelationships between trust, security, privacy, and context aid in confi-
dent decision-making [4]. In everyday life we do not treat these concerns in isolation; we
actually make spontaneous decisions that are based on maintaining a “comfortable” bal-
ance. Although we do not completely understand these basic building blocks, the poten-
tial trade-offs are intuitively understood, even if technically underexplored [1].
A user who does not wish to be tracked by an application will want to use different
pseudonyms on each visit. Many applications can offer better services if they retain per-
user state, such as personal preferences; but if a set of preferences were accessed by sev-
eral different pseudonyms, the application would easily guess that these pseudonyms
map to the same user [1]. We therefore need to ensure that the user state for each pseud-
onym looks, to the application, different from that of any other pseudonym. There are
two main difficulties. First, the state for a given user (common to all that user’s pseud-
onyms) must be stored elsewhere and then supplied to the application in an anonymized
fashion. Secondly, the application must not be able to determine that two sets of prefer-
ences map to the same user, so we might have to add small, random variations. However,
insignificant variations might be recognizable to a hostile observer, whereas significant
ones could adversely affect semantics and therefore functionality [1].
In the following sections, at first we discuss privacy and security parameters for perva-
sive computing, then we discuss some existing protocols for different pervasive environ-
ments. In Section 3, we discuss a protocol on position-based privacy-preserving secure
communication for pervasive mobile ad-hoc communication. In Section 4, we discuss a
user controllable privacy-preserving secure communication in pervasive computing.
their distance, that is, the number of hops, from either the source or the destina-
tion. It is said that a protocol satisfying (a) achieves weak location privacy and a
protocol satisfying both (a) and (b) achieves strong location privacy [5].
Route Anonymity: Requirements for route anonymity are as follows: (a) adversar-
ies either in the route or out of the route cannot trace packet flow back to its
source or destination; (b) adversaries not in the route have no information on
any part of the route; (c) it is difficult for adversaries to infer the transmission
pattern and motion pattern of the source or the destination [5].
1.3 A
nonymous On-Demand Position-Based Secure
Communication in Pervasive Communications
Sk. Md. Mizanur Rahman et al. [5,7] proposed an on-demand position-based routing
protocol for pervasive mobile ad hoc environment, where position information of a node
was kept secret during the communication among the nodes in the network. A detailed
description is given in the following section.
When a node joins a network, it is registered the PS and gets a CK and a pair of PK/SK
from the PS.
When a node updates its position information and sends it to the PS, it generates a
random number and sends it together with its position information to the PS. This
random number is used for generating Auth, where Auth = [H1 (Destination’s Position,
Destination’s random number)] and H1 is a global hash function. The notation
A = [B, C, . . ., Z] means variable A is substituted by the concatenation of B, C, . . ., Z.
Later, at the route discovery phase, Auth is used for authenticating the destination to
the source.
To obtain the position information of the destination from the PS, the source has to
send a signed position request to PS with a route-request sequence number (RRQSeqNo).
After verification of the signature, the PS responds to the source’s request with the posi-
tion information of the destination, Auth, public key PK Dest of the destination, and a
Token defined as Token = [HPS(Sender Temp ID, Receiver Temp ID), Time, RRQSeqNo],
where HPS is a local hash function defined by the PS. Position information is used for
generating the temporary ID, Temp ID. In contrast, Position is used only for routing,
and it is encrypted by CK in the route-request phase.
A sender keeps Auth received from the PS for a session of communication. At the last
phase of the route-discovery procedure, destination will reply with a route-reply mes-
sage (RRPMsg) for its authentication to the sender: RRPMsg = [SigSKDest (Auth)], where
SigSK is a digital signature function under secret key (SK) and SK Dest is the SK of the
public/secret key pair of the destination. With this RRPMsg, the sender authenticates
the destination.
A Token is sent in the last phase of data transmission to the destination. At the end of
the communication, the destination sends this Token to PS, so that PS can determine
whether the communication between the source and the destination is valid. If a node
takes the position information of the destination and does not make a data transmission,
then PS will not supply any further position information to that node.
For construction purposes, when senders or forwarders forward any packet, they gen-
erate a large bit random number and make parts of that random bit corresponding to the
number of fields of the packet. And they specify all the fields with a specific bit number.
They then encrypt these fields by padding with random bits. When a packet reaches a
node, the node first decrypts and extracts the random bits from the fields and pads their
own random bits. As all the fields of a packet are changed, when a packet moves from
node to node, it appears new to the network. This procedure is applicable to all the
encrypted fields of all the packets. Encryption/decryption is performed as necessary
when a packet moves from node to node.
Sender Temp ID: For every session of communication, a source generates its tempo-
rary ID Temp ID, computed as Temp ID = [H (Position, Time, PK)], where H is
a global hash function known to all legitimate nodes in the network, Position is
the position of the source, Time is the present time, and PK is a public key of the
source. Temp ID uniquely identifies the source in each session of communica-
tion and is dynamically changed from session to session and from hop to hop.
When nodes staying within the sender’s radio range receive the RRQ packet,
they will become new senders or forwarders and update the Temp ID into their
own Temp ID, which is generated in a similar way as mentioned above.
For successful identification, the Temp ID should be unique for each session of
communication. To this end, H should be collision resistant. Theoretically
proven collision-resistant hash functions are slow; thus, in practice, hash func-
tions that are expected to be collision-resistant, such as Message Digest algo-
rithm 5 (MD5) [12] and Secure Hash Algorithm 1(SHA-1) [13], are used instead.
The probability of finding a collision for MD5 with respect to 128-bit output and
that for SHA-1 with respect to 160-bit output have been estimated as, on aver-
age, 264 and 280, respectively. As long as these probabilities hold, it is difficult to
find the same Temp ID for different nodes in each session of communication.
RRQSeqNo: It is generated by the source uniquely, for the uniqueness of a session.
Position of Destination (PD): The geographical position (XT, YT) of the destination,
taken from PS and encrypted by CK.
Number of Hops (NH): NH is the minimum number of hops that an RRQ packet
travels to find a route from the source to the destination. NH is estimated by
the source. It is changed by the source when the source tries to find a route with
a new estimation. It is also encrypted by CK.
Privacy-Preserving Anonymous Secure Communication 1-7
1) Temp NH = Temp NH – 1
Dr (A)
2) Check <= n – 1
NH = n Temp NH = n – 1 R
3) If yes, then forward
Node A
NH = n Temp NH = n Dr (A)
S D T
Dr (B)
Node B
NH = n Temp NH = n – 1 1) Temp NH = Temp NH – 1
Dr (B)
2) Check <= n – 1
R
3) If no, then discard
Quadratic placement means that a node is connected in its radio range with its neigh-
bors in all four compass directions from its center (Figure 1.2): thus, their corresponding
densities are approximated as μ quad ≈ n /[{π + ( 3 / 2) + 1} × R2 ], where n is the number
of nodes to make the connection and R is the radius of the maximum radio-range cover-
age of each node of the ad-hoc network. When any node sends a packet within its radio
range, the other nodes within its radio range can receive the packets. Line placement
means that a node can be connected to any node in a line via intermediate nodes. Least
placement means that a node can reach another node with just one connection to its
neighbor (Figure 1.3).
At first, we describe the estimation of NH by the source for different placements of the
nodes in the network. The source estimates NH on the basis of the density of the nodes
in the network, and NH is the highest when node density is the lowest and vice-versa.
NH is thus proportional to 1/μ, where μ is the density of the nodes.
For line placement, NH = D/R, where R is the radius of the maximum radio-range
coverage of each node of the ad-hoc network, D is the distance from the source to the
destination, D = ( XT − X S )2 + (YT − YS )2 , where (XS , YS) and (XT , YT) are the source’s
and destination’s positions, respectively. In this placement, NH is the minimum number
of hops, from the source to the destination, estimated by the source.
For μqaud it is assumed that NH = f(L,B)/R, where f is a linear function in L and B,
where length L is the horizontal distance from the source to destination and breadth B
is the vertical distance from the source to destination.
For least placement, it is assumed that NH = (k × g(C))/R, where k is a constant and
a function of L/R or B/R; and g is an exponential function in circumference C of the area
of the network. In this placement, NH is the maximum number of hops, from the source
to the destination.
After receiving the destination’s position, the source estimates NH and assigns this
NH to Temp NH. It then source sends an RRQ packet within its radio range and waits to
receive a response, which is either RRP or Fail during time 2 × TTL, where TTL denotes
time to leave and is estimated by the source from TTL = (traveling time for one
hop) × (number of hop).
• If the source receives RRP, by decrypting RRPMsg of RRP, it tries to find a match
with Auth. If a match is found, it stores the corresponding RRQSeqNo, NH,
receiver’s Temp ID, and status (i.e., “yes”) in its routing table. It then sends data
encrypted by the destination’s PK. Lastly, sender sends Token to the destination so
that destination can inform the PS of this communication.
• If it receives a Fail packet, it stores the corresponding RRQSeqNo, NH, and status
(“no”) to its routing table, and again tries with a new estimated NH.
• If it does not receive any response and TTL is exceeded, it stores RRQSeqNo, NH,
and status (“no”) in its routing table, and again tries with a new estimated NH.
As a result of this procedure, if the source fails to find the destination with an esti-
mated NH, it tries with the next estimated NH until it finds the route. In this way, it can
try with the minimum to the maximum estimated NH. Moreover, the maximum num-
ber of hops can be varied for different placements.
Intermediate Nodes or Forwarders: If a node receives a packet RRQ, but it is not the
destination, it is a forwarder and becomes a new sender. Forwarder F generates its own
Temp ID and calculates distance Dr(F) between F and its destination T by
Dr (F ) = ( XT − X F )2 + (YT − YF )2 from the forwarder’s position (XF, YF) and destina-
tion’s position (XT, YT). F then updates Temp NH by Temp NH = Temp NH − 1. It
compares this updated Temp NH with Dr(F)/R and makes the following decision, as
shown schematically in Figure 1.4.
• If Dr(F)/R ≤ Updated Temp NH, forwarder F forwards the packet to its radio
region and keeps the route information.
• If Dr(F)/R > Updated Temp NH, forwarder F discards the packets.
a b c d e f g h i j k l m n
o p q r s t u v w x y z 0 1
2 3 4 5 6 7 8 9 10 11 12 13 14 15
After forwarding a packet, the forwarder waits to receive a response for time 2 × TTL1,
where TTL1 is computed from TTL1 = (traveling time for one hop) × (updated number of
hops).
• If the forwarder receives RRP, it just forwards it on the reverse path and keeps the
route information.
• If the forwarder receives Fail, it also forwards it on the same reverse path and
keeps the route information.
• If it does not receive any response and its waiting time exceeds TTL1, it generates
Fail and forwards it on the reverse path.
Destination: The destination checks EM of RRQ to confirm the destination of RRQ.
Finally, it replies by RRP and keeps the route information.
• If the forwarder receives an RRP, it keeps the route information and sends it on
the reverse path.
• If the forwarder receives Fail, then it keeps the route information and sends it on
the reverse path.
If the waiting time for the forwarder exceeds 2 × TTL1 time, then the forwarder gen-
erates Fail and sends it on the reverse path.
Identity Privacy: In AODPR, the identities Temp ID of the nodes are changing in
each hop as a packet is forwarded. Location of destination is encrypted and
padded with random bits. Also the Temp ID is changed in each session of com-
munication. The Temp ID depends on not only the position of the node and the
PK but also on time, so it is changeable within a hop range. So, AODPR ensures
identity privacy.
Location Privacy: The general concept of the current attacks on the location pri-
vacy is to observe the route request and route response packets and to estimate
the distance between the source and the destination from the traveling infor-
mation added to the packet, that is, how many hops it travels. In contrast to
existing anonymous ad-hoc routing protocols, there is no extra traveling infor-
mation added to the packets in our scheme, and estimating the distance
between the source and the destination is not possible in a straightforward
way. No node knows anything about the location and identity of the other
nodes, including the source, and it does not know from where a packet starts to
travel in the network. Even though all legitimate nodes can determine the dis-
tance from themselves to the destination and also know the Temp ID of other
nodes in the neighboring region, no one except the source can determine the
1-12 Pervasive Communications Handbook
a b c d e f g h i j k l m
z y x w v u t s r q p o 0
distance from the source to the destination by using this information. Location
privacy is thus achieved.
Route Anonymity: Current attacks on route anonymity are based on traffic analy-
sis [17]. The general theory behind these kinds of attacks is to trace or to find
the path in which the packets are moving. For this purpose, a malicious node
mainly looks for unchangeable information, that is, common information in
a packet, so that it can trace the movement of control packets. As a result, the
adversaries can find or estimate the route from the source to the destination.
In AODPR, all the control packets appear new (Figure 1.5) in the network
when packets move from node to node. So, no one can trace the path of the
route. Route anonymity is thus achieved. A detailed description is given in the
Appendix.
DoS: Multiple adversaries cooperatively or one adversary with enough power can
exhaust the resource of a specific target node. To this end, adversaries need to
identify a node and set that specific node as a target. In AODPR, identity pri-
vacy is achieved as discussed above and DoS can be protected.
Wormhole Attacks: In wormhole attack, there could be a long distance for a packet
to travel for finding the route from the source to the destination. In AODPR,
the source and the forwarders wait for a limited time, TTL or TTL1, for getting
a response based on the estimated NH. If an attacker’s response exceeds a lim-
ited time, it cannot be a forwarder within a routing path. If the attacker is a
forwarder within a path limit and does not reply properly, this path no longer
remains valid. The sender will try another path. A wormhole attack is therefore
not effective in the case of AODPR.
Rushing Attack: Many existing on-demand routing protocols forward only the
request that arrives first from each route discovery. In a rushing attack, the
attacker exploits this property of the operation of route discovery and estab-
lishes a rushing attack. A more powerful rushing attacker may employ a worm-
hole to rush packets. By using the tunnel of a wormhole attack, the attacker can
introduce a rushing attack. As shown above, AODPR can prevent a wormhole
attack. It is thus also robust against a rushing attack.
Privacy-Preserving Anonymous Secure Communication 1-13
60
50
Estimation by linear 1
Estimation by linear 2
Estimation by linear 3
40 Estimation by linear 4
Estimation by linear 5
Number of trials
Estimation by exponential 1
Estimation by exponential 2
30
20
10
0
5 11 15 21 25 31 35 41 45 51
Number of nodes
FIGURE 1.6 Number of trials for different estimation methods to find a route for different num-
bers of nodes in a least-placement-connected network.
1.4 U
ser-Controllable Security and Privacy System
for Pervasive Computing
Jason et al. proposed an user-controllable security and privacy system in [18], where they
developed and evaluated three different applications, that are (1) a contextual instant
Privacy-Preserving Anonymous Secure Communication 1-15
essenger, (2) a people finder application, and (3) a phone-based application for access con-
m
trol. In this work, the authors describe their work with respect to three pervasive-computing
scenarios and then drew out themes for the applications. The applications are as follows:
I. Contextual Instant Messaging: Users can inquire about each other’s context (e.g.,
interruptability, location, and current task) through an instant messaging
service.
II. People Finder Application: Users are equipped with location-aware smart phones.
They interact with their devices to inquire about the locations of others subject to
privacy policies.
III. Access Control to Resources: Smart phones are used to access both physical and
digital resources. Users can use their smart phones to create and manage their
security policies, and to give others credentials to access different resources.
three information types being disclosed were all potentially sensitive interruptibility:
3.6, location: 4.1, active window: 4.9, all out of 5). Participants informed that they were
comfortable with their privacy settings (4.1/5). The result is particularly interesting,
since as the part of the experiment. However, most of the participants’ settings were set
up not to reveal anything by default, and so they were unconcerned and did not mention
this issue at a debriefing at the end of the study.
delegation was being investigated in better ways to bootstrap so that Grey will be
more useful, even for a small population.
• One of the objectives of this trial deployment was to study the types of access-
control policies users would create when no longer constrained by the limitations
imposed by difficult-to-obtain physical keys. It is observed that the users creating
policies that did not mirror the policies they had with physical keys, and it is found
that the low overhead for creating and changing policies with Grey encourages
policy change and the creation of policies that better fit the users’ needs.
• Finally, it is surprised for some of the unanticipated uses that the users made of
the Grey system. For example, some of the users routinely use Grey to unlock
doors without having to get out of their chairs. It would not have probably discov-
ered without a field study.
1.5 Conclusion
In this chapter, we have discussed the state of the art of privacy and security for perva-
sive communication. To determine the security and privacy for pervasive communica-
tion, related parameters are determined. Finally, two different existing solutions are
discussed targeting different pervasive environments.
References
1. SPPC: Workshop on Security and Privacy in Pervasive Computing, 2004.
2. http://www.atp.nist.gov/iteo/pervasive.htm.
3. http://www.computer.org/portal/web/csdl/doi/10.1109/MPRV.2007.86.
4. http://portal.acm.org/citation.cfm?id=1335023.
5. Rahman, Sk. Md. M., Inomata, A., Mambo, M., and Okamoto, E., Anonymous
On-Demand Position-based Routing in Mobile Ad-hoc Networks, IPSJ (Information
Processing Society of Japan) Journal, 2006; 47(8): 2396–2408.
6. Hu, Y. C., Perrig, A., Johnson, D. B., Packet leashes, “A defense against wormhole
attacks in wireless ad hoc networks,” in Proceedings of the 22nd Annual Joint
Conference of the IEEE Computer and Communications Societies (INFOCOM 2003),
San Francisco, March 30–April 3, 2003.
7. Rahman, Sk. Md. M., Mambo, M., Inomata, A., and Okamoto, E., An anonymous
on-demand position-based routing in mobile ad hoc networks, in Proceedings of The
2006 Symposium on Applications & the Internet (SAINT-2006), Mesa/Phoenix, AZ,
IEEE Computer Society Order Number P2508, Library of Congress Number
2005937742, ISBN 0-7695-2508-3, pp. 300–306, January 23–27, 2006.
8. Wu, X, DISPOSER: distributed secure position service in mobile ad hoc networks.
Technical Report CSD TR #04-027, Dept. Computer Sciences, 2004.
9. Xue, Y., Li, B., and Nahrstedt, K., A scalable location management scheme in mobile
ad-hoc networks, in Proceedings of the 26th IEEE Annual Conference on Local
Computer Networks (LCN 2001), Tampa, FL, November 2001, pp. 102–111.
Privacy-Preserving Anonymous Secure Communication 1-19
10. Wu, X., VDPS: virtual home region based distributed position service in mobile ad
hoc networks, in Proceedings of ICDCS, Columbus, OH, 2005.
11. Wu, X. and Bhargava B., AO2P: ad hoc on-demand position-based private routing
protocol. IEEE Trans Mobile Comput 2005; 4(4): 335–348.
12. R. L. Rivest: The MD5 Message Digest Algorithm, Internet RFC 1321, April 1992.
13. NIST: FIPS 180-1, Secure hash standard, US Department of Commerce, Washington,
D.C., April, 1995.
14. Technical Report on the IEEE 802.11 Protocol.
15. Zhang, Y., Security in mobile Ad-hoc networks. Ad hoc Networks Technologies and
Protocols, edited by Mohapatra, P., and Krishnamurthy, S., Springer, ISBN 0-387-
22689-3, Springer Science+Business Media, Inc, Boston, pp. 249–268, 2005.
16. Carter, S. and Yasinasc, A., Secure position aided ad hoc routing protocol, in
Proceedings of the IASTED International Conference on Communications and
Computer Networks (CCN02), November 4–6, 2002, 329–334.
17. Raymond, J-F., Traffic analysis: protocols, attacks, design issues and open problems,
in Proceedings of PET 01, Vol. 2009, LNCS, Springer, 2001, pp. 10–29.
18. Cornwell, J., Fette, I., Hsieh, G., Prabaker, M., Rao, J., Tang, K., Vaniea, K. et al.,
User-controllable security and privacy for pervasive computing, in 8th IEEE
Workshop on Mobile Computing Systems and Applications, Tucson, AZ, February
26–27, 2007.
19. Patil, S., and Lai, J., Who gets to know what when: configuring privacy permissions
in an awareness application, in Proceedings of CHI 2005, pp. 101–110, Portland, OR,
April 02–07, 2005.
20. Fogarty, J. and Hudson, S. E. Toolkit support for developing and deploying sensor-
based statistical models of human situations, in Proceedings of CHI 2007, San Jose,
CA, April 28–May 3, 2007.
21. LaMarca, A. et al., Place lab: device positioning using radio beacons in the wild, in
Proceedings of Pervasive 2005, Munich, Germany, May 8–13, 2005.
22. Sadeh, N., Gandon, F., and Kwon, O. B., Ambient intelligence: the MyCampus expe-
rience. Ambient Intelligence, Wireless Network and Ubiquitous Computing, edited by
Vasilakos T. and Pedrycz W., ArTech House, Inc, Norwood, MA, 2006.
23. Bauer, L., Cranor, L. F., Reiter, M. K., and Vaniea, K., Lessons learned from the deploy-
ment of a smartphone-based access-control system, Technical Report
CMUCyLab-06-016, CyLab, Carnegie Mellon University, October 2006.
24. Bauer, L., Garriss, S., McCune, J. M., Reiter, M. K., Rouse, J., and Rutenbar, P., Device-
enabled authorization in the Grey system, in Proceedings of the 8th Information
Security Conference, Singapore, September 2005.
2
Challenges in
Testing Context-
Aware Applications
2.1 Introduction............................................................2-1
Overview of Software Testing for Context-Aware
Applications
2.2 Modeling Context-Aware Systems...................... 2-4
2.3 Testing Challenges................................................. 2-6
Example Application • Issues in Test Planning
2.4 Recent Trends in Testing Context-Aware
Rana Ejaz Ahmed Applications............................................................ 2-9
American University 2.5 Summary and Conclusions.................................2-11
of Sharjah References..........................................................................2-11
2.1 Introduction
Recent advances in sensors, wireless, and mobile communications technologies and
ever-growing popularity of mobile devices have given a new dimension to pervasive
computing. The mobile devices are now capable of sensing the surrounding environ-
ment in order to offer users a wide selection of services. Context-aware computing is one
of the important enabling technologies for pervasive computing. Computing entities in
a software application are context-aware if they can sense and adapt their behavior in
response to changes in their surrounding physical and logical environment attributes
(also known as contexts). Context-awareness allows computing entities to intelligently
choose resources and provide customized services to the end-users. For example, a
context-aware application running on a mobile phone senses that it is the meeting time
for the user, the user has entered the meeting room, and the meeting has started. The
application can then conclude that the user is busy in the meeting and it rejects all
incoming calls while the meeting is in progress. Context-awareness is increasingly
featured in several application domains such as e-commerce, e-learning, e-healthcare,
and so on. Some common factors related to categories of context are: time, location,
2-1
2-2 Pervasive Communications Handbook
identity, surrounding infrastructure (including network, IT), and activity of the user.
Location-based (LB) context aware systems that deal with the location information of
the mobile devices are widespread and, perhaps, well-studied systems. Other context-
aware applications such as smart homes, context-aware healthcare systems, and smart
sensor networks are also becoming more common now.
Context sensing is typically accomplished via some sort of sensor. Earlier, these sen-
sors were usually infrared (IR) or ultrasonic badges for indoor location detection, or
global positioning system (GPS) receivers and cellular phones for outdoor location-
aware services. The Federal Communications Commission (FCC) in the United States
has mandated that the telecom operators must be able to locate the position of a mobile
phone making an emergency (911) call within an accuracy of 125 m. This mandate
requires that each mobile phone in the United States should have the ability to be loca-
tion-aware. The technologies in mobile computing are now extended to address more
types of context information rather than just the location. Today, the concept of context
may denote a wide scope of information ranging from physical environments to com-
puting resources and social situations. In principle, context may refer to any environ-
mental attribute that the applications are aware of and behave in response to the attribute
accordingly. Non-physical sensors capture contexts about user profiles and activities
and collect more abstract contexts obtained from the aggregation of lower level or raw
context data [1].
Traditionally, a non-context-aware application only uses explicit user inputs to pro-
vide the output (or services), while a context-aware application uses additional sensed
context information gathered from the user’s physical environment or derived from the
user’s logical environment (e.g., IT infrastructure). A general structure of a context-
aware application is shown in Figure 2.1.
User inputs
Context-aware Outputs
software application
Several context-aware systems have recently been developed for pervasive computing.
Example systems include Cabot, Gaia, Carisma, RCSM [1], and so on. Loke [2] and
Poslad [3] provide good introduction to several types of context-aware systems.
Context-aware systems can be designed and implemented in several ways. The
approach depends on the requirements and conditions, such as the locations of sensors,
number of users, resources on mobile devices, and so on. The method of context-data
acquisition is very crucial because it predefines the architectural style of the system.
Developing context-aware applications requires an architecture that can evolve in the
presence of a large number of platforms, increasing number of sensors, and frequent
network and drivers updates. Such requirements usually lead to the use of a layered
architecture. Some of these layers are often aggregated into a context-aware middleware,
which processes the context values on behalf of the application and triggers adaptive
behavior in the application. A context-aware middleware collects the context informa-
tion from the sensing devices and applications, processes them, and delivers to the appli-
cation. With the aid of context-aware middleware, context-aware applications only need
to subscribe the contexts of their interests from the middleware, and adapt their behav-
iors based on these contexts and the triggering rules. Most existing systems incorporate
a middleware-based software architecture [4–6].
Figure 2.2 shows a layered architecture of context-aware application that incorporates
a context-aware middleware to support the processing of context data. The middleware
typically consists of two parts: Context Manager and Adaptation Manager. The Context
Manager collects and maintains low-level context information, whereas the rule-based
Adaptation Manager queries and processes the current context values on behalf of the
application and triggers the adaptive behavior by the application. Adaptation rules define,
in parts, the application behavior and are typically specified in terms of predicates over the
variables representing the context readings [5].
2.1.1 O
verview of Software Testing for Context-Aware
Applications
Software testing is the well-known approach for assuring high-quality software products,
with the aim of detecting as many faults as possible before shipping the product to the
FIGURE 2.2 Architecture of context-aware software applications The corresponding context cate-
gory is shown on the right. (Adapted from Sama, M. et al., Multi-layer faults in the architecture of
mobile, context-aware adaptive applications: a position paper, in Proceeding of 1st International
Workshop on Software Architectures and Mobility (SAM’08), May 10, Leipzig, Germany, 2008.)
2-4 Pervasive Communications Handbook
customers. The software testing process involves generating test cases that are applied to
the software implementation under test to obtain the test results, and evaluating the test
results against the known specifications. A discrepancy between the test result and the
corresponding specification points to a software fault. Test case selection (also known as,
test adequacy problem) and test result evaluation (also known as test oracle problem) are
the two most important problems in software testing. Test adequacy refers to methods of
how to select test cases from a very large input domain for the software unit under test. The
evaluation of test results is done by comparing the test execution results with the related
specifications or supposedly correct version of the implementation when the same test case
is applied. The testing techniques that use some sort of coverage criteria are referred to as
coverage-based testing. A coverage criterion serves both as a stopping rule of the test case
selection process and as measurement for the effectiveness of a test suite. This coverage is
calculated by applying all the selected test cases and computing the proportion of the test
requirements that has been exercised. The test case selection process stops when the cover-
age of the test requirement meets some pre-defined satisfactory level. Coverage-based test-
ing can be further classified into structural testing and functional testing. Structural testing
(also known as white-box testing or code-based testing) refers to the class of criteria on the
coverage of different types of program elements when the implementation (i.e., the source
code) is available to the testers. The basic structural criteria include statement coverage,
branch coverage, and path coverage. Functional testing (also known as black-box testing or
specification-based testing) refers to the testing approaches where the functional specifica-
tions are used to guide the test case selection. Different functional testing strategies
depending upon the nature of the specification are used.
Software testing for context-aware applications suffers from both the test adequacy
problem and the test oracle problem in pervasive environment. We need to test context-
aware applications for several types of mobile devices, different platforms, over different
types of carrier networks under different contexts changes. Unlike conventional pro-
gramming paradigms with standardized formats and features, context-aware applica-
tions do not have any uniform architecture model so far. There are several challenges to
the testing of context-aware applications. Context-aware applications may not only
evolve with the changes in features, but may also evolve with environmental changes
such as addition, removal, and modification of contexts. When the applications evolve,
a major challenge is how to efficiently perform testing (especially, regression testing) on
the new evolved system. Furthermore, unlike traditional software applications, software
failures in context-aware applications may emerge not only due to program faults but
also from unreliable and/or inconsistent context sources. These factors make the debug-
ging process more difficult [1].
This chapter presents the challenges in testing context-aware applications, and sur-
veys the recently reported testing techniques for such applications. A discussion is also
be made on the available tools and support for testing context-aware applications.
represent contexts in a computation form [3]. Several ways to classify contexts have been
proposed in the literature. One popular view refers to external and internal types of con-
text which are similar to the physical and user contexts, respectively. A classical classifica-
tion, proposed by Schilit et al. [7], divides contexts into three categories: where you are
(location context), who you are with (social context), and what computing and networking
resources are nearby (IT Infrastructure context). Some researcher proposed the ideas of
passive and active contexts. A passive (or static) context describes the aspects of pervasive
system, that is, invariant (with respect to time and space, for example), such as a person’s
identity and date of birth. An active (or dynamic) context refers to a user or environment,
and the context can be highly variable over space and time (e.g., temperature).
New contexts can be created in real-time using, for example, temperature sensors.
Lower level raw contexts output from sensors may often need processing into high-level
contexts that are relevant to the users and applications. The raw sensed context values
may need to be scaled and/or changed into different value ranges, or formats. Some con-
texts, such as location and time, can act as sources of contextual information from which
the other contexts, known as derived contexts or context reuse, can be derived. In many
scenarios, combining several individual context values may generate a more accurate
understanding of the current situation than taking into account any individual context.
Similarly, a low-level context can be derived from a higher level one. For example, a GPS
position can be determined from annotated positions, such as street names and land-
marks, and so on. Context-aware systems need to support all the book-keeping and
maintenance activities, including the creation, modification, deletion, and interlinking
heterogeneous contexts [3].
Context representation can be done in many ways. These are classified by the scheme
of data structures which are used to exchange contextual information in the system
[1,3,8]. The Key-value model is the most simple data structure for modeling contextual
information. The data structure is in the form of an ordered pair (c, v), where c is the
context variable representing the environment and v is the context value captured from
the environment. For example, the pair (user, “John”) represents the context that the
user is currently “John.” Other example could be for the context variable temperature,
and the value taken by the variable could be, for example, from the set {“Very Hot,”
“Hot,” “Moderate,” “Cold,” “Very Cold”}. Several early location-aware applications rep-
resented the location using key-value model. Problems in using key-value model include
the usage of exact matches, lack of expressive structuring, and the lack of efficient con-
text retrieval algorithms.
The Markup scheme model uses a hierarchical data structures (e.g., XML) consisting
of user-defined markup tags with attributes that can be arbitrarily nested. It enables
hierarchical structuring of context information with persistent and serialized represen-
tation as well as lightweight storage, and it favors the usage in context-aware middleware
systems. Some example systems that use markup scheme models include CSCP,
CARMEN, MobiPADS, Solar, Cabot [1].
The Graphical model uses graph data structures and richer data types, such as Unified
Modeling Language (UML) and Entity Relationship (ER) diagrams. This model is more
expressive than key-value and hierarchical models. Other context representation models
include Object-oriented (OO), Logic-based, and Strong Ontology models.
2-6 Pervasive Communications Handbook
Some of the key challenges in modeling context are summarized as follows [3,8]:
1. User (internal) contexts may be incorrectly, incompletely, imprecisely deter-
mined, or predicted. This may be due to the fact that the user may have provided
faulty information when explicitly asked, or the user contexts are modeled from
too little data over too small time period.
2. Environmental (external) contexts may also be incorrectly, incompletely, impre-
cisely determined, or predicted. This could be due to delays that can occur in
exchanging dynamic information, or path between external context producer and
the consumer is disconnected temporarily or permanently.
3. Some contexts may exhibit a range of spatial and/or temporal characteristics; that
is, the information generated may change quickly over time and distance.
4. Some contexts may be using different format and may have alternative
representations.
5. Some contexts may be distributed and composed of multiple parts that are highly
interrelated. They may be related by rules that make a context dependent on other
context. These composite contexts may need to be partially validated as all their
parts cannot be always accessed.
6. In general, context-awareness generates a huge volume of data due to large state-
space of environment to be studied, and many sensors are used.
7. Context use can reduce the security and privacy of users.
8. The awareness, availability, and change of context signals may overload users and
distract them from performing their on-going interaction with the application.
A robust context-aware application must ensure that there are reasonable solutions to
above-mentioned problems. For example, in order to solve a huge-volume data-genera-
tion problem (as mentioned in item 6), we can filter raw context information before
storing data. Moreover, some data mining schemes can be used to analyze and filter the
raw data.
its internal representation within the application. A context variable can contain
static information about local configuration of the mobile device (such as language
preference) or dynamic information (such as GPS latitude and longitude). The
dynamic context variables need to be refreshed (periodically or asynchronously) at
different rates, which leads to synchronization problems when the adaptation man-
ager tries to relate several context variables for rule triggering.
3. The user may configure its own behavior and, hence, some of the context vari-
ables. This may lead to context inconsistencies and/or failure due to buggy user-
defined configuration.
4. The space of rules for adaptive actions become very complex to analyze due to
several shared context variables, concurrent triggering of rules, and so on. Multiple
rule predicates may be satisfied simultaneously and some predicates may be satis-
fied transiently.
5. It is very difficult to define precise test oracle as the execution differs under vari-
ous vectors of context input.
6. The real environment to run application may not be available. There may not be,
for example, enough sensors, or different types of networks available at the time
of testing.
7. As context may include sensitive information about people and their activities,
some applications give opportunity to the user to protect their security and pri-
vacy. For example, the Context Toolkit [6] introduces the concept of context own-
ership. Under such case, it becomes even more difficult to test such context-aware
application.
2.4 R
ecent Trends in Testing Context-Aware
Applications
The fundamental aspect for the validation of context-aware applications is that changes in
context can occur and affect the application behavior at any time during its execution.
Although this may happen with other types of inputs, it is particularly prevalent with
contextual inputs since they are the continuously streaming drivers of the applications.
Test engineers must identify not only what context values to provide, but also when the
stream of variations in context values can impact the behavior of the application. This is
an essential difference from the testing of conventional software systems, where the selec-
tion of input values can mostly be performed a priori [10].
Compared to the research work done in the design and development of context-aware
pervasive applications, little work has been done on the testing aspects of such applica-
tions. Considering different settings underlying mobile devices, some work has been
done on testing platforms and tools for testing pervasive applications [1].
Developing context sources remains a major challenge, as testing context-aware
applications with physical context sources in a controllable and reproducible manner is
quite difficult. In Broens and Haltesen [11], the SimuContext framework is presented
where the simulated context sources emulate the real-life context sources.
Satoh [12] developed a software testing framework that can emulate the physical
mobility of devices by logical mobility of applications designed to run on them. A mobile
agent-based emulator was designed for mobile device and the emulator could perform
an application-level emulation of its target devices.
In Delamaro et al. [13], proposed a method for the coverage testing of applications on
target mobile devices and device emulators. Bo et al. [14] presented a tool that conducts
black-box testing for mobile applications. Calegari et al. [15] proposed performance test-
ing strategies for mobile applications running on ad hoc mobile networks.
The usability testing for context-aware services with simulated context data on the
top of a game engine was proposed by Bylund and Espinoza [16]. They proposed a tool
(called QuakeSim) that interactively simulates context information in real-time.
Regehr [17] proposed a technique for testing interrupt-driven software applications
that are widely used in the implementation of embedded systems and wireless sensor
networks. The technique uses the random criterion for test cases selection.
Sama et al. [9] proposed a new model of adaptive behavior, called an Adaptation Finite-
State Machine (A-FSM) that enables the detection of faults caused by both erroneous
adaptation logic and asynchronous updating of context information. They evaluated their
approach on a set of synthetically generated context-aware adaptive applications and on
a simple application in which the cell phone’s configuration profile changes automatically
as a result of changes in the user’s location, speed, and surrounding environment.
In Wang et al. [10], an approach that improves the context-awareness of an existing test
suite is presented. The technique first identifies key program points where context infor-
mation can effectively affect the application’s behavior. It generates potential variants for
each existing test case that explore the execution of different context sequences, and it
then attempts to dynamically direct the application execution toward the generated
2-10 Pervasive Communications Handbook
c ontext sequences. The supporting infrastructure for their approach consists of the
following components:
• Context-Aware Program Point Identifier: This component identifies program
points where context changes may affect the application’s behavior.
• Context Driver Generator: Once context-aware program points have been identi-
fied, one would like to explore the context scenarios that are likely to generate
different program behaviors. This component forms potential context interleav-
ing that may be of value to fulfill a context-coverage criterion.
• Program Instrumentor: This component incorporates a scheduler and context-
aware program point identifier controllers into the application to enable direct
context manipulation.
• Context Manipulator: This component attempts to expose the application to the
enumerated context interleavings through the manipulation of the scheduler.
Lu et al. [18] proposed a set of three-test criteria using data flow testing. The control
flow graph of the source code is first built and then the life-cycle of data variables (their
definitions and the usages) is tracked. The approach leads to test cases that focus on
improper use of data due to coding errors. Their approach uses these criteria to create
test cases that detect faults in the context-aware interface that are otherwise difficult to
be discovered through conventional testing methods.
Taranu and Tiemann [19] proposed a testing approach by applying and extending the
classical approach of testing communication systems. In their approach, they isolated
the core of a context-aware system, which is the control or algorithmic part for adapting
the system to the current scenario and requested service. Their approach uses a context
management system that takes internal and external information into account for local
decisions. The isolated part (i.e., the decision algorithm or control part) is directly stim-
ulated with context information via the context management. The appropriate context is
directly generated, and the context represents the environment or situation of the System
under Test (SUT). Their work is a unique effort where both foreground and background
testers are explicitly considered. The testers represent one or more instances in the com-
munication and contain an implementation of protocol. A foreground tester interacts
with the SUT, that is, the generated traffic is also influenced by the SUT. A background
tester is an implementation without feedback from the tested system, and it is used to
generate the background load efficiently. The context or situation is generated by context
generators, categorized as foreground and background generators. The situation genera-
tor is implemented in Java programming language and it generates different situations
in radio network. The situations refer not only to traffic and load generation, but also to
contain information generated out of location, interference, or mobility models.
Another issue relevant to testing context-aware application is the context inconsis-
tency, which is becoming increasingly important in the presence of more and smarter
sensors. Some researchers have recently proposed inconsistency detection in the appli-
cations where patterns identify conflicts among context inputs at run-time before the
contexts are fed into an application [20–22]. The patterns are designed beforehand based
on the understanding of relevant physical and mathematical laws under which the appli-
cation is supposed to run. In Lu et al. [23], a framework is proposed where the middleware
Discovering Diverse Content Through
Random Scribd Documents
one tittle the declarations of this British driveller, who, by the way, hadn’t
acquired a single sentence of Spanish in five years! He pictured Buenos Ayres
as the future hub of the world’s civilisation, this purely agricultural country of
the Argentine (featureless and ill adapted for any purpose other than the
growing of luxurious crops and the rearing of vast herds of cattle), as a
teeming land of wondrous industries, before which such things as England,
America, France, and Germany have achieved would have to pale their
ineffectual fires. No argument of sanity that could be advanced disturbed the
calm serenity with which this self-constituted trumpeter of the Argentine
reiterated stupidities that would have put the most perfervid patriot to the
blush.
I have described Mr. Q—— at some little length, because, bore though he
is, he is typical of a certain class of Englishman whom one encounters in the
Argentine, and for whom Argentine and average Englishman alike have a
wholesome contempt. He is one of those aggressive, self-assertive “Anglo-
Argentines” who go home occasionally and blow about this new land of
promise, to the ultimate disillusionment of such as give ear.
The other Englishman I have in mind, who also typifies a certain class, is
less offensively anti-British than Mr. Q——, and his observations being based
upon a little knowledge and a large inexperience, he is more amenable to
reason than the Mr. Q’s, who are mere windbags, that seek to cloak their lack
of success at home by magnifying their changed condition in the new land.
Mr. F——, as I shall call the other, had a little knack from time to time of
dropping such sage remarks as, “Where in the whole of London will you find
such evidence of wealth as you do in a walk along the Avenida
Alvear?”—“Where in London will you see so many beautiful dresses, such
wealth in millinery, as at Palermo on a Sunday afternoon?”—“Talk about the
business of London, what is it in comparison with the business of Buenos
Ayres?”—“Were you not astounded at the magnificent buildings when you
came to Buenos Ayres, all so bright and clean looking, after London?”—and so
on ad nauseam.
We dubbed Mr. F—— “the silly ass observer.” For each of these examples of
his acumen in the art of comparative observation breathes of ignorance and
thoughtlessness. They are, indeed, almost too stupid to call for notice, but as
Mr. F—— was personally a pleasant and amiable young Englishman, I was
often at pains to explain matters to him, and always found that at the root of
his odious comparisons lay the simple fact that he had lived in London with
his eyes shut and his mind untouched by the grandeur that surrounded him.
How many hundreds of thousands of young men are like Mr. F——! They look
on the old familiar things of home with unseeing eyes, and when, perchance,
in some new land they begin to take notice, they lack standards of
comparison to guide them. When I explained to poor Mr. F——, who was
honestly overwhelmed by the glory that is Buenos Ayres, that Threadneedle
Street or Lombard Street in ye antique city of London, though they look as
nothing to the eye that cannot see beyond their drab and smoky walls, might
comfortably purchase the entire Argentine and all that in it is, from the torrid
north to the foggy south, and have something over to be going on with; when
I impressed him with the undoubted fact that most of the wealth which he
saw around him had come into being thanks to British money, and that a very
substantial portion of the profits being derived from the exploitation of the
country went every year into London pockets, he began to see things in a
new light. To compare the Avenida Alvear with Park Lane, merely shows that
one has not observed Park Lane, or that he is not aware that the Avenida
Alvear and the few streets thereabout which represent the Mayfair, Belgravia,
and West End of London, are as an inch to an ell. Mr. F—— is very
representative of the “cable boy” standard of intelligence, but in other
respects a fine, clean English type, that one would value all the more as an
element in the British Colony were it given to a little reflection before it aired
its opinions on Argentine and the world in general, of which its experience has
been notably slight.
Hardly at all does the emigrant class enter into the British Colony. British
workpeople there are occasionally to be met throughout the Argentine, but
the country as a whole is ill adapted for them. Any person who by word of
mouth or writing spreads abroad the idea that artisans or those of the
labouring class of Great Britain will find the Argentine an attractive field, may
be doing a very mischievous thing. The conditions of life in which the Italian
emigrants, the Spaniards, Poles, Russians, Syrians, and all the rest of them
herd together in the cities or make shift to exist in rough shanties in the Camp
are impossible to even the commonest class of English or Scots workpeople, if
the language difficulty did not exist to make matters still worse for them.
But many British workpeople are there under conditions very different from
those of the other emigrants. They are chiefly railway engineers, employed as
foremen or as expert workers in the great workshops of the different railway
companies, or as locomotive drivers. Their conditions of life, although I fail to
see wherein they are greatly superior to those obtaining in their native land
among their class, having regard to the different purchasing value of the
wages earned, are at least made agreeable by association with fellow-workers
of their own race, and the possibility of saving more money than they would
be likely to do at home. For example, where a working man in England might
be able to save £20 ($100) per year, he can at least contrive to save the same
relative proportion from his wages in the Argentine, and as his wages will not
be less than double, and perhaps two and a half times what they would have
been in England, by the same ratio may his savings be increased. These
workmen have also security of employment, and, in fine, must not be
confounded with the emigrant class. They find grievances, none the less, and
even went on strike in the year 1911.
Owing to the little communities in which they live being almost entirely
British, they do not assimilate with the natives, and few of them, even after
many years in the country, have picked up more than some odd words of the
language. A friend of mine, who was rather shaky in his Spanish, was waylaid
at a railway station in the interior and wished to have a train stopped at a
point along the line where there was no station, to enable him to reach a
certain estancia. He managed to explain this in Spanish to the station-master,
but the latter was unable to interpret it to the engine-driver, who turned out
to be English and did not know a word of what he called “their blooming
lingo!” These sturdy and skilled artisans naturally do not count in the British
Colony of Buenos Ayres, and most of them live in the railway centres of the
provinces, and come only occasionally to the capital for a trip.
What must strike the British visitor in Buenos Ayres with a curious air of
home is the railway bookstall at Retiro, Once, or at Constitución. The former
looks as familiar as a London suburban bookstall, with all sorts of English
periodicals, from the Strand Magazine to Comic Cuts, bundles of “sixpenny”
and “sevenpenny” novels, The Times, weekly edition, Lloyds’ News, and many
another familiar title, though the prices charged are naturally two or three
times those printed on the periodicals. These are evidence of the large English
community residing in the various suburbs served from the stations named.
The English bookshops in the heart of the city are also well-known centres,
being entirely patronised by the “colony,” but the English grocers drive a large
business with the native population, and employ many assistants who only
speak Spanish. Still, British housewives have no need to acquire the language,
as they may transact all their business in their native tongue, and it is no rare
thing to meet a lady who in twenty years of Buenos Ayres has not even got to
know the Spanish names of the common objects of the dinner table. In the
provinces, however, most foreign lady residents have to acquire at least a
smattering of the native lingo.
A further element in the “colony” may be described as the floating
population of British visitors who make periodical journeys to the Argentine in
pursuit of business. The stay-at-home has no faint notion of the extraordinary
trafficking of his race in foreign parts. Veritable battalions of commercial
travellers representing British houses visit the Argentine each year, staying
from two to six months at a time, and the hotels are always sheltering
Englishmen who seem to have nothing to do beyond taking their meals and
playing billiards for weeks on end, but who are really waiting the signing-up of
contracts. One gentleman I knew had put in nearly nine months of this
strenuous work, and eventually left in despair. The contract for which he had
been waiting so long was fixed up about three weeks afterwards, and went to
a German firm whose representative had perhaps been more patient in
waiting, or more liberal (or more discreet) in his bestowal of backsheesh.
Those visitors whose stays are short do not fare badly in the Argentine
capital, and as a rule retain rather pleasant memories of the place, although
not a few with whom I conversed really dreaded the necessity of having to
return, as they found time hang so heavily on their hands. Then there comes
occasionally one of the scribbling fraternity, who fixes a little round of
engagements, hurries to see the sights of the place, and flits away again to
entertain a public quite as well-informed as he or she may be by the little that
he or she has seen in the few days’ stay. I spent some time with an American
correspondent, who did not know a word either of French or Spanish, and yet
had the fortitude to contribute a series of articles to one of the local papers,
giving his valuable impressions of a country and a people into whose mind he
was not able even to peep. His articles, of course, were written in English and
translated into Spanish, and were published with great fanfarronada, although
his literary reputation was unknown even to me, whose business it has been
for many years to keep in touch with literary reputations on both sides of the
Atlantic.
The regulation course for the “globe-trotter” who flits through the Argentine
for a week or so, to write a book thereon, is to motor round the various public
buildings, interview a few of the official heads, endeavouring, if possible, to
have a talk with the President,—a comparatively easy matter in all South
American Republics, the President being sort of ex-officio Chief of Publicity,—
engineer an invitation to a model estancia to stay overnight, and an interview
with a reporter from the Standard to announce the gestation of the great
work that will later see the light in London or New York. The usual practice of
the more or less distinguished visitor is to deliver himself of the most fulsome
flattery of all that he has seen, and to lay on the butter with a trowel. To this
rule there are occasional exceptions, and I gather that the Princess of Pless,
who paid Buenos Ayres a visit in August of 1913, when I was staying in Chili,
was one of these exceptions. The Buenos Ayres correspondent of La Union of
Santiago sent to his paper an amusing little article on the Princess, which I
think worthy of translating, as it will make an acceptable tailpiece to this
chapter. He wrote:
The intrinsic merits of this little sketch and the charm of the concluding
effort in English, surely justify its reproduction! What on earth the Princess of
Pless may have said to lead to this display of journalistic courtesy, I do not
know, but I suspect that she must have ventured some words of frank
criticism, and that is precisely what the common, untramelled Argentine does
not want. He asks for butter, and he wants it thick, and if you can add a layer
of sugar,—for he has a sweet tooth—so much the better. Most of the British
Colony know this, and also know on which side their bread is buttered. Thus
the English visitor who is indiscreet enough publicly to express a frank and
honest opinion of anything that does not meet with his approval in Buenos
Ayres or the Argentine, will scarcely expect to be grappled to its bosom by
hooks of steel. I am persuaded, however, that the better-class of native
Argentine opinion is quite capable of sustaining honest criticism and profiting
thereby.
CHAPTER XV
THE EMIGRANT IN LIGHT AND SHADE
During our stay, a splendidly equipped hostel, or shelter, was opened for
the emigrants. Erected by the riverside close to the scene of their
disembarkation, this building is capable of sheltering a large number of
newcomers. Sleeping-rooms fitted with wire mattresses upon which the
emigrants may place their own bedding (always the most precious of their
personal possessions) are provided for the men, and similar accommodation
for the women and children. There is no excuse for any of them to go
unbathed, lavatories specially fitted with showers being provided for those
who care to use them (the superintendent told me it was seldom that an
emigrant ventured on such an experiment), while in the great common
dining-room they may take their meals in comparative comfort and can secure
eatables at a low rate. The accommodation, if I remember correctly, is free,
and the whole place is so admirably clean that it must come with something
like a shock to most of the emigrants who pass through it, habituated as they
have been, almost without exception, to dirty ways of life in their native lands.
Many of the emigrants never see Buenos Ayres at all, as the trains that take
them into the Camp pick them up at a short distance from the vessels which
have borne them oversea, and at the very doors of the shelter where they
may have passed the night of arrival.
Laughter and tears mingle a good deal in the landing of these poor people
from the Old World. Huddled almost like cattle in the steerage of the
steamers, their condition at sea presents what seems an unbridgable abyss
between their lives and those of the saloon passengers. Day after day I have
watched them sitting aimlessly on deck in their dirty, faded clothes, the
effluvia from the mass of them, even tempered by the sea breeze, suggesting
conditions of horror when they “turned in” at night, that might recall the Black
Hole of Calcutta. The captain assured me it was not so very bad, but I never
had the stomach to prove it for myself. Yet, on the morning of arrival at
Buenos Ayres, what a transformation! Girls who have seemed the dirtiest of
sluts throughout the voyage step down the gangway quite neatly attired. The
married women, tricked out with little bits of finery, the men mostly in suits of
black, with sombre soft hats, and every Spaniard armed with an ample
umbrella, are difficult to recognise as the slovenly creatures one has seen for
weeks feeding out of tins and using fingers, for lack of knives and forks. But
even among the emigrants there are many grades, and not all are able to
make this sudden transformation, many having no more than the soiled and
shabby garments in which they have made their voyage, a little handkerchief
tied at the corners being a pathetic index of their worldly gear. But even from
among these, there will be some that one day shall bridge that awful gulf
between the steerage and saloon, and make a voyage home as cabin
passengers to advertise the magic Argentine!
Hope is the prevailing note in the demeanour of every new batch of
fortune-seekers. It shines brightest, perhaps, in the eyes of the alert and wiry
little Italians; the Spaniards, also, step ashore with a firm and confident tread,
but mostly among the Poles, the Bulgars, and the Russians do we see the dull
look of something very like despair. In discussing the character of the
emigrants with M. Huret, Señor Alsina, a former Director of the Emigration
Service, remarked:
To the European imagination, the Argentine gaucho typifies the rural life of
the country. And a fine figure he cuts in his showy poncho (a shawl with a slit
in the centre to thrust the head through), the graceful folds of it, with fringed
edges and embroidery, falling as low as his top-boots with their jingling spurs.
On his head he wears any variety of soft felt hat, but never the “Panama hat”
of popular imagination. He is more inclined to cultivate a beard and fierce
moustache than to shave, and above his poncho, which covers a complete
suit of “store” clothes, he usually wears a black or white silk handkerchief tied
loosely around his neck. On horseback, an admirable figure, the poncho
serves also as partial covering for his steed, which he rides with unrivalled
grace and confidence.
He has a soul for music, too, this rough and somewhat villainous-looking
knight of the Pampa. The guitar is his favourite instrument, and he is no
gaucho who cannot strum a tune thereon, or improvise some lines of verse,
the old Spanish custom of singing a couplet to the accompaniment of the
guitar still retaining high favour in the Argentine Camp, to such an extent,
indeed, that a weekly paper, La Pampa Argentina, exists for no other purpose
than to collect and circulate the latest efforts of the coplistas and reprint
famous couplets of the past. His sports, too, are rendered picturesque by the
part which his horse, almost inseparable from himself, performs in them.
An agreeable sense of old-fashioned courtesy still clings to him, and while I
fear his morals will not bear too close an inspection, nor are his habits of life
quite as cleanly as domestic legislation has contrived to make those of most
European and North American people, the gaucho is by no means unlikable,
although I never felt quite so kindly towards him in the flesh as I have done
imaginatively through the pages of Mr. Cunninghame-Graham and Mr. W. H.
Hudson. For all his courtesies, his nature retains much of the old Spanish
cruelty. To see him bury his spurs in the flanks of his horse with a vicious dig,
and pull the animal up on his haunches by throwing his whole weight
backwards on the reins, that are fixed to a long and brutal curb bit, is not a
sight that makes you long to go up and take him by the hand as a man and a
brother.
Welcome to Our Bookstore - The Ultimate Destination for Book Lovers
Are you passionate about books and eager to explore new worlds of
knowledge? At our website, we offer a vast collection of books that
cater to every interest and age group. From classic literature to
specialized publications, self-help books, and children’s stories, we
have it all! Each book is a gateway to new adventures, helping you
expand your knowledge and nourish your soul
Experience Convenient and Enjoyable Book Shopping Our website is more
than just an online bookstore—it’s a bridge connecting readers to the
timeless values of culture and wisdom. With a sleek and user-friendly
interface and a smart search system, you can find your favorite books
quickly and easily. Enjoy special promotions, fast home delivery, and
a seamless shopping experience that saves you time and enhances your
love for reading.
Let us accompany you on the journey of exploring knowledge and
personal growth!
ebookgate.com