Looking ahead in Pervasive Computing: Challenges, Opportunities in the era of Cyber Physical Convergence Authors : Marco Conti, Sajal K. Das, Chatschik.

Slides:



Advertisements
Similar presentations
Distributed Data Processing
Advertisements

Sharing Content and Experience in Smart Environments Johan Plomp, Juhani Heinila, Veikko Ikonen, Eija Kaasinen, Pasi Valkkynen 1.
Chapter 19: Network Management Business Data Communications, 5e.
A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.
Introduction to Cyber Physical Systems Yuping Dong Sep. 21, 2009.
© 2005 Mobile VCE Securing the Future: Device & Service Security Stephen Hope, FT R&D UK Ltd on behalf of Nigel Jefferies, Vodafone Chair.
Systems Engineering in a System of Systems Context
Trust Establishment in Pervasive Grid Environments Syed Naqvi, Michel Riguidel TÉLÉCOM PARIS ÉNST É cole N ationale S upérieur des T élécommunications.
. Smart Cities and the Ageing Population Sustainable smart cities: from vision to reality 13 October ITU, Geneva Knud Erik Skouby, CMI/ Aalborg University-Cph.
Towards Security and Privacy for Pervasive Computing Author : Roy Campbell,Jalal Al-Muhtadi, Prasad Naldurg,Geetanjali Sampemane M. Dennis Mickunas.(2002)
Think. Learn. Succeed. Aura: An Architectural Framework for User Mobility in Ubiquitous Computing Environments Presented by: Ashirvad Naik April 20, 2010.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Mobile Agents: A Key for Effective Pervasive Computing Roberto Speicys Cardoso & Fabio Kon University of São Paulo - Brazil.
A New Household Security Robot System Based on Wireless Sensor Network Reporter :Wei-Qin Du.
Cloud Usability Framework
THE SECOND LIFE OF A SENSOR: INTEGRATING REAL-WORLD EXPERIENCE IN VIRTUAL WORLDS USING MOBILE PHONES Sherrin George & Reena Rajan.
POLITECNICO DI TORINO TRIBUTE and DIMMER. DIMMER - The context One of the major challenges in today’s economy concerns the reduction in energy usage and.
LÊ QU Ố C HUY ID: QLU OUTLINE  What is data mining ?  Major issues in data mining 2.
2 1 Chapter 2 Data Model Database Systems: Design, Implementation, and Management, Sixth Edition, Rob and Coronel.
Rainbow Facilitating Restorative Functionality Within Distributed Autonomic Systems Philip Miseldine, Prof. Taleb-Bendiab Liverpool John Moores University.
A Research Agenda for Accelerating Adoption of Emerging Technologies in Complex Edge-to-Enterprise Systems Jay Ramanathan Rajiv Ramnath Co-Directors,
The use of ‘exploratory learning’ for supporting immersive learning in virtual environments Freitas, S. d. & Neumann, T. (2009). The use of ‘ exploratory.
1 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved.
Self Adaptivity in Grid Computing Reporter : Po - Jen Lo Sathish S. Vadhiyar and Jack J. Dongarra.
Social Computing Networks: A New Paradigm for Engineering Pervasive Software Systems Naeem Esfahani Sam Malek 32th International Conference on Software.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Database System Concepts and Architecture
File Processing - Database Overview MVNC1 DATABASE SYSTEMS Overview.
A Data Intensive High Performance Simulation & Visualization Framework for Disease Surveillance Arif Ghafoor, David Ebert, Madiha Sahar Ross Maciejewski,
CPSC 871 John D. McGregor Module 6 Session 3 System of Systems.
VIRTUAL WORLDS IN EDUCATIONAL RESEARCH © LOUIS COHEN, LAWRENCE MANION & KEITH MORRISON.
Software Instrumentation of Computer and Video Games T. Bullen and M. Katchabaw Department of Computer Science The University of Western Ontario N. Dyer-Witheford.
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
A Context Model based on Ontological Languages: a Proposal for Information Visualization School of Informatics Castilla-La Mancha University Ramón Hervás.
1 BRUSSELS - 14 July 2003 Full Security Support in a heterogeneous mobile GRID testbed for wireless extensions to the.
Master Course /11/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
Institute for Security Technology Studies Dartmouth College Digital Living 2010: Sensors, Privacy, and Trust David Kotz September 2005.
Enabling the Future Service-Oriented Internet (EFSOI 2008) Supporting end-to-end resource virtualization for Web 2.0 applications using Service Oriented.
CSIIR Workshop March 14-15, Privilege and Policy Management for Cyber Infrastructures Dennis Kafura Markus Lorch Support provided by: Commonwealth.
1 Service Sharing with Trust in Pervasive Environment: Now it’s Time to Break the Jinx Sheikh I. Ahamed, Munirul M. Haque and Nilothpal Talukder Ubicomp.
26/05/2005 Research Infrastructures - 'eInfrastructure: Grid initiatives‘ FP INFRASTRUCTURES-71 DIMMI Project a DI gital M ulti M edia I nfrastructure.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Computer Science and Engineering 1 Mobile Computing and Security.
Chapter 8 System Management Semester 2. Objectives  Evaluating an operating system  Cooperation among components  The role of memory, processor,
Towards an IoT Ecosystem Flavia C. Delicato 1, Paulo F. Pires 1, Thais Batista 2, Everton Cavalcante 2, Bruno Costa 1, Thomaz Barros 1 1 Department of.
Euro-Par, HASTE: An Adaptive Middleware for Supporting Time-Critical Event Handling in Distributed Environments ICAC 2008 Conference June 2 nd,
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
UCI Large-Scale Collection of Application Usage Data to Inform Software Development David M. Hilbert David F. Redmiles Information and Computer Science.
Cognitive & Organizational Challenges of Big Data in Cyber Defence. YALAVARTHI ANUSHA 1.
TRACE ANALYSIS AND MINING FOR SMART CITIES By G. Pan Zhejiang Univ., Hangzhou, China G. Qi ; W. Zhang ; S. Li ; Z. Wu ; L. T. Yang.
Big Data Quality Challenges for the Internet of Things (IoT) Vassilis Christophides INRIA Paris (MUSE team)
Internet of Things – Getting Started
AUTONOMIC COMPUTING B.Akhila Priya 06211A0504. Present-day IT environments are complex, heterogeneous in terms of software and hardware from multiple.
OPPORTUNITIES IN OPPORTUNISTIC COMPUTING Marco Conti, Italian National Research Council Mohan Kumar, University of Texas at Arlington RTLab. Kim Tae-Hyon.
Introduction to Mobile-Cloud Computing. What is Mobile Cloud Computing? an infrastructure where both the data storage and processing happen outside of.
Data Grids, Digital Libraries and Persistent Archives: An Integrated Approach to Publishing, Sharing and Archiving Data. Written By: R. Moore, A. Rajasekar,
Chapter 40 Internet Security.
Supporting Mobile Collaboration with Service-Oriented Mobile Units
Algorithms for Big Data Delivery over the Internet of Things
Ambient Intelligence.
Data Warehousing and Data Mining
A (no-)conclusion ? Lionel Brunie
Smart Learning concepts to enhance SMART Universities in Africa
Pervasive Computing Happening?
Consideration on applying ICN to Edge Computing
Internet of Things (IoT) for Industrial Development and Automation
Big DATA.
Self-Managed Systems: an Architectural Challenge
TDT49 Mobile Information Systems, Jørgen Birkeland
Presentation transcript:

Looking ahead in Pervasive Computing: Challenges, Opportunities in the era of Cyber Physical Convergence Authors : Marco Conti, Sajal K. Das, Chatschik Bisdikian, Mohan Kumar, Lionel M. Ni, Andrea Passarella, George Roussos, Gerhard Troster, Gene Tsudik, Franco Zambonelli. Presented by : Srujan Kusumba

Introduction Pervasive Computing Cyber Physical Convergence Connected and available Information flow from the physical to the cyber world, and vice-versa

Human social structures play a crucial role in the information spread in Cyber world. Human social networks exhibit remarkable dynamism and structural properties that may affect the quality of information.

Problems addressed Huge amount of information Adaptation Human social structure Security

Opportunities and Challenges in CPC Autonomic behavior of cyber world Cyber infrastructure should be dynamically connect and interact with each other and adapt themselves to rapidly changing physical world. Limitations Autonomic approach proposes “Add-ons” to be integrated in the existing framework which makes current framework even more complex.

 Challenges The goal is making such systems inherently capable of autonomic self management and adaptation at the collective level.  Comprehensive awareness  Power of masses  Decentralized Control

Studying Physical world from Cyber world The knowledge of the human behavior is a fundamental step for tuning the pervasive applications to the users context Challenges Exploring human dynamics and social networks with pervasive computing techniques Information captured in pervasive computing way allows for the analysis, modeling and experimentation with human behaviors at the individual as well as social levels. Research in pervasive computing is presented with a unique opportunity to understand and manage the dynamics of human behavior in order to make pervasive computing systems more usable and tractable.

Ex: Dartmouth Campus project Cityware Urban Tapestries Senseable City Limitation: The majority of current work in this area is primarily exploratory in nature and has been restricted to one or a small subset of factors. Wearable computing: Is a fundamental tool for continuously monitoring human behavior. And it plays an important role in observing/measuring human behaviors from the virtual world

Cyber world paradigms enabled by physical world interactions Exploiting human relationships in the virtual world is adding new dimensions to pervasive computing and communications paradigms. Specifically, this gives rise to the concept of the Opportunistic Networking and Computing (ONC) paradigm. Opportunistic networking can be viewed as a natural evolution of ad hoc networking and the original concept of disruption tolerant networking (DTN).

Information management in the cyber–physical world Huge amount of information will be generated by several sources both in the physical and in the virtual world which need to be stored for future processing. In order to use this huge amount of heterogeneous data coming from a variety of sources, the quality of such data needs to be evaluated and taken into consideration before using it. Challenges : Data storage challenges Quality of information

Data Storage Challenges : Scalability:Computations on multi-petabytes of data inevitably pose significant challenges. Even a relatively simple operation becomes complex when dealing with multi-petabyte data. For example, a single sequential scan requires less than a second to go through a terabyte, while over a year to finish through a petabyte.  Complexity: The structure of the data tends to be complex. For example, in a typical digital city system, data may be time series with spatial attributes (e.g., moving taxies), or spatial objects with extent (e.g., rivers, buildings..)  Flexibility : Most query loads are highly unpredictable, with up to 90% of queries being new. To enable high flexibility, a system should be vitalized enough to sense the variations of query loads, predict the potential future queries, and reorganize data.

Cyber world security The proliferation of small and increasingly inexpensive computing devices in the environment, prompts a number of challenges related to their security and privacy. Attestation and code update for embedded devices, networks Embedded devices have been increasing both in number and variety. As they increase there are great chances of malware producers sending virus and worms into your devices. Secure Hardware Pure Software

Conclusion Convergence will be characterized by huge amount of information flowing from the physical world to the cyber world The complexity of the cyber world, and the need to adapt its behavior to the human/social context Security of the devices must be a concern because of malware producers.

R EFERENCES :

Thank you, Srujan Kusumba