84,99 €
This book presents state-of-the-art research on architectures, algorithms, protocols and applications in pervasive computing and networks
With the widespread availability of wireless and mobile networking technologies and the expected convergence of ubiquitous computing with these emerging technologies in the near future, pervasive computing and networking research and applications are among the hot topics on the agenda of researchers working on the next generation of mobile communications and networks.
This book provides a comprehensive guide to selected topics, both ongoing and emerging, in pervasive computing and networking. It contains contributions from high profile researchers and is edited by leading experts in this field. The main topics covered in the book include pervasive computing and systems, pervasive networking security, and pervasive networking and communication.
Key Features:
Pervasive Computing and Networking will be an ideal reference for practitioners and researchers working in the areas of communication networking and pervasive computing and networking. It also serves as an excellent textbook for graduate and senior undergraduate courses in computer science, computer engineering, electrical engineering, software engineering, and information engineering and science.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 874
Veröffentlichungsjahr: 2011
Contents
Cover
Title Page
Copyright
Dedication
List of Contributors
About the Editors
Part One: Pervasive Computing and Systems
Chapter 1: Introduction
1.1 Pervasive Computing and Its Significance
1.2 Research Trends in Pervasive Computing and Networking
1.3 Scanning the Book
1.4 Target Audience
1.5 Supplementary Resources
1.6 Acknowledgments
Chapter 2: Tools and Techniques for Dynamic Reconfiguration and Interoperability of Pervasive Systems
2.1 Introduction
2.2 Mobile Agent Technology
2.3 Sensor Networks
2.4 Collaboration and Interoperability Among Sensor Networks
2.5 Applications
2.6 Conclusion
Chapter 3: Models for Service and Resource Discovery in Pervasive Computing
3.1 Introduction
3.2 Service Oriented Architecture
3.3 Industry and Consortia Supported Models for Service Discovery
3.4 Research Initiatives In Service Discovery For Pervasive Systems
3.5 Conclusions
Chapter 4: Pervasive Learning Tools and Technologies
4.1 Introduction
4.2 Pervasive Learning: A Promising Innovative Paradigm
4.3 Emerging Technologies and Systems for Pervasive Learning
4.4 Integration of Real-World Practice and Experience with Pervasive Learning
4.5 Nature of Pervasive Learning and Provision of Well-Being in Education
4.6 Conclusion
Chapter 5: Service Management in Pervasive Computing Environments
5.1 Introduction
5.2 Service Management in Pervasive Computing Environments
5.3 Techniques for Service Management in PvCE
5.4 Service Composition
5.5 Conclusions
Chapter 6: Wireless Sensor Cooperation for a Sustainable Quality of Information
6.1 Introduction
6.2 Sensing the Real World
6.3 Inter-Sensor Cooperation
6.4 Mobile Sensor Cooperation
6.5 Cooperation Across Mobile Entities
6.6 Inter-WSN Cooperation
6.7 Conclusions and Future Research Directions
Chapter 7: An Opportunistic Pervasive Networking Paradigm: Multi-Hop Cognitive Radio Networks
7.1 Introduction
7.2 Overview of Multi-Hop Cognitive Radio Networks MAC Layer
7.3 Proposed Mac Layer Protocols
7.4 Open Issues
7.5 Conclusions
Chapter 8: Wearable Computing and Sensor Systems for Healthcare
8.1 Introduction
8.2 The Health Body Area Network
8.3 Medical and Technological Requirements of Health Sensors
8.4 Wearable Sensors for Vital Signals Monitoring
8.5 Wearable Sensors for Activity Recognition
8.6 Sensors and Signals for Emotion Recognition
8.7 Intra-BAN Communications in Pervasive Healthcare Systems: Standards and Protocols
8.8 Conclusions
Chapter 9: Standards and Implementation of Pervasive Computing Applications
9.1 Introduction
9.2 Wireless Technologies and Standards
9.3 Middleware
9.4 Case Studies
Part Two: Pervasive Networking Security
Chapter 10: Security and Privacy in Pervasive Networks
10.1 Introduction
10.2 Security Classics
10.3 Hardening Pervasive Networks
10.4 Privacy in Pervasive Networks
10.5 Conclusions
Chapter 11: Understanding Wormhole Attacks in Pervasive Networks
11.1 Introduction
11.2 A Wormhole Attack
11.3 Severity of a Wormhole Attack
11.4 Background
11.5 Classification of Wormholes
11.6 Wormhole Attack Modes
11.7 Mitigating Wormhole Attacks
11.8 Discussion of Some Mitigating Solutions to Avoid Wormhole Attacks
11.9 Conclusion and Future Work
Chapter 12: An Experimental Comparison of Collaborative Defense Strategies for Network Security
12.1 Introduction
12.2 Background
12.3 Small-World Network Based Modeling Platform
12.4 Internet Worm Attack and Defense
12.5 Experiments and Performance Evaluation
12.6 Conclusions
Chapter 13: Smart Devices, Systems and Intelligent Environments
13.1 Introduction
13.2 Smart Devices and Systems
13.3 Intelligent Environments
13.4 Trends
13.5 Limitations and Challenges
13.6 Applications and Case Studies
13.7 Conclusion
Part Three: Pervasive Networking and Communications
Chapter 14: Autonomic and Pervasive Networking
14.1 Introduction
14.2 Ubiquitous/Pervasive Networks
14.3 Applying Autonomic Techniques to Ubiquitous/Pervasive Networks
14.4 Self-* (star) In Autonomic and Pervasive Networks
14.5 Autonomic and Pervasive Networking Challenges
14.6 Conclusions and Future Directions
Chapter 15: An Adaptive Architecture of Service Component for Pervasive Computing
15.1 Introduction
15.2 Motivation
15.3 An Overview of the Delaying Adaptation Tool
15.4 Case Study
15.5 Related Work
15.6 Conclusions
Chapter 16: On Probabilistic k-Coverage in Pervasive Wireless Sensor Networks
16.1 Introduction
16.2 The Coverage Problem
16.3 Coverage Configuration Problem
16.4 Stochastic k-Coverage Protocol
16.5 Conclusion
Chapter 17: On the Usage of Overlays to Provide QoS Over IEEE 802.11b/g/e Pervasive and Mobile Networks
17.1 Introduction
17.2 A Glance at P2P Overlay Networks and QoS Mechanisms
17.3 Design of Overlays to Support QoS
17.4 Performance Evaluation
17.5 Conclusions and Future Developments
Appendix I. The Distributed Algorithm for Bandwidth Management
Chapter 18: Performance Evaluation of Pervasive Networks Based on WiMAX Networks
18.1 Introduction
18.2 IEEE 802.16 Architecture and QoS Requirements
18.3 Related Work
18.4 Proposed QoS Framework
18.5 Simulation Experiments and Numerical Results
18.6 Summary
Chapter 19: Implementation Frameworks for Mobile and Pervasive Networks
19.1 Introduction
19.2 Correlating Design to Implementations
19.3 Challenges for Implementation Frameworks
19.4 State of the Art in Implementation Frameworks
19.5 Current Frameworks Research for Network Protocols and Applications
19.6 Evaluating Frameworks and Implementations
19.7 Conclusion
Index
This edition first published 2011 © 2011 John Wiley & Sons, Ltd
Registered office John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, United Kingdom
For details of our global editorial offices, for customer services and for information about how to apply for permission to reuse the copyright material in this book please see our website at www.wiley.com.
The right of the author to be identified as the author of this work has been asserted in accordance with the Copyright, Designs and Patents Act 1988.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by the UK Copyright, Designs and Patents Act 1988, without the prior permission of the publisher.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books.
Designations used by companies to distinguish their products are often claimed as trademarks. All brand names and product names used in this book are trade names, service marks, trademarks or registered trademarks of their respective owners. The publisher is not associated with any product or vendor mentioned in this book. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold on the understanding that the publisher is not engaged in rendering professional services. If professional advice or other expert assistance is required, the services of a competent professional should be sought.
Library of Congress Cataloging-in-Publication Data
Pervasive computing and networking / Mohammad S. Obaidat, Mieso Denko, Isaac Woungang (eds.). p. cm. Includes bibliographical references and index. ISBN 978-0-470-74772-8 (cloth) 1. Ubiquitous computing. 2. Computer networks. 3. Mobile computing. I. Obaidat, Mohammad S. (Mohammad Salameh), 1952– II. Denko, Mieso K. III. Woungang, Isaac. QA76.5915.P4553 2011 004.165–dc22 2011002202
A catalogue record for this book is available from the British Library.
Print ISBN: 9780470747728 (H/B) ePDF ISBN: 9781119970439 oBook ISBN: 9781119970422 ePub ISBN: 9781119971429 eMobi ISBN: 9781119971436
This book is dedicated to our Dear friend and colleague, late Dr. Mieso Denko, with whom we started this book project. He was an extremely active researcher in the area of wireless pervasive networking and communications. We will never forget him.
List of Contributors
Fatih Alagoz Dept. of Computer Engineering Boaziçi University P.K. 2 TR-34342 Bebek, Istanbul, [email protected]
Azad Ali Dept. of Computer Science and Engineering Technische Universität Darmstadt Hochschulstr 10, 64289 Darmstadt, [email protected]
Habib M. Ammari Dept. of Computer Science Hofstra University 211 Adams Hall, Hofstra University, Hempstead NY 11549, [email protected]
Irfan Awan Informatics Research Institute University of Bradford Richmond Road, Bradford, West Yorkshire, BD7 1DP, Bradford, U.K.; Computer Science, KSU Soudi [email protected]
Brahim Ayari Dept. of Computer Science and Engineering Technische Universität Darmstadt Hochschulstr 10, 64289 Darmstadt, [email protected]
T. M. Burkow Norwegian Centre for Integrated Care and Telemedicine P.O. Box 6060 N-9038 Tromsø, [email protected]
Jiannong Cao Dept. of Computing Hong Kong Polytechnic University PQ806, Mong Man Wai Building, Hong [email protected]
Daniel Cascado Robotics and Computer Technology Laboratory University of Sevilla Av. Reina Mercedes, s/n. 41012, Sevilla, [email protected]
Luca Caviglione Institute of Intelligent Systems for Automation Via Giovanni Amendola, 122/D-I - 70126 Bari BA Puglia, Genova, [email protected]
Hao Chen Dept. of Electrical and Computer Engineering State University New York (SUNY) State University Plaza, 353 Broadway, Albany, New York [email protected]
Yu Chen Dept. of Electrical and Computer Engineering State University New York (SUNY) State University Plaza, 353 Broadway, Albany, New York [email protected]
Marco Conti Institute of Informatics and Telematics Aula 40 – “Franco Denoth” Via G. Moruzzi 1 Pisa, Pisa 56124, [email protected]
Franco Davoli Dept. of Communications Computer and Systems Science (DIST) University of Genova Via all'Opera Pia 13 16145, Genova [email protected])
Franca Delmastro Institute of Informatics and Telematics (CNR) Aula 40 - “Franco Denoth” Via G. Moruzzi 1 Pisa, Pisa 56124, [email protected]
Mieso Denko Dept. of Computing and Information Science University of Guelph 50 Stone Rd. East, Guelph, ON., N1G 2W1, [email protected]
Sanjay Kumar Dhurandher University of Delhi, Netaji Subas Institute of Technology Azad Hing Fauj Marg Sector–3, Dwarka (Pappankalan) New Delhi - 110078, [email protected]
Joaquin Entrialgo Dept. of Computer Science and Engineering University of Oviedo Edificio departamental 1, Campus de Viesques s/n 33204, Gijón, [email protected]
Jason B. Ernst Dept. of Computing and Information Science University of Guelph 50 Stone Rd. East, Guelph, ON., N1G 2W1 , [email protected]
Luis Fernández-Luque Northern Research Institute Postboks 6434 Forskningsparken, 9294 Tromsø, [email protected]
Didem Gözüpek Dept. of Computer Engineering Boaziçi University P.K. 2 TR-34342 Bebek, Istanbul, [email protected]
Tarik Guelzim Dept. of Computer Science and Software Engineering Monmouth University West Long Branch, NJ 07764, [email protected]
Abhishek Gupta University of Delhi, Netaji Subas Institute of Technology Azad Hing Fauj Marg Sector–3, Dwarka (Pappankalan) New Delhi - 110078, [email protected]
Jarmo Harju Institute of Communications Engineering Tampere University of Technology P.O. Box 553, FI-33101, Tampere, [email protected]
Yanxiang He School of Computer Science Wuhan University Wuhan, Hubei 430072, [email protected])
Ali R. Hurson Dept. of Computer Science Missouri University of Science and Technology 1870 Miner Circle, Rolla, MO 65409, [email protected]
Evens Jean Dept. of Computer Science and Engineering Pennsylvania State University University Park, PA 16802, [email protected]
Qun Jin Dept. of Human Informatics and Cognitive Sciences Waseda University 2-579-15 Mikajima, Tokorozawa-shi, Saitama 359-1192, [email protected]
Karl Johan-Grøttum Northern Research Institute Postboks 6434 Forskningsparken, 9294 Tromsø, [email protected]
Carlos Juiz Dept. of Mathematics and Computer Science University of the Balearic Islands 07122 Palma de Mallorca, Illes Balears, [email protected]
Farouk Kamoun National School of Computer Science La Manouba University Postal Code 2010, [email protected]
Abdelmajid Khelil Dept. of Computer Science and Engineering Technische Universität Darmstadt Hochschulstr 10, 64289 Darmstadt, [email protected]
Medhi Khouja Dept. of Mathematics and Computer Science University of the Balearic Islands 07122 Palma de Mallorca, Illes Balears, [email protected]
Elmabruk Laias Informatics Research Institute University of Bradford Richmond Road, Bradford, West Yorkshire, BD7 1DP, Bradford, [email protected]
Fei Li School of Computer Science Wuhan University Wuhan, Hubei 430072, [email protected]
Piergiulio Maryni Datasiel S.p.A. Via Angelo Scarsellini 16149, Genova, [email protected]
Thabo K. R. Nkwe Dept. of Computing and Information Science University of Guelph 50 Stone Rd. East, Guelph, ON., N1G 2W1 , [email protected]
Mohammad S. Obaidat Dept. of Computer Science and Software Engineering Monmouth University West Long Branch, NJ 07764, [email protected]
Hiroaki Ogata Dept. of Information Science and Intelligent Systems Tokushima Universityy Minamijosanjima, Tokushima 770-8506, [email protected]
Ramon Puigjaner Dept. of Mathematics and Computer Science University of the Balearic Islands 07122 Palma de Mallorca, Illes Balears, [email protected]
Vaskar Raychoudhury Dept. of Computing Hong Kong Polytechnic University PQ806, Mong Man Wai Building, Hong [email protected]
Christian Reinl Dept. of Computer Science and Engineering Technische Universität Darmstadt Hochschulstr 10, 64289 Darmstadt, [email protected]
Sahra Sedigh Dept. of Electrical and Computer Engineering Missouri University of Science and Technology 1870 Miner Circle, Rolla, MO 65409, [email protected]
Jose Luis Sevillano Robotics and Computer Technology Laboratory University of Sevilla Av. Reina Mercedes, s/n. 41012, Sevilla, [email protected]
Faisal Karim Shaikh Dept. of Computer Science and Engineering Technische Universität Darmstadt Hochschulstr 10,?64289 Darmstadt, [email protected]
Timothy K. Shih Dept. of Computer Science and Information Engineering National Central University No.300, Jung-da Rd,, Chung-li, Taoyuan, Taiwan, [email protected]
Behrooz A. Shirazi School of Electrical Engineering and Computer Science Washington State University Pullman, WA 99164-2752, [email protected]
Joaquin Siebert Dept. of Computing Hong Kong Polytechnic University PQ806, Mong Man Wai Building, Hong [email protected]
Bilhanan Silverajan Institute of Communications Engineering Tampere University of Technology P.O. Box 553, FI-33101, Tampere, [email protected]
Neeraj Suri Dept. of Computer Science and Engineering Technische Universität Darmstadt Hochschulstr 10, 64289 Darmstadt, [email protected]
Piotr Szczytowski Dept. of Computer Science and Engineering Technische Universität Darmstadt Hochschulstr 10, 64289 Darmstadt, [email protected]
Athanasios V. Vasilakos Dept. of Computer and Telecommunications Engineering University of Western Macedonia 2 Eleftherioy Venizeloy street, Kozani, GR 50100, [email protected]
L. Kristian Vognild Northern Research Institute Postboks 6434 Forskningsparken, 9294 Tromsø, Norway [email protected]
Isaac Woungang Dept. of Computer Science Ryerson University 350 Victoria Street, Toronto, ON., M5B 2K3, [email protected]
Naixue Xiong Dept. of Computer Science Georgia State University P.O. Box 3994, Atlanta, GA [email protected]
Y. Yano Dept. of Information Science and Intelligent Systems Tokushima University Minamijosanjima, Tokushima 770-8506, [email protected]
Neil Y. Yen Dept. of Human Informatics and Cognitive Sciences Waseda University 2-579-15 Mikajima, Tokorozawa-shi, Saitama 359-1192, [email protected]
About the Editors
Professor Mohammad S. Obaidat is an internationally known academic/researcher/scientist. He received his Ph.D and M.S. degrees in Computer Engineering with a minor in Computer Science from The Ohio State University, Columbus, Ohio, USA. He is currently a full Professor of Computer Science at Monmouth University, NJ, USA. Among his previous positions are Chair of the Department of Computer Science and Director of the Graduate Program at Monmouth University and a faculty member at the City University of New York. He has received extensive research funding and has published numerous books and numerous refereed technical articles in scholarly international journals and proceedings of international conferences, and is currently working on three more books.
Professor Obaidat has served as a consultant for several corporations and organizations worldwide. He is the Editor-in-Chief of the International Journal of Communication Systems published by John Wiley & Sons Ltd, and Editor-in-Chief of the FTRA Journal of Convergence. He served as Editor of IEEE Wireless Communications from 2007–2010. Between 1991–2006, he served as a Technical Editor and an Area Editor of Simulation: Transactions of the Society for Modeling and Simulations (SCS) International, TSCS. He also served on the Editorial Advisory Board of Simulation. He is now an editor of the Wiley Security and Communication Networks Journal, Journal of Networks, International Journal of Information Technology, Communications and Convergence, IJITCC, Inderscience. He served on the International Advisory Board of the International Journal of Wireless Networks and Broadband Technologies, IGI-global. Professor Obaidat is an associate editor/editorial board member of seven other refereed scholarly journals including two IEEE Transactions, Elsevier Computer Communications Journal, Kluwer Journal of Supercomputing, SCS Journal of Defense Modeling and Simulation, Elsevier Journal of Computers and EE, International Journal of Communication Networks and Distributed Systems, The Academy Journal of Communications, International Journal of BioSciences and Technology and International Journal of Information Technology. He has guest edited numerous special issues of scholarly journals such as IEEE Transactions on Systems, Man and Cybernetics, SMC, IEEE Wireless Communications, IEEE Systems Journal, SIMULATION: Transactions of SCS, Elsevier Computer Communications Journal, Journal of C & EE, Wiley Security and Communication Networks, Journal of Networks, and International Journal of Communication Systems, among others. Professor Obaidat has served as the steering committee chair, advisory Committee Chair and program chair of numerous international conferences including the IEEE Int’l Conference on Electronics, Circuits and Systems, IEEE International Phoenix Conference on Computers and Communications, IEEE Int’l Performance, Computing and Communications Conference, IEEE International Conference on Computer Communications and Networks, SCS Summer Computer Simulation Conference, SCSC’97, SCSC98-SCSC2005, SCSC2006, the International Symposium on Performance Evaluation of Computer and Telecommunication Systems since its inception in 1998, International Conference on Parallel Processing, Honorary General Chair of the 2006 IEEE Intl. Joint Conference on E-Business and Telecommunications, ICETE2006. Professor Obaidat served as General Co-Chair of ICETE 2007-ICETE 2010. He has served as the Program Chair of the International Conference on Wireless Information Networks and Systems from 2008-present.
Professor Obaidat is the co-founder and Program Co-Chair of the International Conference on Data Communication Networking, DCNET since its inception in 2009. Professor Obaidat has served as the General Chair of the 2007 IEEE International Conference on Computer Systems and Applications, AICCSA2007, the IEEE AICCSA 2009 Conference and the 2006 International Symposium on Adhoc and Ubiquitous Computing (ISAHUC’06). He is the founder of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, SPECTS and has served as the General Chair of SPECTS since its inception. Obaidat has received a recognition certificate from IEEE. From 1994–1997, Professor Obaidat served as a distinguished speaker/visitor of IEEE Computer Society. Since 1995 he has been serving as an ACM Distinguished Lecturer. He is also an SCS distinguished Lecturer. From 1996–1999, Professor Obaidat served as an IEEE/ACM program evaluator of the Computing Sciences Accreditation Board/Commission, CSAB/CSAC. Professor Obaidat is the founder and first Chairman of SCS Technical Chapter (Committee) on PECTS (Performance Evaluation of Computer and Telecommunication Systems). He has served as the Scientific Advisor for the World Bank/UN Digital Inclusion Workshop – The Role of Information and Communication Technology in Development. From 1995–2002, he served as a member of the board of directors of the Society for Computer Simulation International. From 2002–2004, he served as Vice President of Conferences of the Society for Modeling and Simulation International SCS. From 2004–2006, Professor Obaidat served as Vice President of Membership of the Society for Modeling and Simulation International SCS. From 2006–2009, he served as the Senior Vice President of SCS. Currently, he is the President of SCS. One of his recent co-authored papers has received the best paper award in the IEEE AICCSA 2009 international conference. He also received the best paper award for one of his papers accepted in IEEE GLOBCOM 2009 conference. Professor Obaidat received very recently the prestigious Society for Modeling and Simulation Intentional (SCS) McLeod Founder’s Award in recognition of his outstanding technical and professional contributions to modeling and simulation.
Professor Obaidat has been invited to lecture and give keynote speeches worldwide. His research interests are: wireless communications and networks, telecommunications and Networking systems, security of network, information and computer systems, security of e-based systems, performance evaluation of computer systems, algorithms and networks, high performance and parallel computing/computers, applied neural networks and pattern recognition, adaptive learning and speech processing.
Recently, Professor Obaidat has been awarded a Nokia Research Fellowship and the distinguished Fulbright Scholar Award. During 2004/2005, he was on sabbatical leave as Fulbright Distinguished Professor and Advisor to the President of Philadelphia University in Jordan, Dr. Adnan Badran. The latter became the Prime Minister of Jordan in April 2005 and served earlier as Vice President of UNESCO. Prof. Obaidat is a Fellow of the Society for Modeling and Simulation International SCS, and a Fellow of the Institute of Electrical and Electronics Engineers (IEEE).
Professor Mieso Denko came originally from Ethiopia. He received his MSc degree from the University of Wales, UK, and his Ph.D from the University of Natal, South Africa, both in Computer Science. Dr. Denko was an Associate Professor in the Department of Computing and Information Science, University of Guelph, Ontario, Canada, from November 2002 until his sudden death late April 2010. He was the founding director of the Pervasive and Wireless Networking Laboratory (PerWiN) at University of Guelph. Professor Denko was an active member of IEEE ComSoc and energetic volunteer. Dr. Denko received the best paper award for one of his papers authored with Professor Mohammad S. Obaidat in IEEE GLOBECOM 2009. He published numerous journal and conference papers and authored or co-authored several books. He was also on the editorial board of several international journals. His research interests included performance evaluation of computer and telecommunication systems, mobile and wireless networks, pervasive and mobile computing and autonomic networks. Dr. Denko was a senior member of IEEE and a member of ACM and SCS. Dr. Mieso Denko passed away in the middle of finalizing this book.
Dr. Isaac Woungang received his M.S. and Ph.D degrees in Mathematics from the Université de la Méditerranée-Aix Marseille II, France, and the Université du Sud, Toulon et Var, France, in 1990 and 1994 respectively. In 1999, he received a M.S from the INRS-Materials and Telecommunications, University of Quebec, Montreal, Canada. From 1999–2002, he worked as a Software engineer at Nortel Networks. Since 2002, he has been with Ryerson University, where he is now an Associate Professor of Computer Science. In 2004, he founded the Distributed Applications and Broadband NEtworks Laboratory (DABNEL) R&D group. His research interests include network security, computer communication networks, mobile communication systems, computational intelligence applications in telecommunications and Coding theory. Dr. Woungang serves as Editor-in-Chief of the International Journal of Communication Networks and Distributed Systems (IJCNDS), Inderscience, UK, and the International Journal of Information and Coding Theory (IJICoT), Inderscience, UK, as Associate Editor of the International Journal of Communication Systems (IJCS), John Wiley & Sons, Ltd. Dr. Woungang has edited several books in the areas of wireless ad hoc networks, wireless sensor networks, wireless mesh networks, communication networks and distributed systems and Information and coding theory, published by reputable publishers such as Springer, Elsevier and World Scientific.
Part One
Pervasive Computing and Systems
1
Introduction
Mohammad S. Obaidat1 and Isaac Woungang2
1Department of Computer Science and Software Engineering, Monmouth University West Long Branch, NJ 07764, USA.
2Department of Computer Science, Ryerson University, 350 Victoria Street, Toronto, Ontario, M5B 2K3, Canada.
1.1 Pervasive Computing and Its Significance
Ubiquitous computing (nowadays also referred to as pervasive computing) was a revolutionary paradigm and technology introduced nearly a decade ago in a seminal 1991 paper by Mark Weiser [1] in these terms: ‘the method of enhancing computer use by making many computers available throughout the physical environment, but making them invisible to the user’, based upon the following vision [1]: ‘The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it’. The essence of this vision was the dream of having an environment where traditional networking technologies will complement new advanced computing and wireless communication capabilities, while being integrated gracefully with human users’ needs.
Thanks to the Internet and the ubiquitous presence of wearable computers, sensor networks, radio frequency identification (RFIDs) tags, and embedded devices, this vision is now heading towards the reality of a world where using information and communication technologies in our daily lives will not be limited only to high speed distributed computers, but will also extend to intelligent and smart devices [2]. Examples of such devices are scientific instruments, home appliances and entertainment systems, personal digital assistants, mobile phones, coffee mugs, key chains, digital libraries, human body, to name a few, interconnected anytime, seamlessly, and available transparently anywhere, constituting our novel computing network infrastructure. Pervasive computing is aiming at improving significantly the human experience and quality of life [3] without explicit awareness of the underlying computing technologies and communications.
1.2 Research Trends in Pervasive Computing and Networking
In recent years, there have been a number of research developments and technologies that have emerged in areas such as Internet technologies, mobile and distributed computing, handheld devices, computer hardware, wireless communication networks, embedded systems and computing, wireless sensor networks, software agents, human-computer interfaces, and the like. These advances have led to the emergence of several pervasive computing and networking applications. A typical example of such applications is the introduction of pervasive healthcare systems [4], where RFIDs and sensor network technologies have enabled the introduction of computing and communicating capabilities into devices that were considered traditionally as passive physical objects [5], allowing their ubiquitous presence in an environment not originally designed to handle them. Of course, this type of integration and advantage also poses several research challenges that are yet to be addressed [6]. Indeed, the research path towards making pervasive computing a complete reality is still long and winding.
Current research in pervasive computing [7] includes, but is not limited to: (1) heterogeneity and interoperability of computing devices, communication technologies, and software services – today's computing systems are made of various types of entities, mandating the need for designing incentive schemes for ensuring cooperation and collaboration among them [8]; (2) autonomic concepts of pervasive computing and networks [9] – in today's networking environment, enabling a network with self management and self-healing capabilities, and allowing it to cope with the rapid growth of the Internet and their complexities, is a key concern; (3) transparency and pro-activeness [8], [10], in existing computing devices – the development of computing tools has led to the introduction of situation-awareness requirements [11] in the computing world, where it is now envisaged that users of a system can negotiate for a quality of service that accommodates their profiles and applications; (4) location-awareness, scalability, and mobility [11] – in today's computing world, having explicit operator control when dealing with the interaction of entities is no longer a necessary requirement, and context-awareness has been proposed as an innovative novel paradigm for this type of intelligent computing model; (5) security, privacy and trust [12–17] – in today's computing environments, information exchange among the various entities involved brings a means of collaboration, context-based and other types of services, that can lead to a high risk of privacy breach when collaborators use their private information or objects. Protecting each entity as well the environment and information exchange are but a few of the challenges.
1.3 Scanning the Book
The book is organized into 19 chapters, each chapter written by experts on the topic concerned. These chapters are grouped into three parts.
PART 1 is devoted to topics related to the design, implementation, and/or management of pervasive computing applications and systems. It is composed of nine chapters: Chapters 1–9.
Chapter 1 introduces the book's content, organization and features, and its target audience.
Chapter 2 promotes the idea that interoperability among independently designed and deployed systems is a critical precursor to the development of pervasive systems. An overview of the tools and techniques that can be utilized to this end is presented, with emphasis on mobile agent technologies and platforms for dynamic reconfiguration and interoperability of sensor networks.
Chapter 3 focuses on the need for discovery mechanisms as a prerogative for accessing resources and services in a pervasive system. The existing approaches and models for discovery of services are discussed, as well as their suitability for pervasive systems.
Chapter 4 focuses on the potential offered by pervasive computing and networking technologies in the area of education, by proposing a thorough review of existing and emerging pervasive learning tools, technologies and applications for mobile and pervasive education.
Chapter 5 deals with service management in pervasive computing environments. The approaches and techniques for managing services in such environments are reviewed thoroughly and a novel framework for analysing the functionalities of service management is proposed.
Chapter 6 promotes the idea of using wireless sensor cooperation as a key enabling technology for objects to cooperate in pervasive computing environments. The techniques for sensor and mobile sensor cooperation in an intra-wireless sensor network are presented, as well as methods for enabling coordination across mobile entities and wireless sensor networks.
Chapter 7 presents multi-hop cognitive radio networks as a vital paradigm in opportunistic pervasive communications. Several MAC layer protocols for multi-hop cognitive radio networks are surveyed, along with related design challenges and open research issues.
Chapter 8 focuses on the design and development of wearable sensor networks for pervasive healthcare systems. A thorough review of available solutions is presented, as well as an analysis of the technological aspects of such designs. This topic is presented at a level of detail that is not found elsewhere in the literature.
Chapter 9 describes the main standards and technologies that are currently available for pervasive computing applications, focusing on wireless connections for the lower layers and middleware for the higher layers. Two examples of pervasive applications are illustrated. The first concerns access to computing services in a remote area and the second deals with home-based telemedicine systems.
PART 2 focuses on topics related to pervasive networking security. It is composed of four chapters: Chapters 10–13.
Chapter 10 discusses in depth the aspects and issues of security and privacy of pervasive networks. Prototype systems that attempt to solve these issues are also presented.
Chapter 11 focuses on wormhole attacks in pervasive wireless ad hoc and sensor networks. An analysis of this type of attack is presented, and current mitigating solutions designed to avoid them are discussed.
Chapter 12 discusses the concept of collaborative defense against Internet worm attacks. A comparative study of two major collaboration schemes for distributed defense is reported, leading to the design of a novel three-layered network model suitable for the evaluation of collaborative schemes. The impact of these schemes on network infrastructure security at the system level is also discussed.
Chapter 13 discusses the role of smart devices and intelligent systems in fulfilling the vision of pervasive computing from the perspective of a user's context. The components of these systems are analysed, and a taxonomy is proposed based on predefined criteria.
PART 3 focuses on pervasive networking and communications issues. It is composed of six chapters: Chapters 14–19.
Chapter 14 focuses on the current state of research addressing autonomic concepts in pervasive networks. An overview of the architectures and applications of ubiquitous and pervasive networks is presented, along with the application of autonomic computing principles. The benefits of cross-layer design approaches with autonomic capabilities are also discussed.
Chapter 15 promotes the idea of using component adaptation as a key solution to eliminate mismatches between existing components and their particular reuse contexts in a pervasive computing system. A framework in the form of an adaptive architecture that can be used to resolve functional dependency among components while enabling delay adaptation is introduced.
Chapter 16 focuses on the problem of sensor scheduling in order to guarantee sensing coverage in pervasive wireless sensor networks. A survey of the existing protocols for computing sensor spatial density to achieve coverage or k-coverage in such networks is proposed.
Chapter 17 deals with the problem of quality of service (QoS) provisioning – in terms of bandwidth, access and transfer delay – in pervasive computing environments. A discussion of the architectural blueprints and mechanisms to support QoS in a self-organizing framework – both automatically and configuration-free – is provided.
Chapter 18 addresses the issues of QoS for fixed Point-to-Multi-Point 802.16 systems, by proposing a novel framework consisting of an uplink scheduler, a call admission control module and a frame allocation scheme in order to resolve these issues.
Chapter 19 reports on some of the major challenges for implementation frameworks that can be anticipated when used for pervasive networking. A survey of a few representative approaches to using frameworks in implementing protocols and services is presented.
Below are some of the important features of this book, which, we believe, make it a valuable resource for our readers:
This book is designed, in structure and content, with the intention of making it useful at all levels of learning.The chapters are authored by prominent academicians/researchers and practitioners, with solid experience in wireless networking and pervasive computing, who have been working in these areas for many years and have a thorough understanding of the concepts and practical applications of these fields.The authors are distributed worldwide in a large number of countries and most of them are affiliated with institutions with a global reputation. This gives this book an international flavour.The authors have attempted to provide a comprehensive bibliography, which should greatly assist readers interested in delving deeper into the topics.Throughout the chapters, most of the core research topics of pervasive computing and networking are covered from both theoretical and practical viewpoints. This makes the book particularly useful for industry practitioners working directly with the practical aspects that enable the technologies in the field.To make the book useful for pedagogical purposes, all of the chapters are accompanied by a corresponding set of presentation viewgraphs. The viewgraphs can be obtained as a supplementary resource by contacting the publisher, John Wiley & Sons Ltd., UK.We have tried to make the chapters of the book look as coherent and consistent as possible. However, it cannot be denied that owing to the fact that the chapters were written by different authors, it was not possible to achieve this task 100%. We believe that this applies to all edited books.
1.4 Target Audience
The book is aimed primarily at the student community. This includes students at both undergraduate and graduate level – as well as students having an intermediate level of knowledge of the topics, and those having extensive knowledge about many of the topics. To achieve this goal, we have attempted to design the overall structure and content of the book in such a manner that makes it useful at all learning levels. The secondary audience for this book is the research community, in academia or in the industry. Finally, we have also taken into consideration the needs of those readers, typically from the industries, who desire insight into the practical significance of the topics, expecting to learn how the spectrum of knowledge and the ideas is relevant to the real-life applications of pervasive computing and networking.
1.5 Supplementary Resources
As mentioned earlier, this book comes with presentation viewgraphs for each chapter, which can be used for classroom instruction by instructors who adopt the book as a text. Instructors are requested to contact the publisher, John Wiley & Sons Ltd., UK, for access to these supplementary resources.
1.6 Acknowledgments
We are extremely grateful to the 61 authors of the 19 chapters of this book, who have worked very hard to create this unique resource for the aid of students, researchers and community practitioners. As the individual chapters of this book are written by different authors, the responsibility for the contents of each of the chapters lies with the authors concerned.
We are also very grateful to the publishing and marketing staff of John Wiley & Sons, for taking a special interest in the publication of this book, and for recognizing the current global market need for such a book. In particular, we would like to thank Ms Sarah Tilley, Ms Anna Smart, and Ms Susan Barclay, who worked so efficiently with us in the publication process. Special thanks go to our institutions, students and research colleagues who in one way or another contributed to this book. Finally, we would also like to thank our families, for their patience and for the continuous support and encouragement they have offered during the course of this project.
References
[1] M. Weiser (1991) ‘The Computer for the Twenty-First Century’ Scientific American 265(3): 94–104.
[2] M. Kumar, B. Shirazi, S. K. Das, M. Singhal, B. Sung and D. Levine (2003) ‘Pervasive Information Communities Organization PICO: A Middleware Framework for Pervasive Computing’ IEEE Pervasive Computing, pp. 72–9.
[3] U. Hansmann, L. Merk, M. S. Nicklous and T. Stober (2003) Pervasive Computing: The Mobile World, 2nd edn, Springer-Verlag, Berlin.
[4] V. Upkar (2009) ‘Pervasive Healthcare Computing’, EMR/EHR, Wireless and Health Monitoring, Springer.
[5] P. Bellavista, A.Corradi and C. Stefanelli (2000) ‘A Mobile Agent Infrastructure for the Mobility Support’, Proc. of the ACM Symposium onApplied Computing, pp. 239–45.
[6] http://oxygen.lcs.mit.edu/ (accessed 29 November, 2010).
[7] F.M.M. Neto and P.F.R. Neto (2010) Designing Solutions-Based Ubiquitous and Pervasive Computing: New Issues and Trends, IGI Publishing Ltd.
[8] A.Hopper (1999) Sentient computing, The Royal Society Clifford Patterson, Lecture, http://www.uk.research.att.com/~hopper/publications.html.
[9] M.K. Denko, L.T Yang and Y. Zhang (2009) Autonomic Computing and Networking, 1st edn, Springer Publishing.
[10] A-E. Hassanien, J. H. Abawajy. A. Abraham and H. Hagras (eds) (2009) Pervasive Computing: Innovations in Intelligent Multimedia and Applications, Springer.
[11] S.K. Das, A. Bhattacharya, A. Roy and A. Misra (2003) ‘Managing Location in ‘Universal’ Location-Aware Computing’, Handbook of Wireless Internet, B. Furht and M. Ilyas eds, CRC Press, Chap. 17, pp. 407–25.
[12] A. Soppera and T. Burbridge (2004) ‘Maintaining Privacy in Pervasive Computing -Enabling Acceptance of Sensor-Based Services’ BT Technology Journal 22(3): 106–7.
[13] R. Campbell, J Al-Muhtadi, G. Sampemane and M. D. Mickunas (2002) ‘Towards Security and Privacy for Pervasive Computing’, Proc. of the 2002 Mext-NSF-JSPS Intl. Conference on Software Security: Theories and Systems (ISSS’02), Tokyo, Nov. 8–10.
[14] Z. Li, X. Fu, H. Su, M. Jiang and S. T. Xiao (2006) ‘Research of Protecting Private Information in Pervasive Computing Environment’, Proc. of 1st Intl. Symposium on Pervasive Computing and Applications, Urumqi, Aug. 3–5, pp. 561–6.
[15] N. Iltaf, M. Hussain and F. Kamran (2009) ‘A Mathematical Approach Towards Trust Based Security in Pervasive Computing Environment’, Advances in Information Security and Assurance, LNCS, Vol. 5576, pp. 702–11.
[16] A. Boukerche and Y. Ren (2008) ‘A Trust-Based Security System for Ubiquitous and Pervasive Computing Environments’ Computer Communications 31(18): 4343–51, 2008.
[17] P. D. Giang, L. X. Hung, R. Ahmed Shaikh, Y. Zhung, S. Lee, Y-K. Lee and H. Lee (2007) ‘A Trust-Based Approach to Control Privacy Exposure in Ubiquitous Computing Environments’, IEEE Intl. Conference on Pervasive Services, July 15–20, Istanbul, pp. 149–52, Aug.
2
Tools and Techniques for Dynamic Reconfiguration and Interoperability of Pervasive Systems1
Evens Jean,1 Sahra Sedigh,2 Ali R. Hurson,3 and Behrooz A. Shirazi4
1Department of Computer Science and Engineering, The Pennsylvania State University, University Park, PA, USA.
2Department of Electrical and Computer Engineering, Missouri University of Science and Technology, Rolla, MO, USA.
3Department of Computer Science, Missouri University of Science and Technology, Rolla, MO, USA.
4School of Electrical Engineering and Computer Science, Washington State University, Pullman, WA, USA.
2.1 Introduction
Pervasive systems embody all the time, everywhere, transparent services, such as those provided by modern critical infrastructure systems, computer-supported health care networks, and smart living environments [1]. As the science and technology of such systems advances, we approach realization of the vision of an interconnected infrastructure that creates ambient intelligence, allowing anytime, anywhere, unobtrusive services that are gracefully and non-invasively integrated into humans’ daily activities. The infrastructure envisioned is composed of heterogeneous computing devices, ranging from supercomputers and powerful workstations, to small devices such as sensors, PDAs, and cell phones, augmented by software and middleware. Central to this visionary computing environment is a ubiquitous, secure, reliable, and often wireless infrastructure that cooperatively, autonomously, and intelligently collects, processes, integrates, and transports information, with adaptability to the spatial and temporal context, while satisfying constraints such as just-in-time operation and sustained performance.
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
