Skip to main content

Pervasive Computing: Enabling Technologies and Challenges

  • Chapter
Handbook of Nature-Inspired and Innovative Computing

5 Conclusions

In this chapter, we have presented an overview of the enabling technologies for the emergence of pervasive computing and communication infrastructures. While the Internet will perhaps continue to be the backbone of pervasive computing, the tremendous advances in wireless mobile communications allow the creation of ubiquitous networks with very little effort and insignificant cost Moreover, wireless communications offer users the luxury of mobility and provide connectivity on the move. Sensor networks, RFID tags, and embedded devices also help in the deployment of environments that are replete with computing and communicating services. Heterogeneous devices and networks, interoperability among disparate entities, and mobility and security will continue to challenge pervasive computing researchers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. W. Adjie-Winoto, E. Schwartz, H. Balakrishnan, and J. Lilley, The design and implementation of an intentional naming system, ACM SIGOPS Operating Systems Review, Proceedings of the Seventeenth ACM Symposium on Operating Systems Principles, 33(5), 186–201.

    Google Scholar 

  2. G. Banavar, J. Beck, and E. Gluzberg (2000): Challenges: An application model for pervasive computing, in Proceedings of 6th Annual International Conference on Mobile Computing and Networking (MOBICOM 2000), pp. 266–274, Boston, MA, USA.

    Google Scholar 

  3. P. Bellavista, A. Corradi, C. Stefanelli (2000): A mobile agent infrastructure for the mobility support, Proceedings of the 2000 ACM Symposium on Applied Computing, pp. 239–245.

    Google Scholar 

  4. A. Bhattacharya and S. K. Das (1999): LeZi-update: An information-theoretic approach to track mobile users in PCS networks, Proc. 6thAnnu. ACM Int. Conf. on Mobile Computing and Networking (MobiCom), pp. 1–12.

    Google Scholar 

  5. A. Bhattacharya and S. K. Das (2002): Lezi-update: An information-theoretic framework for personal mobility tracking in PCS networks, ACM/Kluwer Wireless Networks Journal, 8(2–3), 121–135.

    Google Scholar 

  6. D. J. Cook and S. K. Das (2003): Health monitoring in an agent-based smart home, International Conf. on Aging, Disability and Independence (ICADI), Washington, Dec.

    Google Scholar 

  7. D. J. Cook and S. K. Das (eds) (2004): Smart Environments: Architectures, Protocols and Applications, John Wiley, to appear.

    Google Scholar 

  8. S. K. Das, D. J. Cook, A. Bhattacharya, E. O. Heierman, and T.-Y. Lin (2002): The role of prediction algorithms on the MavHome smart home architectures, IEEE Wireless Communications (Special Issue on Smart Homes), 9(6), 77–84, Dec.

    Google Scholar 

  9. S. K. Das, A. Bhattacharya, A. Roy, and A. Misra (2003): managing location in ‘universal’ location-aware computing, Handbook of Wireless Internet (Eds. B. Furht and M. Ilyas), Chapter 17, pp. 407–425, CRC Press.

    Google Scholar 

  10. S.K. Das and C. Rose (2004): Coping with uncertainty in mobile wireless networks, Proceedings of 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Barcelona, Spain, Sept (Invited Paper).

    Google Scholar 

  11. W.M. Farmer, J.D. Guttman, and V. Swarup (1996): Security for mobile agents, issues and requirements, Proceedings NISSC’96 National Information Systems Security Conf., pp. 591–597, Baltimore, MD, October.

    Google Scholar 

  12. A. Hopper (1999): Sentient computing, The Royal Society Clifford Patterson Lecture, http://www.uk.research.att.com/~hopper/publications.html.

    Google Scholar 

  13. R. Kambalakatta, M. Kumar, and S. K. Das, Profile based caching to enhance data availability in push/pull mobile environments, International Conference on Mobile and Ubiquitous Computing, MobiQuitous 2004, Boston, August 22–25, Boston, USA.

    Google Scholar 

  14. J.J. Kistler and M. Satyanarayanan (1992): Disconnected Operation in the Coda File System, ACM Trans. Comp. Sys. 5(1), February.

    Google Scholar 

  15. M. Kumar, B. Shirazi, S. K. Das, M. Singhal, B. Sung, and D. Levine (2003): Pervasive Information Communities Organization PICO: A middleware framework for pervasive computing, IEEE Pervasive Computing, 72–79.

    Google Scholar 

  16. L.B. Mummert, M.R. Ebling, and M. Satyanarayanan (1995): Exploring weak connectivity for mobile file access, Proc. 15thACM Symp. Op. Sys. Principles, Copper Mountain Resort, CO, December.

    Google Scholar 

  17. N. B. Priyantha, A. Chakraborty, H. Balakrishnan (2000): The Cricket location-support system, Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, August, pp. 32–43.

    Google Scholar 

  18. A. Roy, S. K. Das, and A. Misra (2004): Exploiting information theory for adaptive mobility and resource management in future cellular networks, IEEE Wireless Communications (Special Issue on Mobility and Resource Management), Aug, to appear.

    Google Scholar 

  19. M. Satyanarayanan (2001): Pervasive computing: vision and challenges, IEEE Personal Computing.

    Google Scholar 

  20. E. Shih, P. Bahl, and M.J. Sinclair (2002): Wake on wireless: an event driven energy saving strategy for battery operated devices, Proceedings of the 8th Annual International Conference on Mobile Computing and Networking, pp. 160–171.

    Google Scholar 

  21. D.L. Tenenhouse (2000): Proactive computing, Communications of the ACM 43:5 (May).

    Google Scholar 

  22. M. Weiser (1991): The computer for the 21st century, Scientific American, 265(3), 94–104.

    Google Scholar 

  23. http://oxygen.lcs.mit.edu/

    Google Scholar 

  24. http://www-2.cs.cmu.edu/~aura/

    Google Scholar 

  25. http://www.cse.uta.edu/~pico@cse

    Google Scholar 

  26. http://ailab.uta.edu/mavhome/

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer Science+Business Media, Inc.

About this chapter

Cite this chapter

Kumar, M., Das, S.K. (2006). Pervasive Computing: Enabling Technologies and Challenges. In: Zomaya, A.Y. (eds) Handbook of Nature-Inspired and Innovative Computing. Springer, Boston, MA. https://doi.org/10.1007/0-387-27705-6_19

Download citation

  • DOI: https://doi.org/10.1007/0-387-27705-6_19

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-40532-2

  • Online ISBN: 978-0-387-27705-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics