UBICOMP SYSTEMS: TOPICS & CHALLENGES. New computing model  Heterogeneous devices  Interaction:  Many-to-many  Possibly implicit, invisible, through.

Slides:



Advertisements
Similar presentations
Context-awareness, cloudlets and the case for AP-embedded, anonymous computing Anthony LaMarca Associate Director Intel Labs Seattle.
Advertisements

Mobile and ubiquitous computing Chapter 16 Distributed systems, concepts and design, 4th edition, 2005, Coulouris et al Ylva-Li Lindh Gabriella Hammarin.
© 2004 Mobile VCE New Revenues through Ubiquitous Services: Removing the Barriers Steve Wright Head of Strategic Research, BT on behalf.
Beyond Prototypes: Challenges in Deploying Ubiquitous Systems N. Davies and H. Gellersen IEEE pervasive computing, 2002 Presenter: Min Zhang
SCENARIO Suppose the presenter wants the students to access a file Supply Credenti -als Grant Access Is it efficient? How can we make this negotiation.
Group #1: Protocols for Wireless Mobile Environments.
ASNA Architecture and Services of Network Applications Research overview and opportunities L. Ferreira Pires.
Prepared By: Kopila Sharma  Enables communication between two or more system.  Uses standard network protocols for communication.  Do.
Towards Security and Privacy for Pervasive Computing Author : Roy Campbell,Jalal Al-Muhtadi, Prasad Naldurg,Geetanjali Sampemane M. Dennis Mickunas.(2002)
Gaia Context and Location-Aware Encryption for Pervasive Computing Environments Jalal Al-MuhtadiRaquel Hill Roy Campbell Dennis Mickunas University of.
Mobile and Ubiquitous Computing. Overview Attributes Discussion.
PhD course - Milan, March /06/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science.
CS 239: Advanced Security Spring 04 Security in Pervasive and Ubiquitous Environments Sam Irvine
DOLCLAN Middleware Support for Peer-to-Peer Distributed Shared Objects Jakob E. Bardram and Martin Mogensen University of Aarhus, Denmark [Center for Pervasive.
Pervasive Healthcare Martin Mogensen mastering student and student programmer Centre for Pervasive Healthcare [ Computer Science Department.
CS 441: Charles Durran Kelly.  What are Wireless Sensor Networks?  WSN Challenges  What is a Smartphone Sensor Network?  Why use such a network? 
Master Course /06/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
Mobile and Pervasive Computing Overview Material taken from: “Fundamental Challenges in Mobile Computing” and “Pervasive Computing: Vision and Challenges”
Key management in wireless sensor networks Kevin Wang.
Designing Context-Sensitive User Interfaces. Overview Introduction Context Architectures DynaMo-AID: designing context-aware user interfaces  Design.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Medical Applications Tejinder Judge Usable Security – CS 6204 – Fall, 2009 – Dennis.
Xiaoyu Tong and Edith C.-H. Ngai Dept. of Information Technology, Uppsala University, Sweden A UBIQUITOUS PUBLISH/SUBSCRIBE PLATFORM FOR WIRELESS SENSOR.
IT 351 Mobile &Wireless Computing Semester 2, Dr. Hala Mokhtar Room 79- 2nd floor.
Some Computer Science Issues in Ubiquitous Computing Presenter : Junghee-Han Mark Weiser Communications of the ACM, July 1993.
Fall 2002CS/PSY Pervasive Computing Ubiquitous computing resources Agenda Area overview Four themes Challenges/issues Pervasive/Ubiquitous Computing.
Charting Past, Present, and Future Research in Ubiquitous Computing Gregory D. Abowd and Elizabeth D. Mynatt Georgia Institute of Technology LEE SEMUN.
Introduction to Mobile Computing -CSE 535 Fall 2007 Sandeep K. S. Gupta School of Computing and Informatics Arizona State University.
Ubiquitous Computing Software Systems.
1 Chapter 7 Designing for the Human Experience in Smart Environments.
PERVASIVE COMPUTING MIDDLEWARE BY SCHIELE, HANDTE, AND BECKER A Presentation by Nancy Shah.
Comp 15 - Usability & Human Factors Unit 9 - Ubiquitous Computing in Healthcare This material was developed by Columbia University, funded by the Department.
Uichin Lee KAIST KSE KSE801: Mobile and Pervasive Computing for Knowledge Services.
FOREWORD By: Howard Shrobe MIT CS & AI Laboratory
Cooperative Wireless Networks Hamid Jafarkhani Director Center for Pervasive Communications and Computing
Cerberus: A Context-Aware Security Scheme for Smart Spaces presented by L.X.Hung u-Security Research Group The First IEEE International Conference.
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
Beyond The Desktop The Future of the Interface. The co-evolution of hardware, interface and users Punched cards Character displays and keyboards Graphical.
Master Course /11/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
1 Ubiquitous Computing Nov. 15, 2006 Ki-Joune Li.
Application of Operating System Concepts to Coordination in Pervasive Sensing and Computing Systems Benjamin J. Ewy, Larry M. Sanders Ambient Computing,
Some Computer Science Issues in Ubiquitous Computing
1 Mobile Computing and Wireless Networking CS 851 Seminar 2002 Fall University of Virginia.
Mobile Computing and Wireless Networking
Wi-Fi, UbiComp, and SmartMobs Valerie Gomez de la Torre | KMS i385Q | Dr. Turnbull |
Privacy and Security: Thinking About and Analyzing Privacy privacy and security 1 Research Topics in Ubiquitous Computing Ben Elgart thinking about and.
Federated Devices: Augmenting Mobility with Ambient Resources Frankie James, Ph.D. SAP Research, RC Palo Alto.
Ashley White.  Computing that is made to be found anywhere and everywhere.  A high degree of communication among devices and sensors through a ubiquitous.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Pervasive Computing Parts of the slides are extracted from those of Profs. Mark Weiser, Deborah Estrin, Akbar Sayeed, Jack Stankovic, Mani Srivastava,
Introduction to Mobile Computing -CSE 535 Fall 2010 Sandeep K. S. Gupta School of Computing, Informatics and Decision Systems Engineering Arizona State.
Stanford hci group / cs147 u 27 November 2007 Ubiquitous Computing & “Natural” Interaction Scott Klemmer tas: Marcello Bastea-Forte,
Cyber Space vs. Ubiquitous Space
Ubiquitous Systems Security Boris Dragovic Systems Research Group Computer Laboratory University of Cambridge, UK.
Introduction to Pervasive Computing
1 Pervasive Computing: Vision and Challenges Myungchul Kim Tel:
Mobile Systems Availability Integrity and Confidentiality MoSAIC M.O.Killijian, D.Powell, M.Banâtre, P.Couderc, Y.Roudier LAAS-CNRS - IRISA- Eurécom.
Smart Instant HKU Context-aware Instant Messenger for Mobile Users Supervisor: Dr.Cho-Li Wang CS Final Year Project (Year )
Virtual Machine Abstractions for Nomadic Pervasive Computing (NPC) Environment Presented by: Hen-I Yang, Nov. 29, 2006.
LECTURER: NGUY Ễ N ANH TU Ấ N (TUAN NGUYEN) TUTORS: TÔN TH Ị KIM LOAN TR Ầ N H Ồ NG NGHI {TUANNA, LOANTTK, Developing Applications.
Fuego Core 2005/7 Possible Directions Kimmo Raatikainen Principal Scientist Helsinki Institute for Information Technology
Fuego Core 2005/7 Planned Directions Kimmo Raatikainen Principal Scientist Helsinki Institute for Information Technology
Towards ‘Ubiquitous’ Ubiquitous Computing: an alliance with ‘the Grid’ Oliver Storz, Adrian Friday, and Nigel Davies Computing Department, Lancaster University,
Mobile Networks & Computing Mobile computing : Some Definitions 1 NYANZI A CCNP,CCNAI,CCNA, A+, MIT-SANA, MBA_IT.
Ubiquitous Computing Systems Jakob bardram and Adrian Friday.
CS6501/ECE6501 IoT Sensors and Systems
MetaOS Concept MetaOS developed by Ambient Computing to coordinate the function of smart, networked devices Smart networked devices include processing.
Ubiquitous Computing and Augmented Realities
Topics in Ubiquitous Computing
Ubiquitous Computing By: Patrick Yienger.
TDT49 Mobile Information Systems, Jørgen Birkeland
Presentation transcript:

UBICOMP SYSTEMS: TOPICS & CHALLENGES

New computing model  Heterogeneous devices  Interaction:  Many-to-many  Possibly implicit, invisible, through natural interactions  Networking:  Wireless  Ad-hoc

Example: ABC  Bardram, J.E., and Christensen, H.B., 2007, Pervasive computing support for hospitals: An overview of the activity-based computing project. IEEE Pervasive Computing 6(1): 44-51Pervasive computing support for hospitals: An overview of the activity-based computing project

Ubicomp systems research  Some core challenges:  Resource impoverished devices (resource-aware computing)  Execution environments: Volatile Heterogeneous Fluctuating  Invisible computing  Security and privacy

Resource impoverished devices  Energy:  Consumption  Foraging

Reducing consumption  Example:  FSI current wave meter: FSI Sleep/wake f[Hz] ↓

Power for wireless comm  Example: in-network processing

Foraging  Power  Cyber

Volatile execution environments  Volatility:  Devices come and go  Communication structure changes  Service discovery

Heterogeneous execution environments  Ubicomp application: may span several devices  Patchwork of technologies:  Bell, G., Dourish, P., 2006, Yesterday’s tomorrows: notes on ubiquitous computing’s dominant vision. Personal Ubiquitous ComputingYesterday’s tomorrows: notes on ubiquitous computing’s dominant vision Better in the future? Is messiness the norm?  Heterogeneous hardware – fundamental!

Fluctuating execution environments  PC: static  Ubicomp devices:  Multiple devices  Mobile  Distributed applications

Fluctuating execution environments  Research focus areas:  Context-aware computing: User, others present, temperature, light, etc… UCF Chapter 8  Location (location-based computing) A type of context! UCF Chapter 7 LoCA:  Integration ABC Project54

Integration  Example: Project54Project54  Kun, A.L., Miller, W.T., Lenharth, W. H., 2004, Computers in Police Cruisers. IEEE Pervasive Computing 3(4): Computers in Police Cruisers

Invisible computing  Computers for Weiser’s Sal:  Physically invisible – hidden  Mentally invisible – not centers of attention  How to handle errors, notifications, upgrades?  Some ideas in Friday A. et al., 2005, Guidelines and open issues in systems support for Ubicomp: reflections on UbiSys 2003 and Personal Ubiquitous ComputingGuidelines and open issues in systems support for Ubicomp: reflections on UbiSys 2003 and 2004

Security and privacy  Security = confidentiality, integrity, authenticity of information  Privacy = ability to reveal oneself selectively  UCF Chapter 3

Security and privacy - issues  Trust  Assumptions from conventional protocols  Security based on location and context  Privacy challenges  E.g. sensors  Security challenges

Sensors, privacy: Minority Report