ubiquitous computing presentation 2

25
……Providing computations an communications everywhere ! Ubiquitous Computing April 2012 Presenter : 09BCE035 Arpan Patel Guide: Dr. S.N. Pradhan Nirma University of Technology

Upload: arpan-patel

Post on 17-May-2015

606 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Ubiquitous computing presentation 2

……Providing computations and communications everywhere !!

Ubiquitous Computing

April 2012

Presenter : 09BCE035 Arpan Patel

Guide: Dr. S.N. Pradhan

Nirma University of Technology

Page 2: Ubiquitous computing presentation 2

Flow of Presentation:- Issues & Challenges in Ubiquitous

Computing (The Problem Space!) Research Thrusts Design & Implementation Problems

- Solutions for Certain Problems

- Various Other Applications

- The Future of Ubiquitous Computing

- Conclusion

Page 3: Ubiquitous computing presentation 2
Page 4: Ubiquitous computing presentation 2

4

Page 5: Ubiquitous computing presentation 2

5

Page 6: Ubiquitous computing presentation 2

6

Page 7: Ubiquitous computing presentation 2

7

Page 8: Ubiquitous computing presentation 2

8

Page 9: Ubiquitous computing presentation 2

9

Page 10: Ubiquitous computing presentation 2

10

Page 11: Ubiquitous computing presentation 2

11

Page 12: Ubiquitous computing presentation 2

12

Page 13: Ubiquitous computing presentation 2

13

Page 14: Ubiquitous computing presentation 2

14

Page 15: Ubiquitous computing presentation 2

15

Page 16: Ubiquitous computing presentation 2

16

Page 17: Ubiquitous computing presentation 2

17

Page 18: Ubiquitous computing presentation 2

Security and trust issues in ubiquitous environments:

• Security implies protecting corporate resources against threats and attacks.

• Security goals includes:- Access control- Data confidentiality and integrity- Availability of services- Accountability of actions

• Various solutions that are used includes:- Firewalls- Virtual private network

18

Page 19: Ubiquitous computing presentation 2

Solutions for Security and Privacy

• Sandboxing- executing code in a restricted and safe environment.- restricting access from the code to operating system functionality.- highly effective but at the expense of flexibility.

• Certification- Trusting the code as safe on someone else opinion.- Most often code being signed by a large corporation.

19

• The Volume of transmitted data should be kept Minimum

• Data that require transmission should be encrypted and sent anonymously (without reference to the owner)

Page 20: Ubiquitous computing presentation 2

Proof Carrying Code (PCC)

Attaches additional data to a piece of code which can be interpreted as a proof of a particular property.

Verify the proof and check whether or not it is valid. Requires no certification , no restrictions so it strikes

effective balance bet security &flexibility.

20

Direct Code Analysis Direct analyses of executable code on client machine. Removes the need to depend on the external trust of

organizations. Full flexibility and security.

Page 21: Ubiquitous computing presentation 2

• Biometrics It is the science of verifying and establishing the identity of an individual through physiological features or behavioral traits.Physical Biometrics: Fingerprint, Hand Geometry, Iris patternsBehavioral Biometrics: Handwriting, Signature, Speech, GaitChemical/Biological Biometrics: Perspiration, Skin composition(spectroscopy)

• Biometrics offers a promising solution for reliable and uniform identification and verification of an individual. These traits are unique to an individual and hence cannot be misused, lost or stolen. Biometrics are based on established scientific principles as a basis for authentication.

• Advantages: – Uniqueness– No need to remember passwords or carry tokens– Biometrics cannot be lost, stolen or forgotten– Security has to be incorporated in the design stage– Traditional authentication and access control paradigms cannot scale to

numerous and ubiquitous devices

21

Page 22: Ubiquitous computing presentation 2

Some Possible ApplicationsPervasive Computing involving Hybrid (Regular and Sensor Network-based) Internet works for:• Natural disaster-specific warning purposes like:

Tsunami Warning, Forest Fire Warning, Volcanic Eruption Warning, Flood-warning etc

• Large-scale monitoring and tracking purposes like: Wildlife monitoring, Baggage / cargo monitoring, Intelligent Transportation Systems, Inter-planetary Networks, Intelligent Transportation Systems, Wearable and Vehicular Computing

Page 23: Ubiquitous computing presentation 2

Future of Ubiquitous Computing:• Pervasive computing is the next generation computing

environments with information & communication technology everywhere, for everyone, at all times.

• Information and communication technology will be an integrated part of our environments: from toys, milk cartons and desktops to cars, factories and whole city areas - with integrated processors, sensors, and actuators connected via high-speed networks and combined with new visualization devices ranging from projections directly into the eye to large panorama displays.

• Pervasive computing goes beyond the traditional user interfaces, on the one hand imploding them into small devices and appliances, and on the other hand exploding them onto large scale walls, buildings and furniture.

23

Page 24: Ubiquitous computing presentation 2

Conclusion

• Today, people's experience of computer technology is, for the most part, time-consuming and frustrating. Researchers are looking to address the increasing, sometimes overwhelming, complexity that comes with digital living and will explore ways to measurably simplify the digital experience.

• Much research has yet to be done to determine how to simplify technology. The challenge grows as devices become more capable and thus more complex. The complexity increases substantially as users demand that their digital devices work together seamlessly. Researchers are starting to leverage machine learning and new networking and data access techniques to address the challenge of making digital living less frustrating and more intuitive.

24

Page 25: Ubiquitous computing presentation 2

References• M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,”

http://www.fincher.org/tips/web/Pervasive.shtml

• http://indus.wikia.com/wiki/Main_Page

• http://www.cc.gatech.edu/fce/pubs/icse99/final.html• Mark Weiser. "The world is not a desktop". Interactions; January 1997; pp.

7-8.

• Mark Weiser, "Hot Topics: Ubiquitous Computing" IEEE Computer, October 1999.

• Mark Weiser, "Some Computer Science Problems in Ubiquitous Computing," Communications of the ACM, July 1997. (reprinted as "Ubiquitous Computing". Nikkei Electronics; December 6, 1997; pp. 137-143.)

• Mark Weiser, "The Computer for the Twenty-First Century," Scientific American, pp. 94-10, September 1991

25