170 likes | 290 Views
Ubicomp systems: topics & challenges. New computing model. Heterogeneous devices Interaction: Many-to-many Possibly implicit, invisible, through natural interactions Networking: Wireless Ad-hoc. Example: ABC.
E N D
New computing model • Heterogeneous devices • Interaction: • Many-to-many • Possibly implicit, invisible, through natural interactions • Networking: • Wireless • Ad-hoc
Example: ABC • Bardram, J.E., and Christensen, H.B., 2007, Pervasive computing support for hospitals: An overview of the activity-based computing project. IEEE Pervasive Computing 6(1): 44-51
Ubicomp systems research • Some core challenges: • Resource impoverished devices (resource-aware computing) • Execution environments: • Volatile • Heterogeneous • Fluctuating • Invisible computing • Security and privacy
Resource impoverished devices • Energy: • Consumption • Foraging
Reducing consumption • Example: • FSI current wave meter: • Sleep/wake • f[Hz]↓
Power for wireless comm • Example: in-network processing
Foraging • Power • Cyber
Volatile execution environments • Volatility: • Devices come and go • Communication structure changes • Service discovery
Heterogeneous execution environments • Ubicomp application: may span several devices • Patchwork of technologies: • Bell, G., Dourish, P., 2006, Yesterday’s tomorrows: notes on ubiquitous computing’s dominant vision. Personal Ubiquitous Computing • Better in the future? • Is messiness the norm? • Heterogeneous hardware – fundamental!
Fluctuating execution environments • PC: static • Ubicomp devices: • Multiple devices • Mobile • Distributed applications
Fluctuating execution environments • Research focus areas: • Context-aware computing: • User, others present, temperature, light, etc… • UCF Chapter 8 • Location (location-based computing) • A type of context! • UCF Chapter 7 • LoCA: http://loca2009.context-aware.org/ • Integration • ABC • Project54
Integration • Example: Project54 • Kun, A.L., Miller, W.T., Lenharth, W. H., 2004, Computers in Police Cruisers. IEEE Pervasive Computing 3(4): 34-41
Invisible computing • Computers for Weiser’s Sal: • Physically invisible – hidden • Mentally invisible – not centers of attention • How to handle errors, notifications, upgrades? • Some ideas in Friday A. et al., 2005, Guidelines and open issues in systems support for Ubicomp: reflections on UbiSys 2003 and 2004. Personal Ubiquitous Computing
Security and privacy • Security = confidentiality, integrity, authenticity of information • Privacy = ability to reveal oneself selectively • UCF Chapter 3
Security and privacy - issues • Trust • Assumptions from conventional protocols • Security based on location and context • Privacy challenges • E.g. sensors • Security challenges