Skip to main content
Log in

System-wide support for safety in pervasive spaces

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

This paper addresses issues of safety in pervasive spaces. We show how pervasive systems are different from traditional computer systems, and how their cyber-physical nature ties intimately with the users. Errors and conflicts in such space could have detrimental, dangerous or undesired effects on the user, the space, or the devices. There are no support systems or programming models conscious of the issue of safety. Unrestrained programming is the model de jour, which is inadequate. We need a programming model that encourages and obligates various roles engaged in the development of pervasive spaces to contribute to increasing safety. We propose a model that utilizes role-specific safety knowledge, and that takes advantage of the rich sensing and actuations capabilities of pervasive systems to detect and handle “conflicting contexts” and prevent or detect/avert “impermissible contexts”. We present our model and discuss how it mitigates overall safety risks in presence of uncertainty due to multiple independent roles.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  • Bell G (2004) Intimate computing? IEEE Internet Comput 8(6):93–94

    Google Scholar 

  • Boukerche A, Pazzi, RWN, Araujo RB (2004) A fast and reliable protocol for wireless sensor networks in critical conditions monitoring applications. In: Proceedings of 7th ACM international symposium on modeling, analysis and simulation of wireless and mobile systems, Venice, 2004, pp 157–164

  • Chen C, Helal A (2008) Sifting through the jungle of sensor standards IEEE Pervasive Comput 7(4) Oct-Dec 2008

  • Chen C, Helal A (2009a) Device Integration in SODA using the Device Description Language. In: Proceedings of 9th annual international symposium on applications and the internet, seattle, pp 100–106

  • Chen C, Bose R, Helal A (2009b). Atlas: an open model for automatic integration and tele-programming of smart objects. In: Proceedings of 3rd international workshop on design and integration principles for smart objects (DIPSO’09), Orlando Oct 2009

  • Chen C, Helal A, de Deugd S, Smith A (2010a) Roles and system architecture in the design, creation and management of smart spaces. In: Proceedings of workshop on programming methods for mobile and pervasive systems, in conjunction with pervasive 2010, Helsinki, Finland

  • Chen C, Xu Y, Li K, Helal A (2010b) Reactive programming optimizations in pervasive computing. In: Proceedings of 10th annual international symposium on applications and the internet, Seoul, Korea, pp 96–104

  • Chen C, Helal A (2011) A device-centric approach to enhance safety of the internet of things. To appear in proceedings of international workshop on networking and object memories for the internet of things (NOMe-IoT 2011). In conjunction with Ubicomp 2011, Beijing, China

  • Cho ES, Helal S (2011) A situation-based exception detection mechanism for safety in pervasive systems. To appear in proceedings of 11th annual international symposium on applications and the internet 2011 (SAINT 2011), Munich, Germany

  • de Deugd S, Carroll R, Kelly K, Millett B, Ricker J (2006) SODA: service oriented device architecture. IEEE Pervasive Comput 5(3):94–96

    Article  Google Scholar 

  • ASAP Project Group (2004) Safety in pervasive computing. Advanced specialization and analysis for pervasive computing project deliverable report D13. http://clip.dia.fi.upm.es/~clip/Projects/ASAP/Deliverables2/deliv_13.pdf. Accessed 10 June 2010

  • Fitterer R, de Witte B (2009) Enabling pervasive healthcare by means of event-driven service-oriented architectures—the case of bed management in mid-sized to large-sized hospitals. In: Proceedings of 3rd international ICST conference on pervasive computing technologies for healthcare, London

  • Gray J (1981) The transaction concept: virtues and limitations. In: Proceedings of the 7th international very large databases. Cannes, France pp 144–154

  • Gu T, Pung HK, Yao JK (2005) Towards a flexible service discovery. Elsevier J Netw Comput Appl (JNCA) 28(3):233–248

    Google Scholar 

  • Ma J et al (2006) Ubisafe computing: vision and challenges (I). In: Proceedings of autonomic and trusted computing (ATC) Springer, pp 386–397

  • Yang H, Jansen E, Helal A (2006) A comparison of two programming models for pervasive computing. In: Proceedings of workshop on ubiquitous networking and enablers to context aware services. In conjunction with the IEEE/IPSJ international symposium on applications and the internet, Phoenix, Arizona, pp 134–137

  • Yang H, King J, Helal A, Jansen E (2007) A context-driven programming model for pervasive spaces. In: Proceedings of 5th international conference on smart homes and health telematics (ICOST) 2007, Nara, Japan, pp 31–43

  • Yang H, Helal A (2008) Safety enhancing mechanisms for pervasive computing systems in intelligent environment. In: Proceedings of middleware support for pervasive computing workshop, held in conjunction with IEEE PerCom 2008, Hong Kong, pp 520–530

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chao Chen.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chen, C., Helal, S. System-wide support for safety in pervasive spaces. J Ambient Intell Human Comput 3, 113–123 (2012). https://doi.org/10.1007/s12652-011-0078-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-011-0078-7

Keywords

Navigation