您好,欢迎光临本网站![请登录][注册会员]  
文件名称: SIP Presence相关...
  所属分类: 其它
  开发工具:
  文件大小: 377kb
  下载次数: 0
  上传时间: 2019-07-28
  提 供 者: weixin_********
 详细说明:NULL 博文链接:https://ansonlai.iteye.com/blog/801810Presence model has been chosen for this project not have intended 3). How can SIP model meet privacy requirements? a suitable mechanism is designed to fulfill the privacy D LBS needs feedback requirements with respect to RFC3261, RFC3265 and It is important for a user to know his/her actual level of RFC3856 nformation disclosure. Users may have difficulty accepting a system into their privacy practice if the scope of it B Research methodology privacy implications is unclear. With feedback mechanisms, The methodology of this project is based on a proof of a system could provide social visibility to prevent misuse concept and prototype approach. a prototype is developed [9]. For example, Alice is less likely to repeatedly query to investigate the feasibility of the concept. We use an Bob's location if she knows that Bob can see each of her exploratory prototype process to perform rapid development requests. A user will feel comfortable with the capability to of a system, where an initial prototype is produced and control his sensitive information and the ability to know the refined through a number of stages towards the final system. actual information disclosure Overall, the steps include: requirements analysis, rapid E LBS needs special exceptions for emergencies design and implementation, using and verification of the In crisis situations, safety far outweighs privacy needs prototype, refine the prototype when the prototype is not An emergency should be given privilege to be treated in a adequate, and finally deliver the system special manner. IP telephony can support emergency situations as with e911 call services in USA. 110 in Germany, and 1 12 in the rest of Europe [5]. Hospitals, for V. THE KEY PRIVACY REQUIREMENT example, may require up-to-date information about the A LBS needs dynamic response to circumstance location of patients, particularly when medical emergencies With regard to geographic in formation disclosure, a arise. Trusted proxies are sometimes used to handle these Notifiers willingness to reveal his/her information primarily kinds of situations. People are willing to pay for this service depends on who is requesting that information and why For example, the MedicAlert is a paid service that stores Depending on the social relationship between a Notifier and personal medical records and forwards it to emergency a Subscriber, a response might be quite different from one responders in the case of medical emergencies user to another. As Roach pointed out, while traditional approaches understand privacy as a state of social VL. SYSTEM DESIGN AND IMPLEMENTAION withdrawal"[14]. Altman instead sees it as a dialectic and A. System design dynamic boundary regulation process [1]. Privacy For our SIP-based approach to privacy and LBs, we use a management is not about setting rules and enforcing them. Peer-to-Peer(P2P) architecture and authorization Rather, it is the continual management of boundaries mechanism. In order to prevent unnecessary information between different spheres of action and degrees of from being revealed to a third party, we use sIP Back-to- disclosure within those spheres. Back User Agents(B2BUA)as end points [16 A B2BUA processes incoming requests and generates outgoing B LBS needs a level of deniability built in requests to communicate with another B2BUA. Once a P2P Hindus et al have suggested a social need to avoid connection has been built up, a proxy hands over the data potentially embarrassing situations, undesired intrusions, transfer between the two nodes. Geographic location and unwanted social obligations [ 8. A good example of this information is collected into a B2BUA where as much is with mobile phones. If a person does not answer a mobile personal information about an end user is captured, stored, all, it could be for technical reasons--such as being and processed on local devices owned by that end user outside of the service range, not having the phone with RFC 3265 states: "Privacy concerns may require that him/her, or the phone was offor for social reasons, such as Notifiers apply policy to determine whether a particular being busy or not wanting to talk to the caller at that Subscriber is authorized to subscribe to a certain set of moment. The result is that the person being called has a events. Such policy may be delined by mechanisms such as simple model for protecting his/her privacy, while the caller access control lists or real-time interaction with a user [14] cannot tell why that person is not answering. By default, it Whenever a B2BUA sends a Subscribe request to another does"the right thing "without the end-user having to take B2BUA, it will trigger real-time authorization process with ial action a user. On a peer-to-peer level, B2BUAs authorize one another personally C LBS needs coarse-grained control LBS need coarse-grained control. A LBS user should 1) Components have a way to stop or adjust the information disclosure to The system architecture is shown in Figure 1. It includes the level that users want to reveal to the others. Lederer and Sip proxy, Domain Name System(DNS)server, Presentit Hong suggest that ubiquitous computer systems that convey and Watcher. The sip proxy is used to forward a SIP location information could incorporate both a precision dial message and to the desired Presentity. The dNs server is (ordinal)and a hide button (binary), e. g, audio device used to find the next-hop IP address. A Presentity is a volume and mute controls, so users can either adjust the presence model entity. It is the lpidf owner that sends precision at which their context is disclosed or decidedly geographic information to Watchers. A Watcher is a halt disclosure [11]. This helps users to accommodate the Presence model entity that subscribes to receive the LpidF controls and even co-opt them in ways that the designer may from a Presentity in order to learn that Presentity's geographic information ecure and self-contained furthermore Lpidf has to fulfill user needs and meet the privacy requirements 2) Routing the Request The basic unit of storage in an LPidF document is the SIP networks are capable of routing requests from any tuple. A LPIDF document might contain more than one user on the network to the server that holds the registration tuple. a tuple is used to describe individual pieces of state for a user [15]. SIP uses hybrid P2P architecture. Its contextual data. For example, a LPIDF might contain static features include information such as a name and email address. as well as Lookup centralized: siP provides a mechanism for a user dynamic information such as current location and activity Agent (UA) to explicitly create a binding. This mechanism A SIP Presence LBS application retrieves and manipulates is known as registration. Registration entails sending a LPIDF data to accomplish location-aware tasks through end REGISTER request to a special type of User Agent Server users specify privacy preferences qUAS) known as a registrar. A registrar acts as the front end C Proposed SIP flow meets privacy requirements Figure 2 shows our proposed Sip message flow s口rtc。l SUBSCRIBE and notify methods are used to deal with NS N∞n-S| P protoc。l most of presence location issues, and PUBLISH is used to deal with an emergency situation. The SIP authorization mechanism is applied to prevent sensitive information from being revealed. We can now examine our prototype in light of the key privacy requirements defined in section V JAIN P Proxy JIN 1). Dynamic response to circumstance? Watche When a Subscriber wishes to subscribe to a particular PrEsentIty S段18 state for a resource, it forms a SUBSCRIBE message. The SUBSCRIBE request will be confirmed with a final response. 200-class responses indicate that the subscription Fig 1. Proposed system architecture has been accepted, and that a NoTiFY will be sent Step 1-5 a watcher sends SUBSCRIBE Request Presenti immediately. A 202 response merely indicates that the through SiP proxies and dNs server subscription has been understood, and that authorization Step6-8 Desired Presentity reply 200 ok back to Watcher Finally, a dialog is established between Watcher and may or may not have been granted. Whenever a request Presentity for peer-to-peer message exchange comes, a Presentity should be able to accept or deny the request, and reveal part of the geographic location to the dns server for a domain, reading and writing mappings based on the contents of REGISTER requests. A Subscriber(Alice) SIP Proxy Notifier( Bob) proxy server that is responsible for routing requests for that Step 1----Subscribe----->1--Subscribe---> Request state subscription domain typically consults this dNS server Data exchange between peers. If a user wants Lo initiate a session with another user. SIP must discover the current Step 3 K-----------NOTIFY (pending)----- Waiting for authorization host(s) at which the destination user is reachable. This Step 4 200ok 7l Acknowledge notifying discovery process is frequently accomplished by SIP step5-… NOTIFY( active Grand city level information network elements such as proxy servers and redirect servers Step 6 200 ok-------------l Acknowledge notifying that are responsible for receiving a Request, determining where to send it based on know ledge of a registrar and dNS PUA (Alice) SIP Proxy Watcher(Hospital) server, and then sending it there. When a SUBSCRIBE step7卜-Push-叫 I update emergency infomation message reaches the Presentity, it establishes a"dialog"with Step 8 (<--200 ok- I Acknowledge publication the presence agent. a dialog is defined in RFC 3261, and it ----Notify-----> Inform emergency informatio represents the SIp state between a pair of entities to facilitate peer-to-peer(P2P)message exchanges [16 Step 10 I <-----200 ok---- Acknowledge notifying Fig 2. Proposed SIp message flow Alice sends SUBSCRIBE Request to Bob asking for his B. Location-enhanced PIDF(LPIDF geographic information. Notifier reply 202 Response indicates LPIDF is a extension of pidf defined as a data format that the subscription has been understood, and that an for containing geographic information. SIP, by itself, only authorization request needs to be approved by Bob. Bob provides call control. However, SIP accepts additional authorizes the request and decided to reveal his city level information inserted as a siP payload for other applications ographic information to Al Geographic information in the LPidF format can be inserted When Alice encounters an emergency situalion, Presence into a SIP message's payload. The basic function of LPIDF User Agent (PUA)publishes her geographic information to is to provide a common and extensible container where the SIP proxy, and SIP Proxy notifies hospital user can place identifiers, security factors, location information to the Subscriber. SIP provides the representation, and other parameters to manage the users authorization mechanism to dynamically accept or deny an location informalion. The requirement for the LPidf is to incoming SUBSCRIBE request. The authorization mechanism is used to provide real-time interaction. Hence, a system architecture shown in Figure 1. The prototype user can give dynamic responses for the incoming requests. solution uses SIP mechanism implemented with the Java The current project offers three options for users: SIP Application Programming Interface(API). The presence authorize","authorize with privacy concern" and"reject service has two distinct sets of clients One set of clients 2)Level of deniability? called Presentities, provides the presence information to be A NOTIFY request will be sent to a Subscriber after stored and distributed. The other set of clients, called sending a 202 response. RFC 3265 specifies that s NOTIFY Watchers, receives the presence information from the message is sent immediately after any 200-class response to service. we use the jsr32 SiP APi to develop the presentity a SUBSCRIBE request, regardless of whether the and use the JSr 180 SIP API to develop the watcher for this subscription has already been authorized. 200-class prototype The JAIN-SIP proxy is used to test the Presentit responses to SUBSCRIBE requests do not generally contain and the watcher and to forward sip requests. The Nokia any useful information beyond subscription duration. Their $60 emulator was used to run Java 2 Micro Edition(J2ME) primary purpose is to serve as a reliability mechanism. The code. The prototype is shown in Figure 3 NOTIFY requests must contain a "Subscription-State header with a value of active,,"pending,, or"terminated. Presentity is at the left hand side of figure 3 The"pending"value indicates that the subscription has been The Presentity capabilities are received, but that policy information is insufficient to accept a Send and process notify and subscriBe requests or deny the subscription at this time. This approach provides o Support XML format""lpidf+xml a degree of deniability, as a"Subscription-State"might be Register and unregister to a SIP proxy pending"due to technical failures, lack of actual data, o Authorize nechanism for incoming SUBSCRIBE request restricted access, or because some other possible reason o Modify LPIDF data for coarse-grained control BCoarse-grained control? Watcher is at the right hand side offigure 3 When the authorization has been approved, a user can The Watcher capabilities are: o Send and process NOTiFY and SUBSCRIBE requests decide which parts of the LPiDF he/she wants to reveal. we o Support XML format"lpidf+ xml" define five levels:"country","province,"city o Register and unregister to a SIP proxy and"room. Meanwhile, another two parameters have been o Send PUBLiSh request to SIP proxy provided: Durationand"Interval". The user can decide how long he/she wants to reveal the geographic in fornation (for instance, 2 hours), and the user can delermine the You arcOFFUNE Watcher interval for releasing the geographic information (for Contact SIP URL ilsonmotilanist oDy instance, once every 5 minutes) 4). User feedback? s 90v (orINn JAIN SIP PROXY abound pew IP a和 The Notifier contains a dynamic subscription list. When a PIR subscription is created in the Notifier. it stores the event 车② package name and the“ Event” header“id” parameter as part ,·画甲 hiE proxy view the traces of the subscription information into the Notifier. A subscription is destroyed when a Notifier sends a NotifY Request with Subscription- State”of“ terminated 1= According to the subscription list, our SIP Presence LBs is umt able to indicale who is gelling geographic infornation and how much geographic information the Subscriber is getting When a subscription is terminated, it is removed from the郾sny6如6》国。83 subscription list. Thus, the Presence LBs application will Fig 3. Java Implementation reflect that the Subscriber stopped getting geographic Watcher sends SUBSCRIBE Request to Presentity asking information from a notifier for geographic information. Authorization needs to be taken 5). How to deal with emergency situations by PresentiLy. Presentity needs to decide the "level duration”and“ interval”o geogra hic information a Presence User Agent(PUA) pushes disclosure presence system, but it is outside of the system. In that way the pua does not receive SUBSCribe messages or send NOTIFY messages. [ 12] provides a method, PUBLISH, to VIL CONCLUSION push the geographic lo cation information to a proxy server. We presented an innovative use of SIP Tor the subscription PUBLISh is used to upload geographic information from and notification of geographic information to provide a the PUa to the sip proxy. The Sip proxy can act as a re- privacy concerned location-based service. Because this distributor of that geographic information. The SIP Proxy approach is based on SIP, it can be easily integrated into IP can then notify the geographic information to public telephony services for enabling personalization of emergency response units like a hospital, fire department or telecommunication LBS while reducing a user's privacy police station concerns in order to increase user satisfaction. LPIDF enhances sip with the required spatial location capabilities D. Implementation for supporting the personalized telecommunication services To investigate the feasibility of the proposed SIP Message Through the SIP Presence model and LPIDF, a SIP Presence flow(see Fig. 2), a prototype is developed according to the Agent(PA)can convey geographic information to pass through any SIP network. An end user can subscribe to [15]J. Rosenberg, "A Presence Event Package for the another user's lpidf in order to get the other user's Session Initiation Protocol (SIP), IETF, RFC3856 geographic location information. A LPIDF owner is able to 2004 decide the frequency and duration of information [16]J. Rosenberg, H. Schulzrinne, G. Camarillo,A availability, and control which parts of the lpidf to expose Johnston, J. Peterson,R. Sparks, M. Handley and E A lot of work still lies ahead, as our prototype still needs to Schooler. SIP: Session Initiation Protocol". IETF. RFC fined and evaluated. a methodology needs to be 3261,2002 developed to test the prototype. In order to carry out data [7JH. Sugano, S. Fujimoto, G. Klyne, A. Bateman, W collection and analysis, the LBs privacy concerns still need Carr and J. Peterson, "Presence In formation Data to be addressed through different methods. In the near Format(PIDF", IETF, RFC3863, 2004 future, we would like to provide some recommendations to LI8R. Want,A. Hopper, V Falcao and J. Gibbons,The Active Badge Location System", ACM Transactions the Geopriv working group regarding the use of SIP for Information Systems, vol. 10, pp 91-102, 1992 privacy concerned LBs [19JA.F. Westin, Privacy and Freedom, Atheneum NY Bodley head, 1967 [20JIETI SIMPI orkin Giroup, REFERENCES http://www.ietforg/htmlcharters/wg-dirhtml [1 I. Altman, The Environment and Social Behavior Privucy, Personal Space, Territory and Crowding, Monterey. CA: Brooks/ Cole. 1975 [2 P. S. Andre, "Extensible Messaging and Presence AUTHORS Protocol (XMPP: Core", IETF, RFC3920, 2004 Wilson Wu is a master student of computer Science at [3A. Beresford and F. Stajano, "Location Privacy in the University of the Western Cape. His main research Pervasive Computing", IEEE Pervasive Computing, interests are Sip presence services, location based services voL.2pp.46-55,2003 and human privacy concern 4」X.Y.Chen,Y. Chen and l.Y.Rao,“ An efticient Spatial Publish/Subscribe System for Intelligent Aleksandar Radovanovic is Lecturer in Computer Science Location Based Services", In Proceedings of the 2nd at the University of the Western Cape. His research interests International Workshop on Distributed Event-Based include the general area of computer networks and Systems, San Diego, CA, USA, pp 1-6, 2003 [5] J. Costa and H. Tang, "Application of Spatial Location protocols Information to SIP,, ACM Cluster Computing, pp 399 410.2002 William Tucker is a Senior Lecturer in Computer Science [6J. Cuellar, J. Morris, D. Mulligan, J. Peterson and J at the University of the Western Cape. He is finishing a PhD Polk, Gieopriv Requirements,IETF,RFC 3693, 2004 at the University of Cape Town on Quality of Service and [7 M. Day, J. Rosenberg and H. Sugano, A Model for multi-modal semi-synchronous IP communications Presence and Instant Messaging", IETF, RFC 2778 2000. [8 D. Hindus, S. D. Mainwaring, N. Leduc, A. E Hagstrom and 0. Bayley,"Designing Social Communication devices for the home?, a cm human Factors in Computing Systems, pp 325-332, 2001 [9 J. Hong and J. A Landay, "Support for Location: An Architecture for Privacy Sensitive Ubiquitous Computing,, In Proceedings of Mobisys 04, Boston MA,USA,pp.177-189.204. [10] A. Kanamaru and T. Yoshitsugu,"Fieldcast2 Flexible P2P architecture for presence information sharing", The Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp 98 102、2004. [11]S. Lederer and J. Hong, Personal privacy through understanding and action: five pitfalls for designers ACM Personal and Ubiquitous Computing, vol 8, pp 440-454.2004 [12]A Niemi, "Session Initiation Protocol(SIP) Extension Tor Event state Publication".. IETF. SIP WG Internet- Dra,2004 「13]J. Peterson,“ Cornmon profile for presence(CPP)”, IETF,RFC3859,2004. [14A. B. Roach, "Session Initiation Protocol (SIP)-Specific Event Notification". IEtf rFC 3265. 2002
(系统自动生成,下载前可以参看下载内容)

下载文件列表

相关说明

  • 本站资源为会员上传分享交流与学习,如有侵犯您的权益,请联系我们删除.
  • 本站是交换下载平台,提供交流渠道,下载内容来自于网络,除下载问题外,其它问题请自行百度
  • 本站已设置防盗链,请勿用迅雷、QQ旋风等多线程下载软件下载资源,下载后用WinRAR最新版进行解压.
  • 如果您发现内容无法下载,请稍后再次尝试;或者到消费记录里找到下载记录反馈给我们.
  • 下载后发现下载的内容跟说明不相乎,请到消费记录里找到下载记录反馈给我们,经确认后退回积分.
  • 如下载前有疑问,可以通过点击"提供者"的名字,查看对方的联系方式,联系对方咨询.
 相关搜索: SIPPresence相关...
 输入关键字,在本站1000多万海量源码库中尽情搜索: