ubiquitous computing 2 (problems & future)

Upload: arpan47

Post on 04-Apr-2018

221 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/30/2019 Ubiquitous Computing 2 (Problems & Future)

    1/25

    Providing computations andcommunications everywhere !!

    Ubiquitous Computing

    April 2012Presenter : 09BCE035 Arpan Patel

    Guide: Dr. S.N. PradhanNirma University of Technology

  • 7/30/2019 Ubiquitous Computing 2 (Problems & Future)

    2/25

    Flow of Presentation:

    - Issues & Challenges in Ubiquitous Computing(The Problem Space!)Research ThrustsDesign & Implementation Problems

    - Solutions for Certain Problems

    - Various Other Applications

    - The Future of Ubiquitous Computing

    - Conclusion

  • 7/30/2019 Ubiquitous Computing 2 (Problems & Future)

    3/25

  • 7/30/2019 Ubiquitous Computing 2 (Problems & Future)

    4/25

    4

  • 7/30/2019 Ubiquitous Computing 2 (Problems & Future)

    5/25

    5

  • 7/30/2019 Ubiquitous Computing 2 (Problems & Future)

    6/25

    6

  • 7/30/2019 Ubiquitous Computing 2 (Problems & Future)

    7/25

    7

  • 7/30/2019 Ubiquitous Computing 2 (Problems & Future)

    8/25

    8

  • 7/30/2019 Ubiquitous Computing 2 (Problems & Future)

    9/25

    9

  • 7/30/2019 Ubiquitous Computing 2 (Problems & Future)

    10/25

    10

  • 7/30/2019 Ubiquitous Computing 2 (Problems & Future)

    11/25

    11

  • 7/30/2019 Ubiquitous Computing 2 (Problems & Future)

    12/25

    12

  • 7/30/2019 Ubiquitous Computing 2 (Problems & Future)

    13/25

    13

  • 7/30/2019 Ubiquitous Computing 2 (Problems & Future)

    14/25

    14

  • 7/30/2019 Ubiquitous Computing 2 (Problems & Future)

    15/25

    15

  • 7/30/2019 Ubiquitous Computing 2 (Problems & Future)

    16/25

    16

  • 7/30/2019 Ubiquitous Computing 2 (Problems & Future)

    17/25

    17

  • 7/30/2019 Ubiquitous Computing 2 (Problems & Future)

    18/25

    Security and trust issues in ubiquitous environments:

    Security implies protecting corporate resourcesagainst threats and attacks. Security goals includes:

    - Access control- Data confidentiality and integrity- Availability of services- Accountability of actions

    Various solutions that are used includes:- Firewalls- Virtual private network

    18

  • 7/30/2019 Ubiquitous Computing 2 (Problems & Future)

    19/25

    Solutions for Security and Privacy Sandboxing

    - executing code in a restricted and safe environment.

    - restricting access from the code to operating systemfunctionality.- highly effective but at the expense of flexibility.

    Certification- Trusting the code as safe on someone else opinion.- Most often code being signed by a large corporation.

    19

    The Volume of transmitted data should be keptMinimum

    Data that require transmission should be encrypted andsent anonymously (without reference to the owner)

  • 7/30/2019 Ubiquitous Computing 2 (Problems & Future)

    20/25

    Proof Carrying Code (PCC)

    Attaches additional data to a piece of code which can beinterpreted as a proof of a particular property.Verify the proof and check whether or not it is valid.Requires no certification , no restrictions so it strikes effectivebalance bet security &flexibility.

    20

    Direct Code AnalysisDirect analyses of executable code on client machine.

    Removes the need to depend on the external trust oforganizations.Full flexibility and security.

  • 7/30/2019 Ubiquitous Computing 2 (Problems & Future)

    21/25

    Biometrics It is the science of verifying and establishing the identity of an individualthrough physiological features or behavioral traits.Physical Biometrics: Fingerprint, Hand Geometry, Iris patterns

    Behavioral Biometrics: Handwriting, Signature, Speech, GaitChemical/Biological Biometrics: Perspiration, Skin composition(spectroscopy)

    Biometrics offers a promising solution for reliable and uniformidentification and verification of an individual. These traits areunique to an individual and hence cannot be misused, lost orstolen. Biometrics are based on established scientific principles asa basis for authentication.

    Advantages: Uniqueness No need to remember passwords or carry tokens Biometrics cannot be lost, stolen or forgotten Security has to be incorporated in the design stage

    Traditional authentication and access control paradigms cannot scale tonumerous and ubiquitous devices 21

  • 7/30/2019 Ubiquitous Computing 2 (Problems & Future)

    22/25

    Some Possible ApplicationsPervasive Computing involving Hybrid (Regular and

    Sensor Network-based) Internet works for: Natural disaster-specific warning purposes like:

    Tsunami Warning, Forest Fire Warning, VolcanicEruption Warning, Flood-warning etc

    Large-scale monitoring and tracking purposes like:Wildlife monitoring, Baggage / cargo monitoring,Intelligent Transportation Systems, Inter-planetary

    Networks, Intelligent Transportation Systems,Wearable and Vehicular Computing

  • 7/30/2019 Ubiquitous Computing 2 (Problems & Future)

    23/25

    Future of Ubiquitous Computing: Pervasive computing is the next generation computing

    environments with information & communication technology

    everywhere, for everyone, at all times.

    Information and communication technology will be anintegrated part of our environments: from toys, milk cartons

    and desktops to cars, factories and whole city areas - withintegrated processors, sensors, and actuators connected viahigh-speed networks and combined with new visualizationdevices ranging from projections directly into the eye to largepanorama displays.

    Pervasive computing goes beyond the traditional userinterfaces, on the one hand imploding them into smalldevices and appliances, and on the other hand explodingthem onto large scale walls, buildings and furniture.

    23

  • 7/30/2019 Ubiquitous Computing 2 (Problems & Future)

    24/25

    Conclusion

    Today, people's experience of computer technology is, for the mostpart, time-consuming and frustrating. Researchers are looking toaddress the increasing, sometimes overwhelming, complexity thatcomes with digital living and will explore ways to measurablysimplify the digital experience.

    Much research has yet to be done to determine how to simplifytechnology. The challenge grows as devices become more capableand thus more complex. The complexity increases substantially asusers demand that their digital devices work together seamlessly.Researchers are starting to leverage machine learning and new

    networking and data access techniques to address the challenge of making digital living less frustrating and more intuitive.

    24

  • 7/30/2019 Ubiquitous Computing 2 (Problems & Future)

    25/25

    References M. Satyanara yanan , Pervasive Computing: Vision and

    Challenges, http://www.fincher.org/tips/web/Pervasive.shtml

    http://indus.wikia.com/wiki/Main_Page

    http://www.cc .gatech.edu/fce/pubs/icse 99/final.html Mark Weiser. " The world is not a desktop ". Interactions ;

    January 1997; pp. 7 -8. Mark Weiser, " Hot Topics: Ubiquitous Computing " IEEE

    Computer , October 1999.

    Mark Weis er, " Some Computer Science Problems in UbiquitousComputing ," Communications of the ACM, July 1997. (reprintedas "Ubiquitous Computing". Nikkei Electronics ; December 6,1997; pp. 137-143.)

    Mark Weiser, " The Computer for the Twenty-First Century ,"Scientific American, pp. 94-10, September 1991

    25

    http://www.fincher.org/tips/web/Pervasive.shtmlhttp://www.fincher.org/tips/web/Pervasive.shtmlhttp://www.fincher.org/tips/web/Pervasive.shtmlhttp://www.cc.gatech.edu/fce/pubs/icse99/final.htmlhttp://indus.wikia.com/wiki/Main_Pagehttp://www.cc.gatech.edu/fce/pubs/icse99/final.htmlhttp://www.ubiq.com/hypertext/weiser/ACMInteractions2.htmlhttp://www.cc.gatech.edu/fce/pubs/icse99/final.htmlhttp://www.ubiq.com/hypertext/weiser/ACMInteractions2.htmlhttp://www.ubiq.com/hypertext/weiser/UbiCompHotTopics.htmlhttp://www.ubiq.com/hypertext/weiser/UbiCACM.htmlhttp://www.ubiq.com/hypertext/weiser/UbiCACM.htmlhttp://www.ubiq.com/hypertext/weiser/UbiCACM.htmlhttp://www.ubiq.com/hypertext/weiser/SciAmDraft3.htmlhttp://www.ubiq.com/hypertext/weiser/SciAmDraft3.htmlhttp://www.ubiq.com/hypertext/weiser/SciAmDraft3.htmlhttp://www.ubiq.com/hypertext/weiser/SciAmDraft3.htmlhttp://www.ubiq.com/hypertext/weiser/UbiCACM.htmlhttp://www.ubiq.com/hypertext/weiser/UbiCACM.htmlhttp://www.ubiq.com/hypertext/weiser/UbiCompHotTopics.htmlhttp://www.ubiq.com/hypertext/weiser/ACMInteractions2.htmlhttp://www.cc.gatech.edu/fce/pubs/icse99/final.htmlhttp://www.cc.gatech.edu/fce/pubs/icse99/final.htmlhttp://indus.wikia.com/wiki/Main_Pagehttp://indus.wikia.com/wiki/Main_Pagehttp://www.fincher.org/tips/web/Pervasive.shtmlhttp://indus.wikia.com/wiki/Main_Page