scholarly journals Towards ad hoc contextual services for pervasive computing

Author(s):  
Damien Fournier ◽  
Sonia Ben Mokhtar ◽  
Nikolaos Georgantas ◽  
Valérie Issarny
Keyword(s):  
2010 ◽  
Vol 3 (5) ◽  
pp. 359-361
Author(s):  
Isaac Z. Wu ◽  
X.-Y. Li ◽  
M. Song ◽  
C.-M. Liu

Author(s):  
Rui Peng ◽  
Kien A. Hua ◽  
Hao Cheng ◽  
Fei Xie

The rapid increase of sensor networks has brought a revolution in pervasive computing. However, data from these fragmented and heterogeneous sensor networks are easily shared. Existing sensor computing environments are based on the traditional database approach, in which sensors are tightly coupled with specific applications. Such static configurations are effective only in situations where all the participating sources are precisely known to the application developers, and users are aware of the applications. A pervasive computing environment raises more challenges, due to ad hoc user requests and the vast number of available sources, making static integration less effective. This paper presents an Internet framework called iSEE (Internet Sensor Exploration Environment) which provides a more complete environment for pervasive sensor computing. iSEE enables advertising and sharing of sensors and applications on the Internet with unsolicited users much like how Web pages are publicly shared today.


Author(s):  
Sheikh I. Ahamed ◽  
Mohammad Zulkernine ◽  
Munirul M. Haque

Pervasive computing has progressed significantly during this decade due to the developments and advances in portable, low-cost, and light-weight devices along with the emergence of short range and low-power wireless communication networks. Pervasive computing focuses on combining computing and communications with the surrounding physical environment to make computing and communication transparent to the users in day-to-day activities. In pervasive computing, numerous, casually accessible, often invisible, frequently mobile or embedded devices form an ad-hoc network that occasionally connects to fixed networks structure too. These pervasive computing devices often collect information about the surrounding environment using various sensors. Pervasive computing has the inherent disadvantages of slow, expensive connections, frequent line disconnections, limited host bandwidth, location dependent data, and so forth. These challenges make pervasive computing applications more vulnerable to various security-related threats. However, traditional security measures do not fit well in pervasive computing applications. Since location and context are key attributes of pervasive computing applications, privacy issues need to be handled in a sophisticated manner. The devices in a pervasive computing network leave and join in an ad-hoc manner. This device behavior creates a need for new trust models for pervasive computing applications. In this chapter, we address the challenges and requirements of security, privacy, and trust for pervasive applications. We also discuss the state-of-the-art of pervasive security, privacy, and trust along with some open issues.


2003 ◽  
Vol 3 (4) ◽  
pp. 407-410
Author(s):  
Y.-C. Tseng ◽  
J.-P. Sheu ◽  
S. Das ◽  
R.-S. Chang

2015 ◽  
Vol 1 (3) ◽  
pp. 110-118
Author(s):  
Praveen Saini ◽  
Rawat D S ◽  
Dr. Dinesh Kumar Rao ◽  
Javed Alam

Author(s):  
Rui Peng ◽  
Kien A. Hua ◽  
Hao Cheng

The rapid increase of sensor networks has brought a revolution in pervasive computing. However, data from these fragmented and heterogeneous sensor networks are easily shared. Existing sensor computing environments are based on the traditional database approach, in which sensors are tightly coupled with specific applications. Such static configurations are effective only in situations where all the participating sources are precisely known to the application developers, and users are aware of the applications. A pervasive computing environment raises more challenges, due to ad hoc user requests and the vast number of available sources, making static integration less effective. This paper presents an Internet framework called iSEE (Internet Sensor Exploration Environment) which provides a more complete environment for pervasive sensor computing. iSEE enables advertising and sharing of sensors and applications on the Internet with unsolicited users much like how Web pages are publicly shared today.


Author(s):  
Sunita Prasad ◽  
Rakesh Chouhan

Pervasive computing has wide application in military, medical and smart home domain. In pervasive computing, a large number of smart objects interact with one another without the user intervention. Although the technology is promising but security needs to be addressed before the technology is widely deployed. Pervasive networks are formed spontaneously and the devices communicate via radio. Thus, mobile ad hoc networking is an essential technology for pervasive computing. An ad hoc network is a collection of wireless mobile nodes, which acts as a host as well as a router. The communication between the nodes is multihop without any centralized administration. AODV (Ad Hoc On demand Distance Vector) is a prominent on-demand reactive routing protocol for mobile ad hoc networks. But in existing AODV, there is no security provision against well-known attack known as “Black hole attack”. Black hole nodes are those malicious nodes that agree to forward the packets to destination but do not forward the packets intentionally. Thischapter extends the watchdog mechanism for the AODV routing protocol to detect such misbehavior based on promiscuous listening. The proposed method first detects a black hole node and then gives a new route bypassing this node. The experimental results show that in a lightly loaded, hostile environment, the proposed scheme improves the throughput compared to an unprotected AODV protocol.


Sign in / Sign up

Export Citation Format

Share Document