UBICOMP SYSTEMS: TOPICS & CHALLENGES
New computing model Heterogeneous devices Interaction: Many-to-many Possibly implicit, invisible, through natural interactions Networking: Wireless Ad-hoc
Example: ABC Bardram, J.E., and Christensen, H.B., 2007, Pervasive computing support for hospitals: An overview of the activity-based computing project. IEEE Pervasive Computing 6(1): 44-51Pervasive computing support for hospitals: An overview of the activity-based computing project
Ubicomp systems research Some core challenges: Resource impoverished devices (resource-aware computing) Execution environments: Volatile Heterogeneous Fluctuating Invisible computing Security and privacy
Resource impoverished devices Energy: Consumption Foraging
Reducing consumption Example: FSI current wave meter: FSI Sleep/wake f[Hz] ↓
Power for wireless comm Example: in-network processing
Foraging Power Cyber
Volatile execution environments Volatility: Devices come and go Communication structure changes Service discovery
Heterogeneous execution environments Ubicomp application: may span several devices Patchwork of technologies: Bell, G., Dourish, P., 2006, Yesterday’s tomorrows: notes on ubiquitous computing’s dominant vision. Personal Ubiquitous ComputingYesterday’s tomorrows: notes on ubiquitous computing’s dominant vision Better in the future? Is messiness the norm? Heterogeneous hardware – fundamental!
Fluctuating execution environments PC: static Ubicomp devices: Multiple devices Mobile Distributed applications
Fluctuating execution environments Research focus areas: Context-aware computing: User, others present, temperature, light, etc… UCF Chapter 8 Location (location-based computing) A type of context! UCF Chapter 7 LoCA: Integration ABC Project54
Integration Example: Project54Project54 Kun, A.L., Miller, W.T., Lenharth, W. H., 2004, Computers in Police Cruisers. IEEE Pervasive Computing 3(4): Computers in Police Cruisers
Invisible computing Computers for Weiser’s Sal: Physically invisible – hidden Mentally invisible – not centers of attention How to handle errors, notifications, upgrades? Some ideas in Friday A. et al., 2005, Guidelines and open issues in systems support for Ubicomp: reflections on UbiSys 2003 and Personal Ubiquitous ComputingGuidelines and open issues in systems support for Ubicomp: reflections on UbiSys 2003 and 2004
Security and privacy Security = confidentiality, integrity, authenticity of information Privacy = ability to reveal oneself selectively UCF Chapter 3
Security and privacy - issues Trust Assumptions from conventional protocols Security based on location and context Privacy challenges E.g. sensors Security challenges
Sensors, privacy: Minority Report