Search results

1 – 10 of over 2000
Article
Publication date: 20 December 2007

Ricky Robinson, Jadwiga Indulska and Ted McFadden

The purpose of this paper is to characterise a number of current and future computing environments and summarises their resource discovery requirements. It then seeks to analyse…

Abstract

Purpose

The purpose of this paper is to characterise a number of current and future computing environments and summarises their resource discovery requirements. It then seeks to analyse, with respect to the requirements of each environment, several established service discovery protocols and some newer protocols that are still in the research domain. In addition, the key features of a new resource discovery protocol that has been developed to operate with heterogeneous computing environments are described.

Design/methodology/approach

A comprehensive literature survey was undertaken, highlighting the shortcomings of existing resource discovery protocols with respect to large pervasive computing environments. Given the identified gaps in existing protocols, an alternative protocol is suggested.

Findings

The main findings of this paper relate to the identified shortcomings of existing resource discovery protocols. It was also found that a hybrid resource discovery protocol capable of spanning dynamic, mobile computing environments and more stable ones was able to overcome many of the challenges presented by large‐scale pervasive computing environments.

Originality/value

This paper presents comprehensive literature survey of the state‐of‐the‐art in resource discovery protocols, pointing out some of the problems that are not solved. The paper describes the design of an alternative protocol, and presents an evaluation of it. The pervasive computing research community can draw upon the survey and evaluation to guide the design of future resource discovery protocols for the increasingly dynamic world in which we live.

Details

International Journal of Pervasive Computing and Communications, vol. 3 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 7 September 2010

Jun Li, Yingyi Bu, Shaxun Chen, Xianping Tao and Jian Lu

Pervasive computing enhances the environment by embedding many computers that are gracefully integrated with human users. The purpose of this paper is to describe the creation of…

Abstract

Purpose

Pervasive computing enhances the environment by embedding many computers that are gracefully integrated with human users. The purpose of this paper is to describe the creation of a smart context‐aware environment in which computation follows people and serves them everywhere. Building such smart environments is still difficult and complex due to lacking a uniform infrastructure that can adapt to diverse smart domains.

Design/methodology/approach

To address this problem, the paper proposes an agent‐based pluggable infrastructure which integrates a mobile agent system named pvMogent, establishes an ontology‐based context model and introduces a workflow‐based application model with the open services gateway initiative (OSGi) framework. By plugging corresponding domain context in ontology model and different applications, the infrastructure can be customized to various domains.

Findings

Through the implementation of several context‐aware applications, it was found that the infrastructure can largely reduce the development complexity as well as keep the domain extensibility by plugging corresponding domain context in ontology model.

Originality/value

In this paper, a number of key techniques are explored which are suitable for building context‐awareness. The experiences and lessons learned from the system development could further facilitate and inspire the research in this direction.

Details

International Journal of Pervasive Computing and Communications, vol. 6 no. 3
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 November 2005

Giuseppe Anastasi, Marco Conti, Enrico Gregori, Andrea Passarella and Luciana Pelusi

Pervasive services and smart environments are becoming more and more popular as an ever‐increasing number of people enjoys these services typically by means of portable devices…

Abstract

Pervasive services and smart environments are becoming more and more popular as an ever‐increasing number of people enjoys these services typically by means of portable devices. These devices are battery‐fed and, thus, energy efficiency is a critical factor for the deployment of pervasive services. In this paper we focus on multimedia streaming services for mobile users. Specifically, we consider a scenario where mobile users with Wi‐Fi devices access the Internet to receive audio files from a remote streaming server. We propose a proxybased architecture and an energy‐efficient streaming protocol that minimize the energy consumption of the Wi‐Fi interface at the mobile device, while guaranteeing the real‐time constraints of the audio streaming. The experimental analysis performed on a prototype implementation shows that our solution allows an energy saving ranging from 76% to 91% of the total consumption due to the network interface. Moreover, it also preserves a good user‐level Quality of Service.

Details

International Journal of Pervasive Computing and Communications, vol. 1 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 25 November 2013

Alberto Rosi, Marco Mamei and Franco Zambonelli

The key purpose of this paper is to overview the many issues related to the integration of social sensing and pervasive sensing in the support of adaptive context-aware services…

Abstract

Purpose

The key purpose of this paper is to overview the many issues related to the integration of social sensing and pervasive sensing in the support of adaptive context-aware services.

Design/methodology/approach

From the analysis of existing proposals and prototypes, the authors found out that the process of integrating social and pervasive sensing can follow a limited number of approaches, which enables the authors to properly frame the proposals existing in the literature (and/or available as prototype infrastructures) according to a simple taxonomy, which is very useful to make the survey much more effective than a simple list of systems and proposals.

Findings

The taxonomy shows that, when integrating social sensing with pervasive sensing, it is possible, at one extreme, to exploit social network as a mere source of information and have such information flow towards the infrastructure supporting the execution of pervasive computing services. At the other extreme, it is possible exploiting a social network as an infrastructure for the integration, by having data from pervasive devices flow towards social networks. In between the extremes, different means can consider to have social networks and pervasive infrastructures converge towards each other to enable the integration of social and pervasive sensing.

Originality/value

Besides introducing the main concepts related to social sensing and framing the key approaches that can be undertaken to pursue the integration with traditional pervasive sensing, the authors go further discussing open issues and key research challenges behind their seamless integration.

Details

International Journal of Pervasive Computing and Communications, vol. 9 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 31 December 2006

Juan Ignacio Vazquez, Diego López de Ipiña and Iñigo Sedano

Despite several efforts during the last years, the web model and semantic web technologies have not yet been successfully applied to empower Ubiquitous Computing architectures in…

Abstract

Despite several efforts during the last years, the web model and semantic web technologies have not yet been successfully applied to empower Ubiquitous Computing architectures in order to create knowledge‐rich environments populated by interconnected smart devices. In this paper we point out some problems of these previous initiatives and introduce SoaM (Smart Objects Awareness and Adaptation Model), an architecture for designing and seamlessly deploying web‐powered context‐aware semantic gadgets. Implementation and evaluation details of SoaM are also provided in order to identify future research challenges.

Details

International Journal of Web Information Systems, vol. 2 no. 3/4
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 1 June 2004

Carsten Sørensen and David Gibson

It is essential for professionals to have flexible access to information sources and interaction with clients and colleagues. Mobile phones, e‐mail, pagers, laptops, and PCs all…

1649

Abstract

It is essential for professionals to have flexible access to information sources and interaction with clients and colleagues. Mobile phones, e‐mail, pagers, laptops, and PCs all aim to facilitate the flexibility necessary for conducting their work. Ideally, professionals with intense demands on their time should not be supported by various information and interaction technologies, they should embed core domesticated technologies. This paper examines how the vision of iniquitous ICT support for professional work meets the harsh realities through interviews with 16 individual professionals from 16 different organisations. The paper aims to answer the question of the applicability and reality of ubiquitous computing in today's work environment and where technology is in terms of limitations for the professional. The study demonstrates that the joint life of professionals and their technologies is not one best characterised by the technical and the social merging seamlessly. It is instead one burdened by constant attention.

Details

info, vol. 6 no. 3
Type: Research Article
ISSN: 1463-6697

Keywords

Article
Publication date: 6 June 2016

Ema Kusen and Mark Strembeck

Ever since Mark Weiser coined the term “ubiquitous computing” (ubicomp) in 1988, there has been a general interest in proposing various solutions that would support his vision…

Abstract

Purpose

Ever since Mark Weiser coined the term “ubiquitous computing” (ubicomp) in 1988, there has been a general interest in proposing various solutions that would support his vision. However, attacks targeting devices and services of a ubicomp environment have demonstrated not only different privacy issues, but also a risk of endangering user’s life (e.g. by modifying medical sensor readings). Thus, the aim of this paper is to provide a comprehensive overview of security challenges of ubicomp environments and the corresponding countermeasures proposed over the past decade.

Design/methodology/approach

The results of this paper are based on a literature review method originally used in evidence-based medicine called systematic literature review (SLR), which identifies, filters, classifies and summarizes the findings.

Findings

Starting from the bibliometric results that clearly show an increasing interest in the topic of ubicomp security worldwide, the findings reveal specific types of attacks and vulnerabilities that have motivated the research over the past decade. This review describes most commonly proposed countermeasures – context-aware access control and authentication mechanisms, cryptographic protocols that account for device’s resource constraints, privacy-preserving mechanisms, and trust mechanisms for wireless ad hoc and sensor networks.

Originality/value

To the best of our knowledge, this is the first SLR on security challenges in ubicomp. The findings should serve as a reference to an extensive list of scientific contributions, as well as a guiding point for the researchers’ novel to the security research in ubicomp.

Details

International Journal of Pervasive Computing and Communications, vol. 12 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 9 August 2021

Gnaneshwari G.R., M.S. Hema and S.C. Lingareddy

Pervasive computing environment allows the users to access the services anywhere and anytime. Due to the dynamicity, mobility, security, heterogeneity, and openness have become a…

Abstract

Purpose

Pervasive computing environment allows the users to access the services anywhere and anytime. Due to the dynamicity, mobility, security, heterogeneity, and openness have become a major challenging task in the Pervasive computing environment. To solve the security issues and to increase the communication reliability, an authentication-based access control approach is developed in this research to ensure the level of security in the Pervasive computing environment.

Design/methodology/approach

This paper aims to propose authentication-based access control approach performs the authentication mechanism using the hashing, encryption, and decryption function. The proposed approach effectively achieves the conditional traceability of user credentials to enhance security. Moreover, the performance of the proposed authentication-based access control approach is estimated using the experimental analysis, and performance improvement is proved using the evaluation metrics. It inherent the tradeoff between authentication and access control in the Pervasive computing environment. Here, the service provider requires authorization and authentication for the provision of service, whereas the end-users require unlinkability and untraceability for data transactions.

Findings

The proposed authentication-based access control obtained 0.76, 22.836 GB, and 3.35 sec for detection rate, memory, and time by considering password attack, and 22.772GB and 4.51 sec for memory and time by considering without attack scenario.

Originality/value

The communication between the user and the service provider is progressed using the user public key in such a way that the private key of the user can be generated through the encryption function.

Details

International Journal of Pervasive Computing and Communications, vol. 19 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 6 September 2011

Franco Zambonelli and Mirko Viroli

Emerging pervasive computing scenarios require open service frameworks promoting situated and self‐adaptive behaviors, and supporting diversity in services and long‐term…

Abstract

Purpose

Emerging pervasive computing scenarios require open service frameworks promoting situated and self‐adaptive behaviors, and supporting diversity in services and long‐term evolvability. This suggests adopting a nature‐inspired approach, where pervasive services are modeled and deployed as autonomous individuals in an ecosystem of other services, data sources, and pervasive devices. However, there are many possibly nature‐inspired metaphors that can be adopted, and choosing one may require a careful analysis of the pros and cons of the different metaphors. The purpose of this paper is to analyze the key requirements and desiderata for next generation pervasive computing services and associated infrastructures.

Design/methodology/approach

In this paper, the authors introduce and critically analyze a number of natural metaphors that can be adopted to realize these concepts and survey relevant proposals in the area.

Findings

The key result of this survey is that a uniform reference architecture can be a useful guide when framing the challenges involved in the design and implementation of future self‐adaptive pervasive service ecosystems.

Originality/value

The survey in this paper, along with the proposed reference architecture, can be effective starting points towards the definition and implementation of general‐purpose nature‐inspired pervasive service ecosystems.

Details

International Journal of Pervasive Computing and Communications, vol. 7 no. 3
Type: Research Article
ISSN: 1742-7371

Keywords

Open Access
Article
Publication date: 25 September 2018

Ruwini Edirisinghe

The future construction site will be pervasive, context aware and embedded with intelligence. The purpose of this paper is to explore and define the concept of the digital skin of…

23287

Abstract

Purpose

The future construction site will be pervasive, context aware and embedded with intelligence. The purpose of this paper is to explore and define the concept of the digital skin of the future smart construction site.

Design/methodology/approach

The paper provides a systematic and hierarchical classification of 114 articles from both industry and academia on the digital skin concept and evaluates them. The hierarchical classification is based on application areas relevant to construction, such as augmented reality, building information model-based visualisation, labour tracking, supply chain tracking, safety management, mobile equipment tracking and schedule and progress monitoring. Evaluations of the research papers were conducted based on three pillars: validation of technological feasibility, onsite application and user acceptance testing.

Findings

Technologies learned about in the literature review enabled the envisaging of the pervasive construction site of the future. The paper presents scenarios for the future context-aware construction site, including the construction worker, construction procurement management and future real-time safety management systems.

Originality/value

Based on the gaps identified by the review in the body of knowledge and on a broader analysis of technology diffusion, the paper highlights the research challenges to be overcome in the advent of digital skin. The paper recommends that researchers follow a coherent process for smart technology design, development and implementation in order to achieve this vision for the construction industry.

Details

Engineering, Construction and Architectural Management, vol. 26 no. 2
Type: Research Article
ISSN: 0969-9988

Keywords

1 – 10 of over 2000