Cover image for Pervasive Computing and Networking.
Pervasive Computing and Networking.
Title:
Pervasive Computing and Networking.
Author:
Obaidat, Mohammad S.
ISBN:
9781119970439
Personal Author:
Edition:
1st ed.
Physical Description:
1 online resource (346 pages)
Contents:
PERVASIVE COMPUTING AND NETWORKING -- Contents -- List of Contributors -- About the Editors -- PART ONE PERVASIVE COMPUTING AND SYSTEMS -- 1 Introduction -- 1.1 Pervasive Computing and Its Significance -- 1.2 Research Trends in Pervasive Computing and Networking -- 1.3 Scanning the Book -- 1.4 Target Audience -- 1.5 Supplementary Resources -- 1.6 Acknowledgments -- References -- 2 Tools and Techniques for Dynamic Reconfiguration and Interoperability of Pervasive Systems -- 2.1 Introduction -- 2.2 Mobile Agent Technology -- 2.2.1 Introduction -- 2.2.2 Mobile Agent Security -- 2.2.3 Mobile Agent Platforms -- 2.3 Sensor Networks -- 2.3.1 Introduction -- 2.3.2 Sensor Network Applications -- 2.3.3 Dynamic Reconfiguration of Sensor Networks -- 2.4 Collaboration and Interoperability Among Sensor Networks -- 2.5 Applications -- 2.5.1 A Pervasive System for Volcano Monitoring -- 2.5.2 A Pervasive Computing Platform for Individualized Higher Education -- 2.6 Conclusion -- References -- 3 Models for Service and Resource Discovery in Pervasive Computing -- 3.1 Introduction -- 3.2 Service Oriented Architecture -- 3.3 Industry and Consortia Supported Models for Service Discovery -- 3.3.1 Existing Models for Service Discovery -- 3.3.2 Suitability of Existing Models for Pervasive Systems -- 3.4 Research Initiatives in Service Discovery for Pervasive Systems -- 3.4.1 Related Work -- 3.4.2 Our Proposition: Using Semantic in Context Modeling to Enhance Service Discovery -- 3.5 Conclusions -- References -- 4 Pervasive Learning Tools and Technologies -- 4.1 Introduction -- 4.2 Pervasive Learning: A Promising Innovative Paradigm -- 4.2.1 Historical Development of Computing and IT in Education -- 4.2.2 Past Experience and Issues -- 4.2.3 Practice and Challenge at Waseda E-School -- 4.3 Emerging Technologies and Systems for Pervasive Learning.

4.3.1 Emerging Computing Paradigms for Education -- 4.3.2 Pervasive Learning Support Systems and Technologies -- 4.4 Integration of Real-World Practice and Experience with Pervasive Learning -- 4.4.1 Ubiquitous Learning -- 4.4.2 UPS (Ubiquitous Personal Study) -- 4.5 Nature of Pervasive Learning and Provision of Well-Being in Education -- 4.5.1 Ubiquitous and Pervasive -- 4.5.2 The Possible Trend of Pervasive Technology in Education -- 4.6 Conclusion -- References -- 5 Service Management in Pervasive Computing Environments -- 5.1 Introduction -- 5.2 Service Management in Pervasive Computing Environments -- 5.2.1 Introduction -- 5.2.2 Pervasive Computing Environments -- 5.2.3 Service Management Framework -- 5.2.4 General Components of a Service Management System -- 5.2.5 System Support Components -- 5.2.6 Service Management Challenges -- 5.3 Techniques for Service Management in PvCE -- 5.3.1 Introduction -- 5.3.2 Classification of Service Discovery Protocols -- 5.3.3 Service Discovery in Infrastructure-Based Networks -- 5.3.4 Service Discovery in Infrastructure-Less Networks -- 5.3.5 Multiprotocol Service Discovery -- 5.3.6 Service Discovery Approaches -- 5.4 Service Composition -- 5.4.1 Service Composition Functions -- 5.4.2 Survey of Methods in Service Composition Process -- 5.4.3 Service Composition Approaches -- 5.5 Conclusions -- References -- 6 Wireless Sensor Cooperation for a Sustainable Quality of Information -- 6.1 Introduction -- 6.2 Sensing the Real World -- 6.3 Inter-Sensor Cooperation -- 6.3.1 Sensor Cooperation for Self-Organization -- 6.3.2 Cooperation for Quality of Information Provisioning -- 6.3.3 Sensor Node Cooperation for Information Transport -- 6.4 Mobile Sensor Cooperation -- 6.4.1 Mobility to Enhance Functionality (gMAP) -- 6.4.2 Mobility to Enhance Dependability -- 6.5 Cooperation Across Mobile Entities.

6.5.1 Cooperative Path Planning -- 6.5.2 Data-Based Agreement for Coordination -- 6.6 Inter-WSN Cooperation -- 6.6.1 The Sensor-Map Integration Approaches -- 6.6.2 Generalized Map-Based Cooperation -- 6.7 Conclusions and Future Research Directions -- References -- 7 An Opportunistic Pervasive Networking Paradigm: Multi-Hop Cognitive Radio Networks -- 7.1 Introduction -- 7.2 Overview of Multi-Hop Cognitive Radio Networks MAC Layer -- 7.2.1 MAC Design Challenges in MHCRNs -- 7.2.2 Comparison of Multi-Channel Networks and MHCRN -- 7.3 Proposed Mac Layer Protocols -- 7.3.1 POMDP Framework for Decentralized Cognitive MAC (DC-MAC) -- 7.3.2 DCR-MAC -- 7.3.3 Cross-Layer Based Opportunistic MAC (O-MAC) -- 7.3.4 HC-MAC -- 7.3.5 C-MAC -- 7.3.6 DOSS-MAC -- 7.3.7 SCA-MAC -- 7.4 Open Issues -- 7.5 Conclusions -- References -- 8 Wearable Computing and Sensor Systems for Healthcare -- 8.1 Introduction -- 8.2 The Health Body Area Network -- 8.3 Medical and Technological Requirements of Health Sensors -- 8.4 Wearable Sensors for Vital Signals Monitoring -- 8.5 Wearable Sensors for Activity Recognition -- 8.6 Sensors and Signals for Emotion Recognition -- 8.7 Intra-BAN Communications in Pervasive Healthcare Systems: Standards and Protocols -- 8.7.1 IEEE 802.15.4 and ZigBee -- 8.7.2 Bluetooth -- 8.7.3 Bluetooth Low Energy -- 8.7.4 Integrated and Additional Solutions for Health BAN Communications -- 8.8 Conclusions -- References -- 9 Standards and Implementation of Pervasive Computing Applications -- 9.1 Introduction -- 9.1.1 Pervasiveness and Mobility in Computing and Communications -- 9.1.2 Context Awareness -- 9.1.3 Heterogeneity -- 9.2 Wireless Technologies and Standards -- 9.2.1 A Simple Classification of Wireless Networks -- 9.2.2 Concluding Remarks -- 9.3 Middleware -- 9.3.1 Future Trends: Beyond the Middleware -- 9.4 Case Studies.

9.4.1 Pervasive Computing in Extreme Areas -- The Hiker's Personal Digital Assistant -- 9.4.2 Pervasive Computing in Personal Health Systems -- The MyHealthService Approach -- References -- PART TWO PERVASIVE NETWORKING SECURITY -- 10 Security and Privacy in Pervasive Networks -- 10.1 Introduction -- 10.2 Security Classics -- 10.2.1 Perimeter Security -- 10.2.2 Access Control -- 10.3 Hardening Pervasive Networks -- 10.3.1 Pervasive Computational Paradigms -- 10.3.2 Pervasive Hardware -- 10.3.3 Pervasive Networking and Middleware -- 10.3.4 Pervasive Applications -- 10.3.5 Pervasive Distributed Application -- 10.3.6 Logic Based Level Security -- 10.3.7 Deterministic Access Models -- 10.3.8 Predictive Statistical Schemes -- 10.4 Privacy in Pervasive Networks -- 10.4.1 Problem Definition -- 10.4.2 Challenges to Privacy Protection -- 10.4.3 Location Dependency -- 10.4.4 Data Collection -- 10.4.5 Internet Service Provider (ISP) Role -- 10.4.6 Data Ownership -- 10.4.7 Private Systems -- 10.4.8 Quality of Privacy (QoP) -- 10.4.9 Open Issues in Privacy of Systems -- 10.4.10 'Sharing' in Personal Networks -- 10.5 Conclusions -- References -- 11 Understanding Wormhole Attacks in Pervasive Networks -- 11.1 Introduction -- 11.2 A Wormhole Attack -- 11.3 Severity of a Wormhole Attack -- 11.4 Background -- 11.5 Classification of Wormholes -- 11.5.1 In Band and Out Band Wormholes -- 11.5.2 Hidden and Participation Mode Wormholes -- 11.5.3 Physical Layer Wormhole -- 11.6 Wormhole Attack Modes -- 11.6.1 Using the Existing Wireless Medium -- 11.6.2 Using the Out-of- Band Channel -- 11.6.3 Using High Transmission Power -- 11.6.4 Using Packet Relays -- 11.7 Mitigating Wormhole Attacks -- 11.7.1 Pro-Active Counter Measures -- 11.7.2 Reactive Countermeasures -- 11.8 Discussion of Some Mitigating Solutions to Avoid Wormhole Attacks.

11.8.1 Immuning Routing Protocols Against Wormhole Attacks -- 11.8.2 De Worm: A Simple Protocol to Detect Wormhole Attacks in Wireless Ad Hoc Networks -- 11.8.3 Wormhole Attacks in Wireless Ad Hoc Networks - Using Packet Leashes to Prevent Wormhole Attacks -- 11.9 Conclusion and Future Work -- References -- 12 An Experimental Comparison of Collaborative Defense Strategies for Network Security -- 12.1 Introduction -- 12.2 Background -- 12.3 Small-World Network Based Modeling Platform -- 12.3.1 Small World Network -- 12.3.2 Structure of Three-Layered Modeling Platform -- 12.4 Internet Worm Attack and Defense -- 12.4.1 Modeling a Worm Attack -- 12.4.2 Modeling Defense Schemes -- 12.5 Experiments and Performance Evaluation -- 12.5.1 Experimental Setup -- 12.5.2 Experimental Results and Discussion -- 12.5.3 Simple SI Model -- 12.5.4 The SIR Model -- 12.6 Conclusions -- References -- 13 Smart Devices, Systems and Intelligent Environments -- 13.1 Introduction -- 13.2 Smart Devices and Systems -- 13.2.1 Definition and Components -- 13.2.2 Taxonomy -- 13.3 Intelligent Environments -- 13.3.1 Definition and Components -- 13.3.2 Taxonomy -- 13.4 Trends -- 13.5 Limitations and Challenges -- 13.6 Applications and Case Studies -- 13.6.1 Smart Everyday Objects -- 13.6.2 Smart Home -- 13.6.3 Smart Office -- 13.6.4 Smart Room -- 13.6.5 Supply Chain Management13.6.5 Supply Chain Management -- 13.6.6 Smart Car -- 13.6.7 Smart Laboratory -- 13.6.8 Smart Library -- 13.7 Conclusion -- References -- PART THREE PERVASIVE NETWORKING AND COMMUNICATIONS -- 14 Autonomic and Pervasive Networking -- 14.1 Introduction -- 14.2 Ubiquitous/Pervasive Networks -- 14.2.1 Introduction -- 14.2.2 Ubiquitous/Pervasive Networks Architecture -- 14.2.3 Ubiquitous/Pervasive Networks Applications -- 14.3 Applying Autonomic Techniques to Ubiquitous/Pervasive Networks -- 14.3.1 Introduction.

14.3.2 Autonomic Networking and Computing Paradigms.
Abstract:
This book presents state-of-the-art research on architectures, algorithms, protocols and applications in pervasive computing and networks With the widespread availability of wireless and mobile networking technologies and the expected convergence of ubiquitous computing with these emerging technologies in the near future, pervasive computing and networking research and applications are among the hot topics on the agenda of researchers working on the next generation of mobile communications and networks. This book provides a comprehensive guide to selected topics, both ongoing and emerging, in pervasive computing and networking. It contains contributions from high profile researchers and is edited by leading experts in this field. The main topics covered in the book include pervasive computing and systems, pervasive networking security, and pervasive networking and communication. Key Features: Discusses existing and emerging communications and computing models, design architectures, mobile and pervasive wireless applications, technology and research challenges in pervasive computing systems, networking and communications Provides detailed discussions of key research challenges and open research issues in the field of autonomic computing and networking Offers information on existing experimental studies including case studies, implementation test-beds in industry and academia Includes a set of PowerPoint slides for each chapter for instructors adopting it as a textbook Pervasive Computing and Networking will be an ideal reference for practitioners and researchers working in the areas of communication networking and pervasive computing and networking. It also serves as an excellent textbook for graduate and senior undergraduate courses in computer science, computer engineering, electrical engineering, software engineering, and information

engineering and science.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: