Pervasive Computing World Tomorrow

wirelessguideMobile - Wireless

Nov 24, 2013 (4 years and 7 months ago)


Pervasive Computing World Tomorrow

Presentation by UDIC group

Critique Report

Submitted by Bhavani Prasad Sangannagari

Student ID: 990 02 0777

Pervasive computing is a step towards development of an integrated environment using the most
profound technolo
gies to better serve everyday life in an indistinguishable way. The idea of
Pervasive computing opens a number of issues related to distributed systems, mobile computing
and things like development of smart spaces, privacy security, invisibility, etc. Som
e of the
implementation issues like knowing user intent, context awareness, cyber foraging, client
thickness etc need to be addressed. All the devices and abstract concepts will have a unique
identity URI and are divided into separate autonomous systems (A
S). The interaction across
different autonomous systems will be through AS Head. The interaction between devices should
at the same time protect the privacy of an individual. Each pervasive profile has all the security
information with unique URI. Pervasi
ve authentication can of simple password type, or
biometric in nature using fingerprints, retina, etc. A pervasive service consists of dynamically
discovering service descriptions and utilizing them.

There are many activities going on in the background

between different systems without any
knowledge to the user. Hence user should have complete trust on the devices. Pervasive
computing is about giving maximum comfort to user by guessing his intent, based on the context,
etc. With the evolution of semanti
c technology services can be automatically composed. User
devices can search for available service descriptions in the local centers to provide a particular
service. Some advancement like pattern recognition, voice recognition, may aid in the
development o
f intelligent systems required for pervasive computing. There are already many
technological goods available in the market, which use the concepts of pervasive computing. For
example goods like air conditioners make use of “fussy logic” to automatically c
ontrol the
temperature of room, microwave ovens which are able to download recipes for cooking, etc.

Since the technology makes extensive use of distributed computing, mobile computing problems
like fault tolerance for distributed transactions, encryption

based mutual authentication, high
availability using optimistic recovery mechanisms, location aware system behavior, adaptive
resource management, and many more are to be answered. The technology is very far from reality
since still there are many issues
left open for major research.

Capturing of human senses/intent has never been an easy task for any research. Therefore
implementation issues like knowing user intent, context aware may be far away from reality at
least for the current generation. Pervas
ive computing has been referred as “treacherous
computing” by Richard Stallman telling how people challenge their visibility, privacy, etc. The
quote “ Machines that fit the human environment instead of forcing humans to enter theirs will
make using a comp
uter as refreshing as taking a walk in the woods” by Mark Weiser shows how
humans are becoming the salves of their own technology. Machines are subject to fail anytime.
The whole idea of pervasive computing depends upon trust over machines. We can find se
accidents that occur due to failure of machines. This raises a question of can people trust
machines? Can user trust machines completely to handle his privacy and security details? To
what extent and how fast can technology provide it to the current