Conference PaperPDF Available

Taxonomy of Ubiquitous Computing Applications and Challenges

Authors:
  • Shaheed Benazir Bhutto University, Shaheed Banziabad Sindh pakistan

Abstract and Figures

Ubiquitous computing is the emerging technology in computer science. It is a method of enhancing computer usage by making many small computer systems available throughout the environment i-e physical environment. The main concept is to implement smart objects and computer system in real world being disappearing. Disappearance of computer system implies to functionality of these computer must move to the surroundings regardless of location. Embedded technology became more mature and advance. Physical computer system and embedded smart objects fixed together to achieve specific goal. In ubiquitous computing environment billions of smart objects can be implemented for the user support. One can easily connect and configure access setting without any restriction. Although this may cause security and reliability issue but it works. In this regard there are some critical issues also in ubiquitous computing such as security, reliability, social and ethical issue are important to monitor. In this paper ubiquitous computing is presented and its application, challenges and elements of ubiquitous computing are discussed in detail. Finally in last concluded remarks are given about whole discussion.
Content may be subject to copyright.
Taxonomy of Ubiquitous Computing
Applications and Challenges
Azeem Ayaz Mirani
Department of CSE
Quaid – e – Awam University
Nawab Shah, Sindh, Paksitan
Email: azeemmir2016@gmail.com
Muhammad Suleman Memon
Department of CSE
Quaid – e – Awam University
Nawab Shah, sindh, Paksitan
Email: enrsuleman05cs32@gmail.com
Mairaj Nabi Bhati
Department of IT
Quaid – e – Awam University
Nawab Shah, Sindh, Paksitan
Email: mairaj_bhatti@yahoo.com
Mudasar Ahmed Soomro
Department of IT
Quaid – e – Awam University
Nawab Shah, sindh, Paksitan
Email: mudasar1717@gmail.com
Mushtaque Ahemd Rahu
Department of Electronic Engineering
Quaid – e – Awam University
Nawab Shah, Sindh, Paksitan
Email: rahumushtaque@gmail.com
Abstract - Ubiquitous computing is the emerging
technology in computer science. It is a method of
enhancing computer usage by making many small
computer systems available throughout the environment
i-e physical environment. The main concept is to
implement smart objects and computer system in real
world being disappearing. Disappearance of computer
system implies to functionality of these computer must
move to the surroundings regardless of location.
Embedded technology became more mature and
advance. Physical computer system and embedded smart
objects fixed together to achieve specific goal. In
ubiquitous computing environment billions of smart
objects can be implemented for the user support. One can
easily connect and configure access setting without any
restriction. Although this may cause security and
reliability issue but it works. In this regard there are
some critical issues also in ubiquitous computing such as
security, reliability, social and ethical issue are important
to monitor. In this paper ubiquitous computing is
presented and its application, challenges and elements of
ubiquitous computing are discussed in detail. Finally in
last concluded remarks are given about whole discussion.
Keyword: Ubiquitous computing, WAUN, smart
objects, wireless and RFID
I. INTRODUCTION:
Ubiquitous computing is the emerging technologies
in computer science and technology. Ubiquitous
computing is method of enhancing computer based
smart environment by the implementation of many
small computer systems throughout the nt i-e
physical environment. The main concept is to make
smart computerized environment with the
integration computer system and making them
disappear from the environment. Disappearance of
computer implies that functionality of computer
system must move to the surroundings. Ubiquitous
computing made life easier and made easy efforts
as soon as technology is grown. In these days
communication becomes ubiquitous more or less
[2] [7]. The concept of Ubiquitous Communication
is to provide the facility of smart environment. In
this sense ubiquitous computing made easy to
intervention of human to machine relation. In
ubiquitous computing there can be hundreds of
devices with efficient multimedia and power saving
characteristics in order to work collectively. In
ubiquitous computing environment all
heterogeneous devices are actually distributed over
large or small ad hoc or peer to peer designed
model. In this regard devices in communication
area may be mobile or fixed but these devices need
to connect with the communication system of
ubiquitous computing [6]. In Ubiquitous computing
environment cellular system and access point need
a base station in wireless local area network
(WLAN). These features of Ubiquitous computing
gives ease of usage anywhere and any place.
Regardless of geographical location one (student,
teacher or any citizen) can easily communicate and
978-1-5386-2186-8/17/$31.00 c
2017 IEEE
202
Authorized licensed use limited to: University of Sindh. Downloaded on February 16,2021 at 06:22:24 UTC from IEEE Xplore. Restrictions apply.
share resources such as book, shelf, and food can
be implemented. Ad hoc network don’t need
infrastructure such as APs and BS. Ad hoc network
supports centralized system and auto- configured
network node system [4]. Ubiquitous computing
support users regardless of location by using broad
band and wireless access point. Some additional
objects such as sensors and actuators are embedded
with RFID technology within network.
A messy infrastructure needed to implement
ubiquitous computing network. In other words
messiness that we experience in laboratory
ubiquitous computing is not a prototype property
technologies of the bleeding edge, or realistic itself.
Massiveness is property of infrastructure is
inherently messy; rough in their availability and
operation.
The rest of the paper is organized as in section II
defines the applications of the ubiquitous
computing. In section III elements of the
ubiquitous computing are discussed and in section
IV belongings of ubiquitous computing and
technology related issues are discussed. In last
challenges of ubiquitous computing are discussed.
In last conclusion remarks is given.
II. APPLICATIONS OF UBIQUITOUS
COMPUTING:
Ubiquitous computing is self-organized and
centralized computer network environment. It
provides easy way of communication among the
devices regardless of place and environment [4]. It
comprises of different small objects which are
smart to perform different tasks as per user
requirement. In health and medical science
ubiquitous network may play important role when a
patient needs to get direct access of doctor.
Ubiquity performs very important role in case of
emergency. Doctor can recommend direct medicine
without moving from his office. Each and every
patient can be monitored within ubiquitous
computing environment.
In education and research it is very important to
work within network. Ubiquitous computing is
easy to access resource of the educational activities
and material which needed for the study and
research. In addition online lesson preparation and
presentation material can be shared without any
restriction. In environmental monitoring ubiquitous
commuting can work more efficient to measure the
different parameters. Parameters such as
temperature, pressure, humidity and other
considerable parameters can be monitored.
Different smart objects can be implemented for the
environmental monitoring. Other important
application includes traffic monitoring, shopping
plaza items detections etc.
III. ELEMENTS OF UBIQUITOUS
COMPUTING:
Ubiquitous computing element can be comprised
on three levels. In first level devices are considered
which are used to communicate within network.
The second important element is to consider the
communication link needs to establish whenever
user wants to connect with the network [7]. The
third aspect of the element is technology which is
used for the interface of the ubiquitous commuting
network infrastructure and device configuration.
All technological devise having heterogynous
nature can work together within ubiquitous
environment. Three elements are given below in
table:
TABLE: 1 ELEMENTS OF UBIQUITOUS
COMPUTING
Elements
Specification
Devices Storage devices
Input and output devices
Display devices
Communication devices
Sensors
Actuators
Communication
link
Physical link
Fixed wired link
Fixed wireless link
Mobile Wireless link
Hybrid Multi- links
Logical virtual link
Interface
Technology
Navigational technologies
On-screen touch panel technologies
Video interfacing technologies
Voice interfacing technologies
Hand writing based interface
technologies
Hybrid interfacing technologies
A. Devices:
Devices includes in the network environment are
storage devices such memory i-e primary and
secondary memory. Display devices include LCDs
and LEDs which can be used to monitor and
203
Authorized licensed use limited to: University of Sindh. Downloaded on February 16,2021 at 06:22:24 UTC from IEEE Xplore. Restrictions apply.
configure the system devices with visual effects.
Sensor devices are includes in order monitoring the
environmental parameters such as temperature,
humidity, human movement, audio sound
recognition and so many other types of sensors can
be implemented. In order to connect network
devices communication link is necessary to
establish and it is important aspect of every
network. Some of the devices are discussed in
detail below:
B. Storage devices:
Storage devices are memory devices which are
used to store the data of the computer. The data of
the events which occurred in the ubiquitous
computing environment are saved for the future
usage. Storage devices include primary and
secondary devices i-e RAM and Hard disk.
C. Input and output devices:
In ubiquitous computing environment different no:
of devices can be used to input and output
operations such as keyboard, mouse, mice and
other devices which needed.
D. Display devices:
Display devices such LCD and LED are
implemented in ubiquitous environment in order to
configure the system and can operate the system by
the GUI interface.
E. Communication devices:
There are different communication devices can be
implemented in the ubiquitous computing
environment for the purpose of communication.
For the purpose of internet access, internetwork
and internetwork different devices can be sued for
the purpose of communication such as Wi-Fi
modem, routers and switches etc.
F. Sensors:
Sensor is small device which are used to sense the
physical parameters such as temperature, humidity,
pressure etc. there are different types of sensors
available in market in these days to measure the
different parameters of the physical environment.
II. Communication links:
Communication is offered by the combined
operation of the infrastructure. For the purpose of
communication different types of the network can
be implemented in the ubiquitous environment.
There are different types of networks i-e
infrastructure based and infrastructure less. In
infrastructure based no: of wires and other physical
devices are needed to connect for the
communication while in infrastructure less there is
no need of the physical links and other devices.
III. Interface Technology:
Interface technology refers to the communication
devices boundary having different system
configurations and capabilities for the purpose of
communication with each other. Boundaries of
ubiquitous computing needs efficient interface for
the communication. So devices which supports
efficient interface should be maintained and fixed.
Few of interface technologies are discussed below:
A. Software interface:
In interface technology communication of two
different devices can achieve with the help of
software. Software having different versions which
should match within boundaries of the system
communication. For the interface different types of
operating system and other important packages are
used for the interface of the communication
devices.
B. Cables:
In Ubiquitous computing communication link can
be established with different physical link
interfaces. For the communication purpose a well
establish physical connection is needed. This
physical connection can be achieved by the no: of
wires and cables within communication
boundaries. All devices need to connect themselves
within the communication area either physically or
logically.
C. Video and Audio interface technology:
Ubiquitous computing environment supports the
video and audio applications. Digital video
interface (DVI) is digital video interface
technology which was developed by the digital
display working group (DDWG). In this
technology the video source is used to connect with
the digital interface i-e video display controller to
204
Authorized licensed use limited to: University of Sindh. Downloaded on February 16,2021 at 06:22:24 UTC from IEEE Xplore. Restrictions apply.
monitor. This interface was developed to display
the uncompressed video and having the capability
to configure with different modes DVI – A (Analog
only), DVI - D (Digital Only) or DVI – I (digital
and analog both).
IV. BELONGINGS OF UBIQUITOUS
COMPUTING (UBICOM) SYSTEMS:
M.Weiser proposed three basic properties of
ubiquitous computing [7] which represents
distributed computing, context-awareness and
invisibility. Distributed computing implies to
sharing of resources with confidentiality and
accuracy. Distributions of system mean all the
system components networked and transparently
accessible to the environment. The networked
devices can easily be communicated with human as
well network devices within network. The hidden
property means computer can work with human in
more hidden. Third property which is context–
awareness means system should be able to aware
from the user and physical context interaction.
These properties based on different application
requirement and it may apply on specific
application not for all environments. Ubiquitous
computing main five properties are given in the
following diagram.
Figure 1.
Properties of ubiquitous Computing
A. Intelligent:
Ubiquitous computing environment is very smart
and intelligent which can record, analyses and save
the data without human interaction. In this
environment all things are performed rapidly
automatically. This may record event visually and
audio related activities. Due eternity of devices
different types of sensing and RFID technology
related activities can be performed with the scope
of applications.
B. Distributed Environment:
Ubiquitous computing provides the ease of
distributed environment. Due to ubiquitous nature
all devices has to share resources. One can easily
switch from one domain to another within
ubiquitous environment.
C. Integration of cybersecurity and
physical Systems:
Ubiquitous competing have the capabilities to
make system more security physically and also
from the cybersecurity perspective. Ubiquitous
computing environmental devices can be protected
from the unauthorized access with certain security
access policies. Each and every devices consist on
the different heterogeneous structure within the
environment so that they provide different cyber
security mechanism. Due to hidden infrastructure
of the computer systems it is also physically
protected from the environmental variables which
may effect on the devices within the network.
D. Context – aware:
Ubiquitous computing network provides very smart
context - aware feature. This property of ubiquitous
computing provides the user to become aware all
the aspects of the environment. Each and every
device is so connected with network and having
full information of the all network related context
with respect to all new devices connectivity.
V.UBIQUITOUS NETWORK RELATED
FIELDS:
Ubiquitous network provides user oriented services
which supports all the hidden activities of the
background which a user needs for communication.
Ubiquitous computing is the area of future
computing for user oriented applications [3]. This
helps to provide user to work within computerized
environment with the help of ubiquitous
computing. Different application needs different
network requirement. This network provides free
access of resources any time anywhere. Ubiquitous
network also provide the facility of different
devices to be connected with the network. Any
kind of device can be connected with the help of
broad band, mobile access and RFID can easily
access the network.
A. Small and smart objects:
intelligent
Context -
aware
ICS
Distributed
205
Authorized licensed use limited to: University of Sindh. Downloaded on February 16,2021 at 06:22:24 UTC from IEEE Xplore. Restrictions apply.
In ubiquitous computing small objects are useds to
connect with network, small computer can be
embedded in small objects such as shoes, watches,
clothes etc are wearable items. In this regard in
some objects such as refrigerator, vehicles, tables
and desks computer system can be embedded.
Small chips and computer are interconnected with
in network. These small computers need direct
connectivity with the internet [7]. The concept of
ubiquitous computing is same as the concept of
internet in which computers are connected
regardless of distance and system configuration.
The processing power and memory effectiveness
makes small objects more reliable and powerful to
work. These small sensors and actuators become
more powerful with resource of processing power
and memory effectiveness. An efficient human-
computer interaction needed to be communicating
with these smart objects in ubiquitous computing.
B. Wireless Technology:
Wireless technology plays vital role in ubiquitous
computing. Wireless technology grew up from
IEEE 802.11 a/b/g/n WLAN, WiMAX (World
Wide interpretability microwave access) to IEEE
802.16 wireless metropolitan area network
(WMAN) and blue tooth, ultra wide band (UWB),
ZigBee to IEEE 802.15 personal area network
(WPAN) [8]. These technologies supports wireless
LAN to work faster and transfer data more
efficiently to the ubiquitous computing network
devices. WLAN operates faster for the short
distance at the speed of 2.4GHz and cellular system
operates more rapidly at the 900MHz for low date
rates networks. These specifications are given on
the basis of efficient ubiquitous wireless
technologies.
C. RFID supported technology:
For the identification of the remote object in
ubiquitous environment is the major problem. In
this regard ubiquitous computing supports RFID
(Radio frequency identification devices)
technology which provides most effective way of
object identification regardless of location. A
bunch of small and smart devices comprises of low
powered batteries, having fixed antenna and micro
chipped [7][5]. These devices have unique
identification id or serial number within ubiquitous
network environment. Each device has
programmable features which supports
programming information. RF (radio frequency)
signal is the chief source of information sharing
with neighboring devices. With use of RFID
identification of network devices can easily be
implemented.
D. Wide Area ubiquitous network (WAUN):
WAUN communication base on the small amount
of data in kbs while over long distance (upto Km).
The concern application could be environment
monitoring, gas leakage, vehicle and face detection
and several others [9]. In WAUN there could be
several devices, services and network designed
within network which works copiously for the user
service. Wireless technology which is advance such
as adaptive modeling and coding (AMC), diversity
antennas and large scale monolithic microwave IC
(MMIC) by using CMOS devices. WAUN can
work on the large distance and high bit rate by
implementing efficient wireless link and system
requirement.
VI. CHALLENGES OF UBIQUITOUS
COMPUTING:
Although ubiquitous computing is most emerging
technology but having very fast effect on user
computer environment. This idea of ubiquitous
computing is to make computer unseen to user
environment and provide user centralized access of
network. In this network so many smart objects are
embedded with the integration of sensors and
actuators [3][5]. These all components of
ubiquitous computing performed uniformly for the
user oriented services. To meet the desired output
performance of the ubiquitous computing has some
challenges’ to face. Following challenges illustrates
the ubiquitous computing research community to
work out.
A. Unexpected Smart environment:
In ubiquitous computing an unexpected
environment needed to establish anywhere and
everywhere. This leads more complexity for the
management of the ubiquitous computing network.
Cluster of technology makes different
configuration to be maintained and manage.
Different objects having different working
capability, configuration and network requirement.
Heterogeneity generates more complexity for the
establishment and management of the ubiquitous
206
Authorized licensed use limited to: University of Sindh. Downloaded on February 16,2021 at 06:22:24 UTC from IEEE Xplore. Restrictions apply.
environment. Maintaining the ubiquitous
environment is more challenging research issue.
B. Inappropriate interoperability:
It is compulsory in the world of technology to
develop and manufacture the products which
represents their predefined rules and working
algorithms for the software implementation. So
ubiquitous computing becomes more complex for
the communication of the different devices
vendors. The portability of the devices could
comply with each other but there would be a
predefined ruled which each company has to
follow. It leads little bit communication
establishment essence but there would be more
things to be focus. So interoperability is also big
challenge in ubiquitous computing.
C. Absence of system administrator:
Ubiquitous computing environment is centralized
and self-configured so, it doesn’t need
administrator to control and configure the security
policies for the users. Most of the users are not well
known about the system performance, security and
other important operation which needs to be
managed. It may cause the security threat and other
technical problems. The complex network needs
some extra expertise to manage the ubiquitous
network.
D. Social implications of technology
awareness:
Ubiquitous computing has very strong social
impact on society. Working hours of the social
contact may impact on the network performance.
Socially it needs to be managed that if a user needs
connection what and how it should be established?
Continuously access of the data and network may
leads to the network performance low if network is
not maintained efficiently. Is there any law and
social values for the society to follow the ethics
network access? It is important to consider society
as main challenging area of research.
E. Reliability of the ubiquitous network:
As compared to last decade computer devices
became more smart and efficient to measure the
parameters of the network. After few years it would
be more efficient enough to work and configure the
devices for the user access. Billions of the devices
will communicate within network and issue of
reliability may generate for the communication
devices and users. Each device should be managed
well managed and well configured for becoming
the active part of the network. So reliability is big
challenge also for the ubiquitous environment.
VII. CONCLUSION:
On the whole ubiquitous computing is very
attractive and efficient network environment. In
this ubiquitous network Hundreds of smart objects
can be embedded to work for the specific goal.
These smart objects can work together and achieve
the some systematical required output. Ubiquitous
computing based on emerging technology and
having greater effect on the different fields of life.
The hidden system infrastructure work for the
visible users to deal and communicate according to
as per need. It self-configured and self-organized
network and can be implemented anywhere and
anyplace. Lot of research can be introduced for the
betterment of the computer research society.
REFERENCES
1 Kidd, Cory, et al. "The aware home: A living laboratory
for ubiquitous computing research." Cooperative
buildings. Integrating information, organizations, and
architecture (1999): 191-198.
2 Weiser, Mark, Rich Gold, and John Seely Brown. "The
origins of ubiquitous computing research at PARC in the
late 1980s." IBM systems journal 38.4 (1999): 693-696.
3 Kušen, Ema, and Mark Strembeck. "Security-related
Research in Ubiquitous Computing--Results of a
Systematic Literature Review." arXiv preprint
arXiv:1701.00773 (2017).
4 López, Gustavo, Gabriela Marín, and Marta Calderón.
"Human aspects of ubiquitous computing: a study
addressing willingness to use it and privacy
issues." Journal of Ambient Intelligence and Humanized
Computing 8.4 (2017): 497-511.
5 De Silva, Liyanage C., Chamin Morikawa, and Iskandar
M. Petra. "State of the art of smart homes." Engineering
Applications of Artificial Intelligence25.7 (2012): 1313-
1321.
6 Kušen, Ema, and Mark Strembeck. "Security-related
Research in Ubiquitous Computing--Results of a
Systematic Literature Review." arXiv preprint
arXiv:1701.00773 (2017).
7 Weiser, Mark. "The computer for the 21st
century." Scientific american 265.3 (1991): 94-104.
8 Black, Darren, Nils Jakob Clemmensen, and Mikael B.
Skov. "Pervasive Computing in the Supermarket:
Designing a Context-Aware Shopping Trolley." Social
and Organizational Impacts of Emerging Mobile
Devices: Evaluating Use. IGI Global, 2012. 172-185.
9 Ark, Wendy S., and Ted Selker. "A look at human
interaction with pervasive computers." IBM systems
journal 38.4 (1999): 504-507.
207
Authorized licensed use limited to: University of Sindh. Downloaded on February 16,2021 at 06:22:24 UTC from IEEE Xplore. Restrictions apply.
10 Kun, Andrew L. "Textbooks for Pervasive Computing
Training and Education." IEEE Pervasive
Computing 16.3 (2017): 59-61.
11 Kusen, Ema, et al. "A decade of security research in
ubiquitous computing: results of a systematic literature
review." International Journal of Pervasive Computing
and Communications 12.2 (2016): 216-259.
12 Ebling, Maria R., and Roy Want. "Pervasive Computing
Revisited." IEEE Pervasive Computing 16.3 (2017): 17-
19.
13 Goumopoulos, Christos, et al. "A distance learning
curriculum on pervasive computing." International
Journal of Continuing Engineering Education and Life
Long Learning 27.1-2 (2017): 122-146.
14 Patil, Kailas, year jan 2016, page 1130-1135,"a survey on
ubiquitous computing", volume = 06, ICTACT journal on
soft computing.
208
Authorized licensed use limited to: University of Sindh. Downloaded on February 16,2021 at 06:22:24 UTC from IEEE Xplore. Restrictions apply.
Article
Full-text available
This comprehensive review paper provides a thorough examination of the ever-evolving landscape of machine learning (ML), spanning from its historical origins to contemporary applications, challenges, and future prospects. It begins by elucidating the foundational concepts of machine learning, encompassing the diverse types, key terminology, and the intricate pipeline involved in the machine learning process. Delving into its historical perspective, the paper chronicles the development of machine learning, tracing its roots in artificial intelligence and highlighting key milestones and influential researchers who have shaped its trajectory. The core of this review explores an array of machine learning algorithms and techniques, spanning regression, classification, clustering, dimensionality reduction, deep learning, and ensemble methods. These algorithms are contextualized with real-world applications, ranging from healthcare to finance, natural language processing (NLP), computer vision, recommender systems, and robotics. Each application domain is buttressed with illustrative examples and case studies. In recognizing the challenges and open problems that confront machine learning, the review delves into issues pertaining to data quality, model interpretability, bias, ethics, generalization, and overfitting. Moreover, it identifies pressing research questions and areas where advancements are needed. Recent trends and developments in machine learning, including transfer learning, explainable AI, federated learning, reinforcement learning, and ethical considerations, are also highlighted to provide a glimpse into the evolving landscape. The paper culminates in a thought-provoking discussion on the future of machine learning, its potential societal impact, and its transformative role across industries. In summary, this review amalgamates key findings and insights, offering a comprehensive view of machine learning's multifaceted journey, from its inception to its promising future.
Article
Full-text available
Engineering of pervasive computing (PerComp) systems is a new scientific field and from an educational perspective needs to draw from a large number of knowledge domains. The appearance of related courses in computer science curricula has a decade history, but the growth of interest has led in recent years to the design of more advanced PerComp educational programmes. In this paper, we present our experiences in organising, managing and teaching a PerComp curriculum at a postgraduate level since 2010 using distance learning methodologies in the Hellenic Open University. We discuss the distinct characteristics and related challenges of distance education and how these characteristics affected programme organisation, educational material structuring, laboratory courses delivering and student assessment. We report our main findings and conclusions extracted by an online survey filled by students enrolled in the programme, discuss the lessons learned and also provide a number of suggestions for further develo...
Article
Full-text available
Identifying the human aspects related to ubiquitous systems focused on people’s willingness to use them and privacy concerns was our goal. We selected two ubiquitous systems: a wearable system (Google Glass) and an embedded in context system (Smart Environments). An online survey, with more than 400 participants, which included questions about how people perceive privacy issues related to the use of these two different ubiquitous systems, was conducted. Results show that privacy is not the only factor defining predisposition or aversion towards using ubiquitous systems. Financial, risk, and convenience factors are the others. We discovered that the importance of these factors on the decision to use them or not depends on the system. Regarding privacy, Google Glass generates a higher degree of concern than the Smart Environments alternative. Female participants tend to be more worried than male participants, independently of the ubiquitous system considered. Finally, the youngest participants (16–25 years old) are the most concerned about privacy threats, which was unexpected.
Article
Full-text available
Purpose Ever since Mark Weiser coined the term “ubiquitous computing” (ubicomp) in 1988, there has been a general interest in proposing various solutions that would support his vision. However, attacks targeting devices and services of a ubicomp environment have demonstrated not only different privacy issues, but also a risk of endangering user’s life (e.g. by modifying medical sensor readings). Thus, the aim of this paper is to provide a comprehensive overview of security challenges of ubicomp environments and the corresponding countermeasures proposed over the past decade. Design/methodology/approach The results of this paper are based on a literature review method originally used in evidence-based medicine called systematic literature review (SLR), which identifies, filters, classifies and summarizes the findings. Findings Starting from the bibliometric results that clearly show an increasing interest in the topic of ubicomp security worldwide, the findings reveal specific types of attacks and vulnerabilities that have motivated the research over the past decade. This review describes most commonly proposed countermeasures – context-aware access control and authentication mechanisms, cryptographic protocols that account for device’s resource constraints, privacy-preserving mechanisms, and trust mechanisms for wireless ad hoc and sensor networks. Originality/value To the best of our knowledge, this is the first SLR on security challenges in ubicomp. The findings should serve as a reference to an extensive list of scientific contributions, as well as a guiding point for the researchers’ novel to the security research in ubicomp.
Conference Paper
Full-text available
We are building a home, called the Aware Home, to create a living laboratory for research in ubiquitous computing for everyday activities. This paper introduces the Aware Home project and outlines some of our technology- and human-centered research objectives in creating the Aware Home.
Article
In 2001, Mahadev Satyanarayanan (Satya) published the paper, "Pervasive Computing: Vision and Challenges," in IEEE Personal Communications. This was the first paper to substantively explore the implications of Mark Weiser's 1991 vision for a real-world systems infrastructure. It provided the conceptual foundations for what much of the computing industry now calls the Internet of Things (IoT). It also developed a taxonomy showing the deep relationships between distributed systems, mobile computing, and pervasive computing (IoT). This special issue is a retrospective on Satya's vision. The theme articles explore cyber foraging, energy efficiency, privacy concerns, and the emerging field of pervasive data science.
Article
Many pervasive computing courses don't require a textbook. Instead, a variety of papers are given as assigned reading. Although there are advantages to using papers for reading assignments, there are disadvantages as well. With each course, instructors must curate their own list of important papers, and students don't have the benefit of a well-planned book, which ties together topics systematically. In light of this, Andrew Kun reviews nine books that might be a good match for pervasive computing courses.
Article
Specialized elements of hardware and software, connected by wires, radio waves and infrared, will be so ubiquitous that no one will notice their presence.
Article
Ubiquitous computing began in the Electronics and Imaging Laboratory of the Xerox Palo Alto Research Center. This essay tells the inside story of its evolution from “computer walls” to “calm computing.”
Article
A collection of papers has been gathered in order to explore the pervasive computing trend with a humanistic approach. Is it possible for us to understand what the technological world will be like in the next millennium? These papers will help technologists to share in the successes of others in this field and also to understand problems researchers are having in creating ubiquitous computing environments. Our experiences are conveyed to motivate future work in the area and to help all of us envision and create the future. Because pervasive computing affects many people in any number of disciplines, we took a broad approach when picking topics for this issue. Education, communication, and social implications are among the topics discussed here. Although the means used by the authors to reach for their goals may be different, there are many similarities in their visions of the future.