SWARNA BHARATI INSTITUTE OF SCIENCE AND TECHNOLOGY

Slides:



Advertisements
Similar presentations
Understanding the IEC Standard 李嘉凱 指導教授:柯開維.
Advertisements

INTRODUCTION Here we present the bubble-sensing system that support the persistent sensing of a particular location , as required by user requests . Conceptually,
Component-Based Software Engineering Oxygen Paul Krause.
Trust Establishment in Pervasive Grid Environments Syed Naqvi, Michel Riguidel TÉLÉCOM PARIS ÉNST É cole N ationale S upérieur des T élécommunications.
Urban Sensing Jonathan Yang UCLA CS194 Fall 2007 Jonathan Yang UCLA CS194 Fall 2007.
MetroSense Project: People-Centric Sensing at Scale Shane B. Eisenman †, Nicholas D. Lane ‡, Emiliano Miluzzo ‡, Ronald A. Peterson ‡, Gahng-Seop Ahn †
1 3 rd SG13 Regional Workshop for Africa on “ITU-T Standardization Challenges for Developing Countries Working for a Connected Africa” (Livingstone, Zambia,
Distributed Collaborations Using Network Mobile Agents Anand Tripathi, Tanvir Ahmed, Vineet Kakani and Shremattie Jaman Department of computer science.
Chapter 8: Network Operating Systems and Windows Server 2003-Based Networking Network+ Guide to Networks Third Edition.
1. Context: Ambient Intelligence Ambient Intelligence (AmI) represents a vision of ubiquitous computing, sensing and actuating to unobtrusively enhance.
THE SECOND LIFE OF A SENSOR: INTEGRATING REAL-WORLD EXPERIENCE IN VIRTUAL WORLDS USING MOBILE PHONES Sherrin George & Reena Rajan.
Architectural Design.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
Hong Lu , Nicholas D. Lane, Shane B. Eisenman, Andrew T. Campbell
Network of Excellence in Internet Science Network of Excellence in Internet Science (EINS) Joint Workshop and 4 th Plenary Meeting Bologna June 13, 2014.
Linked-data and the Internet of Things Payam Barnaghi Centre for Communication Systems Research University of Surrey March 2012.
Hiding in the Mobile Crowd: Location Privacy through Collaboration.
IT 351 Mobile &Wireless Computing Semester 1, Dr. Hala Mokhtar Room th floor.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
INTERNET AND ADHOC SERVICE DISCOVERY BY: NEHA CHAUDHARY.
Cerberus: A Context-Aware Security Scheme for Smart Spaces presented by L.X.Hung u-Security Research Group The First IEEE International Conference.
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
Nicholas D. Lane, Hong Lu, Shane B. Eisenman, and Andrew T. Campbell Presenter: Pete Clements Cooperative Techniques Supporting Sensor- based People-centric.
Cloud Networked Robotics Speaker: Kai-Wei Ping Advisor: Prof Dr. Ho-Ting Wu 2013/04/08 1.
The Second Life of a Sensor: Integrating Real-World Experience in Virtual Worlds using Mobile Phones Mirco Musolesi, Emiliano Miluzzo, Nicholas D. Lane,
1 Ubiquitous Computing Nov. 15, 2006 Ki-Joune Li.
Application of Operating System Concepts to Coordination in Pervasive Sensing and Computing Systems Benjamin J. Ewy, Larry M. Sanders Ambient Computing,
Enabling the Future Service-Oriented Internet (EFSOI 2008) Supporting end-to-end resource virtualization for Web 2.0 applications using Service Oriented.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
By: Tarek Abdelzaher, Yaw Aanokwa, Peter Boda, Jeff Burke, Deborah Estrin, Leonidas Guiba, Aman Kansal, Samuel Madden, Jim Reich Presentation By: Ankit.
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Towards ‘Ubiquitous’ Ubiquitous Computing: an alliance with ‘the Grid’ Oliver Storz, Adrian Friday, and Nigel Davies Computing Department, Lancaster University,
INTRODUCTION TO GRID & CLOUD COMPUTING U. Jhashuva 1 Asst. Professor Dept. of CSE.
AMSA TO 4 Advanced Technology for Sensor Clouds 09 May 2012 Anabas Inc. Indiana University.
Introduction to Mobile-Cloud Computing. What is Mobile Cloud Computing? an infrastructure where both the data storage and processing happen outside of.
Communication Protocol Engineering Lab. VANET-cloud : a generic cloud computing model for vehicular ad hoc networks IEEE Wireless Communications February.
Distributed Systems Architectures Chapter 12. Objectives  To explain the advantages and disadvantages of different distributed systems architectures.
Context-aware Adaptive Routing for Delay Tolerant Networking
Dr. Ir. Yeffry Handoko Putra
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
Internet of Things Approach to Cloud-Based Smart Car Parking
Fundamentals of Information Systems, Sixth Edition
COMP532 IT INFRASTRUCTURE
TECHNOLOGY GUIDE THREE
MetaOS Concept MetaOS developed by Ambient Computing to coordinate the function of smart, networked devices Smart networked devices include processing.
1st Draft for Defining IoT (1)
Internet of Things: State of the Art
Mobile &Wireless Computing
World-Leading Research with Real-World Impact!
Living in a Network Centric World
Living in a Network Centric World
We Create Tools and Tools Recreate Us! The Trends
TECHNOLOGY GUIDE THREE
MetroSense Project: People-Centric Sensing at Scale Shane B
Mobile Agents.
Living in a Network Centric World
Cognitive Radio Networks
Living in a Network Centric World
Securing Home IoT Environments with Attribute-Based Access Control
Smart Learning concepts to enhance SMART Universities in Africa
Living in a Network Centric World
Living in a Network Centric World
Sensor Networks – Motes, Smart Spaces, and Beyond
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
TECHNOLOGY GUIDE THREE
Presentation transcript:

SWARNA BHARATI INSTITUTE OF SCIENCE AND TECHNOLOGY BUBBLE SENSING FROM: SWARNA BHARATI INSTITUTE OF SCIENCE AND TECHNOLOGY BY M.SRAVAN (07M61A1248) GUIDANCE OF Y. LAKSHMI PRASANNA M.tech

WHAT IS BUBBLE-SENSING? A new sensor network abstraction. Allows mobile phone users to create a binding between sensing tasks eand the physical world at locations of interest, that remains active for a eduration set by the user. We envision mobile phones being able to affix sensing task bubbles at eplaces of interest. Then receive sensed data as it becomes available in a delay-tolerant efashion. Creating a living documentary of places of interest in the physical world.

ABSTRACT Bubble Sensing. We describe an implementation of the bubble-sensing system using eesensor-enabled mobile phones. Bubble carriers and bubble anchors implement a number of simple eemobile phone based protocols. That refresh the task bubble state as new mobile phones move through eethe area. Our design is resilient to periods.

INTRODUCTION Mobile phone has become a ubiquitous tool. The sensed data gathered from these devices form the basis of a eenumber of new architectures and applications. Bubble-sensing system. The sensing request persists at the location until the timeout set by the eeinitiator is reached.

INTRODUCTION (Cont…) Sensing bubbles. Requires some work to implement this service on top of a cloud of eehuman-carried phone based sensors. Heterogeneous system. A two tier hardware architecture comprising the bubble server on the eebackend.

INTRODUCTION(Cont…) Mobility characteristics. Hardware capabilities. User profiles. Bubble creator. The bubble anchor keeps the bubble in the region of interest by eebroadcasting the sensing request. The sensing node perceives the bubble by listening to the broadcasts. The bubble server binds the results to the bubble, which can be queried eeby the bubble creator at any time.

BUBBLE-SENSING Sensing tasks are created and maintained in the bubble-sensing eesystem. Through the interaction of a number of virtual roles. A task is a tuple (action, context, region, duration). The action can be any kind of sensing operation. The context parameter specifies the set of conditions under which eethe action should occur.

BUBBLE-SENSING ( Cont…) The region is defined as the tuple (location, radius). Where location is a point in a coordinate system like GPS indicating the ecenter of the region. The radius defines the area of the region. The granularity of the radius is related to the local communication eetechnology.

Fig. 1. Bubble-sensing architecture and bubble management Fig. 1. Bubble-sensing architecture and bubble management. Phone A is the task creator.

Bubble creation Bubble creator is the device whose user initiates the sensing request that eleads to the creation of the sensing bubble. There are two ways a bubble can be created, creator is a mobile phone. the creator is any entity that registers a task with the bubble server.

Bubble maintenance LOCATION-BASED. MOBILITY-BASED. Challenges to bubble maintenance. Bubble restoration.

IMPLEMENTATION Fig. 2. The bubble-sensing architecture implemented on each mobile device. We build a proof-of-concept mobile cell phone tested to demonstrate the bubble- sensing system.

IMPLEMENTATION Programming language Communication Sensors Classifier Localization System integration

Fig. 3. The Blue Cell device provides a 3D accelerometer that can be connected to the mobile phone (e.g., Nokia N95 or N80) via Bluetooth.

PRIVACY AND SECURITY CONCERNS The sharing of device resources with unknown third parties. The privacy implications that result from the collection of people-centric eesensor data. Even if users trust the bubble-sensing infrastructure.

PRIVACY AND SECURITY CONCERNS Individuals' privacy concerning their daily activities is still at risk from eeother users if the system is misused. A sensing bubble can be established in any location. Individuals' privacy can be managed by limiting the representation of eedata delivered to system users.

PRIVACY AND SECURITY CONCERNS Individuals' privacy concerning their daily activities is still at risk from eeother users if the system is misused. A sensing bubble can be established in any location. Individuals' privacy can be managed by limiting the representation of eedata delivered to system users.

APPLICATION DOMAIN Traffic monitoring Location monitoring Crowd management

FUTURE TECHNOLOGY Modified implementation Integrate security concerns Integrate privacy concerns

RELATED WORK In this paper we present our first attempt to build a mobile cell phone eenetwork. Use of information locality to achieve efficient, scalable sensor eenetworking is a hot topic. Sensor sharing. Variants of the GUIDE system. The VSA (virtual stationary automata). Spatial Programming (SP). We use a single accelerometer embedded in commercial mobile phones eethat people carry every day.

CONCLUSION We presented an approach to support persistent location-specific task in eea wireless sensor network composed of mobile phones. Mobile sensor nodes collaborate and share sensing and communication eeresources with each other in a cooperative sensing environment. We describe the virtual roles nodes can assume in support of eebubbleesensing, including the required local and backend eecommunication.

REFERENCES A.T. Campbell, S.B. Eisenman, N.D. Lane, E. Miluzzo, R.A. Peterson, People-centric urban sensing, in: Proc. of 2nd ACM/IEEE Int'l Conf. on Wireless Internet, WICON'06, ACM Int'l Conf. Proc. Series, vol. 220, No. 18, Boston, Aug 2-5, 2006, (Invited Paper). J. Burke, D. Estrin, M. Hansen, A. Parker, N. Ramanathan, S. Reddy, M.B. Srivastava, Participatory sensing, in: Proc. of 1st Workshop on Wireless Sensor Web, WSW'06, Boulder, October 31, 2006, pp. 1-5. T. Abdelzaher, Y. Anokwa, P. Boda, J. Burke, D. Estrin, L. Guibas, A. Kansal, S. Madden, J. Reich, Mobiscopes for human spaces, IEEE Pervasive Computing 6 (2) (2007) 20-29.

Thank you

ANY QUERIES ?..