Skip to main content
Log in

A behavioral reflective architecture for managing the integration of personal ubicomp systems: automatic SNMP-based discovery and management of behavior context in smart-spaces

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

Context-aware ubiquitous computing systems should be able to introspect the surrounding environment and adapt their behavior according to other existing systems and context changes. Although numerous ubiquitous computing systems have been developed that are aware of different types of context such as location, social situation, and available computational resources, few are aware of their computational behavior. Computational behavior introspection is common in reflective systems and can be used to improve the awareness and autonomy of ubicomp systems. In this paper, we propose a decentralized approach based on Simple Network Management Protocol (SNMP) and Universal Plug and Play (UPnP), and on state transition models to model and expose computational behavior. Typically, SNMP and UPnP are targeted to retrieve raw operational variables from managed network devices and consumer electronic devices, e.g., checking network interface bandwidth and automating device discovery and plug and play operations. We extend the use of these protocols by exposing the state of different ubicomp systems and associated state transitions statistics. This computational behavior may be collected locally or remotely from ubicomp systems that share a physical environment, and sent to a coordinator node or simply shared among ubicomp systems. We describe the implementation of this behavior awareness approach in a home health-care environment equipped with a VoIP Phone and a drug dispenser. We provide the means for exposing and using the behavior context in managing a simple home health-care setting. Our approach relies on a system state specification being provided by manufacturers. In the case where the specification is not provided, we show how it can be automatically discovered. We propose two machine learning approaches for automatic behavior discovery and evaluate them by determining the expected state graphs of our two systems (a VoIP Phone and a drug dispenser). These two approaches are also evaluated regarding the effectiveness of generated behavior graphs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20

Similar content being viewed by others

References

  1. Abowd G, Dey A, Brown P, Davies N, Smith M, Steggles P (1999) Towards a better understanding of context and context-awareness. In: Gellersen HW (ed) Handheld and ubiquitous computing, vol 1707., lecture notes in computer scienceSpringer, Berlin, pp 304–307

    Chapter  Google Scholar 

  2. Calder M, Magill EH (eds) (2000) VI feature interactions in telecommunications and software systems. IOS Press, Glasgow

    Google Scholar 

  3. Calhoun P, Loughney J, Guttman E, Zorn G, Arkko J (1998) Diameter Base Protocol. RFC 3588, Internet Engineering Task Force

  4. Chaudhry SA, Song W, Vulla MH, Sreenan CJ (2011) EMP: a protocol for IP-based wireless sensor networks management. JUSPN 2(1):15–22

    Article  Google Scholar 

  5. Chen G, Kotz D (2000) A survey of context-aware mobile computing research. In: Tech. rep. Dartmouth College

  6. Cheverst K, Byun HE, Fitton D, Sas C, Kray C, Villar N (2005) Exploring issues of user model transparency and proactive behaviour in an office environment control system. User Model User-Adapt Interact 15(3–4):235–273

    Article  Google Scholar 

  7. Choi D, Hongseok J, Kugsang J, Punghyeok K, Soohyung K (2006) Delivery and storage architecture for sensed information using SNMP. In: Kim YT, Takano M (eds) Management of convergence networks and services, lecture notes in computer science, vol 4238. Springer, Berlin, pp 582–585

  8. Choi H, Kim N., Cha H (2009) 6LoWPAN-snmp: simple network management protocol for 6LoWPAN. In: 11th IEEE international conference on high performance computing and communications 2009 (HPCC’09), pp 305–313

  9. Data Mining Research Group, Data and Information Systems (DAIS) Research Laboratory, University of Illinois at Urbana-Champaign, IlliMine. http://illimine.cs.uiuc.edu/. Accessed 18 Jan 2016

  10. Durham D, Boyle J, Cohen R, Herzog S, Rajan R, Sastry A (2000) The COPS (Common Open Policy Service) Protocol. RFC 2748, Internet Engineering Task Force

  11. Fischer M (2008) Enhancing the ReMoteCare prototype by adding an SNMP proxy and video surveillance. Master’s thesis, Universitat Koblenz-Landau, Campus Koblenz

  12. Giladi R (2004) Snmp for home automation. Int J Netw Manag 14(4):231–239

    Article  Google Scholar 

  13. Goncalves P, Oliveira JL, Aguiar R (2012) A study of encoding overhead in network management protocols. Int J Netw Manag 22(6):435–450

    Article  Google Scholar 

  14. Goncalves P, Torres J, Sobral P, Moreira RS (2009) Remote patient monitoring in home environments. In: 1st international workshop MobiHealthInf (BIOSTEC 2009)

  15. Henricksen K, Indulska J, McFadden T, Balasubramaniam S (2005) Middleware for distributed context-aware systems. In: International symposium on distributed objects and applications (DOA). Springer, pp 846–863

  16. Hipp J, Güntzer U, Nakhaeizadeh G (2000) Algorithms for association rule mining—a general survey and comparison. ACM SIGKDD Explor Newsl 2(1):58–64

    Article  Google Scholar 

  17. Huebscher M, McCann J (2006) An adaptive middleware framework for context-aware applications. Pers Ubiquitous Comput 10(1):12–20

    Article  Google Scholar 

  18. International Telecommunication Union Telecommunication Standardization Sector: Recommendation X.680 – Abstract Syntax Notation One (ASN.1): Specification of Basic Notation (2008)

  19. Jain AK, Murty MN, Flynn PJ (1999) Data clustering: a review. ACM Comput Surv 31(3):264–323

    Article  Google Scholar 

  20. Judd G, Steenkiste P (2003) Providing contextual information to pervasive computing applications. In: Proceedings 1st IEEE international conference on pervasive computing and communications 2003 (PerCom 2003), pp 133–142

  21. Kuryla S (2010) Implementation and evaluation of the simple network management protocol over ieee 802.15.4 radios under the contiki operating system. Master’s thesis, School of Engineering and Science, Jacobs University Bremen, Germany

  22. Lim YY, Messina M, Kargl F, Ganguli L, Fischer M, Tsang T (2008) SNMP proxy for wireless sensor network. In: 5th international conference on information technology: new generations, 2008 (ITNG 2008), pp 738–743

  23. Lopez-de Ipina D, Vazquez J, Garcia D, Fernandez J, Garcia I, Sainz D, Almeida A (2006) A middleware for the deployment of ambient intelligent spaces. In: Cai Y, Abascal J (eds) Ambient intelligence in everyday life, lecture notes in computer science, vol 3864. Springer, Berlin, pp 239–255

  24. Maulik U, Bandyopadhyay S (2002) Performance evaluation of some clustering algorithms and validity indices. IEEE Trans Pattern Anal Mach Intell 24(12):1650–1654

    Article  Google Scholar 

  25. Moreira LP, Soares C, Moreira RS, Morla R (2012) A decentralized SNMP-based approach for behavior introspection, awareness and discovery in ubiquitous computing. In: 3rd international conference on wireless mobile communication and healthcare

  26. Murtaza SS, Amin SO, Hong CS (2006) Applications of SNMP in ubiquitous environment. KNOM Review 8(2):14–19

    Google Scholar 

  27. Morla R, Davies N (2004) Evaluating a location-based application: a hybrid test and simulation environment. IEEE Pervasive Comput 3(3):48–56

    Article  Google Scholar 

  28. Nakajima T, Satoh I (2006) A software infrastructure for supporting spontaneous and personalized interaction in home computing environments. Pers Ubiquitous Comput 10(6):379–391

    Article  Google Scholar 

  29. Ranganathan A, Campbell RH (2003) An infrastructure for context-awareness based on first order logic. Pers Ubiquitous Comput 7(6):353–364

    Article  Google Scholar 

  30. Salber D, Dey AK, Abowd GD (1999) The context toolkit: aiding the development of context-enabled applications. In: Proceedings SIGCHI conference on human factors in computing systems: the CHI is the limit, CHI’99. ACM, New York, pp 434–441

  31. Soares C, Moreira RS, Morla R, Torres J, Sobral P (2012) Interference free integration of pervasive applications. In: 11th IEEE international conference on ubiquitous computing and communications (IUCC 2012). Liverpool, pp 1499–1506

  32. Soares C, Moreira RS, Morla R, Torres J, Sobral P (2012) Prognostic of feature interactions between independently developed pervasive systems. In: International conference on prognostics and health management 2012 (PHM 2012). Denver

  33. Soares C, Moreira RS, Morla R, Torres J, Sobral P (2014) A graph-based approach for interference free integration of commercial off-the-shelf elements in pervasive computing systems. Future Gener Comput Syst 39:3–15

    Article  Google Scholar 

  34. Urnes T, Hatlen AS, Malm PS, Myhre O (2001) Building distributed context-aware applications. Pers Ubiquitous Comput 5(1):38–41

    Article  Google Scholar 

  35. Velasquez C, Soares C, Morla R, Moreira RS, Torres J, Sobral P (2011) A 3D Simulation Framework for Safe Ambient-Assisted Home Care. In: 5th International conference on mobile ubiquitous computing, systems, services and technologies (UBICOMM 2011). Lisboa, pp 61–66

  36. Yau S, Karim F, Wang Y, Wang B, Gupta S (2002) Reconfigurable context-sensitive middleware for pervasive computing. IEEE Pervasive Comput 1(3):33–40

    Article  Google Scholar 

Download references

Acknowledgments

Christophe Soares thanks FCT—Foundation for Science and Technology, Portugal—for PhD Grant SFRH/BD/64210/2009.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rui S. Moreira.

Additional information

The SHC project was financed by ERDF (European Regional Development Fund through the COMPETE Programme—operational program for competitiveness) and by National Funds through the FCT (Fundação para a Ciência e a Tecnologia—Portuguese Foundation for Science and Technology) with reference PTDC/EIA-EIA/108352/2008 (COMP-01-0124-FEDER-010143).

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Moreira, R.S., Morla, R.S., Moreira, L.P.C. et al. A behavioral reflective architecture for managing the integration of personal ubicomp systems: automatic SNMP-based discovery and management of behavior context in smart-spaces. Pers Ubiquit Comput 20, 229–243 (2016). https://doi.org/10.1007/s00779-016-0901-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-016-0901-4

Keywords

Navigation