Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber-physical convergence

The physical environment is becoming more and more saturated with computing and communication entities that interact among themselves, as well as with users: virtually everything will be enabled to source information and respond to appropriate stimuli. In this technology-rich scenario, real-world components interact with cyberspace via sensing, computing and communication elements, thus driving towards what is called the Cyber-Physical World (CPW) convergence. Information flows from the physical to the cyber world, and vice-versa, adapting the converged world to human behavior and social dynamics. Indeed humans are at the center of this converged world since information about the context in which they operate is the key element to adapt the CPW applications and services. Alongside, a new wave of (human) social networks and structures are emerging as important drivers for the development of novel communication and computing paradigms. In this article we present some of the research issues, challenges and opportunities in the convergence between the cyber and physical worlds. This article is not a comprehensive survey of all aspects of the CPW convergence. Instead, it presents some exciting research challenges and opportunities identified by members of the journal's editorial board with a goal to stimulate new research activities in the emerging areas of CPW convergence.

[1]  A. W. Roscoe,et al.  Two heads are better than one: security and usability of device associations in group scenarios , 2010, SOUPS.

[2]  Marco Conti Special section on Mobile Opportunistic Networking , 2011, Pervasive Mob. Comput..

[3]  Alex Pentland,et al.  Healthwear: medical technology becomes wearable , 2004, Computer.

[4]  N. Asokan,et al.  Secure device pairing based on a visual channel , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[5]  Chatschik Bisdikian,et al.  Selecting Relevant Sensor Providers for Meeting "Your" Quality Information Needs , 2011, 2011 IEEE 12th International Conference on Mobile Data Management.

[6]  Sajal K. Das,et al.  Handbook on Securing Cyber-Physical Critical Infrastructure , 2012 .

[7]  Dewar D Finlay Smart environments: technology to support healthcare. , 2009, Technology and health care : official journal of the European Society for Engineering and Medicine.

[8]  Alex Pentland,et al.  Quantifying group problem solving with stochastic analysis , 2010, ICMI-MLMI '10.

[9]  Qi Han,et al.  Quality-aware sensor data collection , 2010, Int. J. Sens. Networks.

[10]  Hung-Min Sun,et al.  SPATE: Small-Group PKI-Less Authenticated Trust Establishment , 2010, IEEE Transactions on Mobile Computing.

[11]  Stuart M. Allen,et al.  Cooperation through self-similar social networks , 2010, TAAS.

[12]  Diane J. Cook,et al.  Smart environments - technology, protocols and applications , 2004 .

[13]  E. Uzun,et al.  BEDA : Button-Enabled Device Association , 2007 .

[14]  Christophe Diot,et al.  Impact of Human Mobility on Opportunistic Forwarding Algorithms , 2007, IEEE Transactions on Mobile Computing.

[15]  David Naccache,et al.  Alien vs. Quine , 2007, IEEE Security & Privacy.

[16]  Sanjay Ghemawat,et al.  MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.

[17]  Christine Julien,et al.  Resource-Optimized Quality-Assured Ambiguous Context Mediation Framework in Pervasive Environments , 2012, IEEE Transactions on Mobile Computing.

[18]  Gene Tsudik,et al.  Secure Code Update for Embedded Devices via Proofs of Secure Erasure , 2010, ESORICS.

[19]  Franco Zambonelli,et al.  Interdisciplinary research: roles for self-organization , 2006, IEEE Intelligent Systems.

[20]  Ralf Hartmut Güting,et al.  Moving Objects Databases , 2005 .

[21]  R. W. Peterson,et al.  OPTICAL INTERFEROMETRY OF SURFACES , 1991 .

[22]  Bo-Yin Yang,et al.  GAnGS: gather, authenticate 'n group securely , 2008, MobiCom '08.

[23]  Irwin King,et al.  A Survey of Human Computation Systems , 2009, 2009 International Conference on Computational Science and Engineering.

[24]  Diane J. Cook,et al.  How smart are our environments? An updated look at the state of the art , 2007, Pervasive Mob. Comput..

[25]  Vitaly Shmatikov,et al.  Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[26]  Lei Chen,et al.  Data Vitalization: A New Paradigm for Large-Scale Dataset Analysis , 2010, 2010 IEEE 16th International Conference on Parallel and Distributed Systems.

[27]  Ravi Jain,et al.  Predictability of WLAN Mobility and Its Effects on Bandwidth Provisioning , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[28]  A. Pentland,et al.  Computational Social Science , 2009, Science.

[29]  Christine Julien,et al.  An energy-efficient quality adaptive framework for multi-modal sensor context recognition , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[30]  Jeffrey O. Kephart,et al.  The Vision of Autonomic Computing , 2003, Computer.

[31]  Mani B. Srivastava,et al.  Building principles for a quality of information specification for sensor information , 2009, 2009 12th International Conference on Information Fusion.

[32]  George Roussos,et al.  Urban Social Tapestries , 2008, IEEE Pervasive Computing.

[33]  Andrew T. Campbell,et al.  Fast track article: Bubble-sensing: Binding sensing tasks to the physical world , 2010 .

[34]  Wendi Heinzelman,et al.  A general data fusion architecture , 2003, Sixth International Conference of Information Fusion, 2003. Proceedings of the.

[35]  Scott Shenker,et al.  A data-oriented (and beyond) network architecture , 2007, SIGCOMM 2007.

[36]  Chen-Khong Tham,et al.  Information quality mapping in resource-constrained multi-modal data fusion system over wireless sensor network with losses , 2007, 2007 6th International Conference on Information, Communications & Signal Processing.

[37]  Franco Zambonelli,et al.  A survey of autonomic communications , 2006, TAAS.

[38]  A. W. Roscoe,et al.  Usability and security of out-of-band channels in secure device pairing protocols , 2009, SOUPS.

[39]  Sajal K. Das,et al.  Fast track article: Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach , 2008 .

[40]  Andrea Passarella,et al.  HCMM: Modelling spatial and temporal properties of human mobility driven by users' social relationships , 2010, Comput. Commun..

[41]  Mark Weiser,et al.  The computer for the 21st Century , 1991, IEEE Pervasive Computing.

[42]  Kin K. Leung,et al.  A letter soup for the quality of information in sensor networks , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.

[43]  Yang Wang,et al.  Serial hook-ups: a comparative usability study of secure device pairing methods , 2009, SOUPS.

[44]  Albert-László Barabási,et al.  Understanding individual human mobility patterns , 2008, Nature.

[45]  James A. Hendler,et al.  Web science: an interdisciplinary approach to understanding the web , 2008, CACM.

[46]  Jacek Becla,et al.  Report from the 6th Workshop on Extremely Large Databases , 2013, Data Sci. J..

[47]  Marco Conti,et al.  Opportunistic networking: data forwarding in disconnected mobile ad hoc networks , 2006, IEEE Communications Magazine.

[48]  Leonard J. Bass,et al.  Adtranz: a mobile computing system for maintenance and collaboration , 1998, Digest of Papers. Second International Symposium on Wearable Computers (Cat. No.98EX215).

[49]  Roberto Montemanni,et al.  Design patterns from biology for distributed computing , 2006, TAAS.

[50]  Vassilis Kostakos,et al.  Brief encounters: Sensing, modeling and visualizing urban mobility and copresence networks , 2010, TCHI.

[51]  Jadwiga Indulska,et al.  A survey of context modelling and reasoning techniques , 2010, Pervasive Mob. Comput..

[52]  Gerhard Tröster,et al.  SwimMaster: a wearable assistant for swimmer , 2009, UbiComp.

[53]  Peter Norvig,et al.  The Unreasonable Effectiveness of Data , 2009, IEEE Intelligent Systems.

[54]  Mirco Musolesi,et al.  The Rise of People-Centric Sensing , 2008, IEEE Internet Comput..

[55]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[56]  J. Koenderink Q… , 2014, Les noms officiels des communes de Wallonie, de Bruxelles-Capitale et de la communaute germanophone.

[57]  Refik Molva,et al.  Privacy and confidentiality in context-based and epidemic forwarding , 2010, Comput. Commun..

[58]  Franco Zambonelli,et al.  A Simple Model and Infrastructure for Context-Aware Browsing of the World , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).

[59]  Nitesh Saxena,et al.  Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns , 2008, ACNS.

[60]  Diogo R. Ferreira,et al.  Providing user context for mobile and social networking applications , 2010, Pervasive Mob. Comput..

[61]  Luiz André Barroso,et al.  Web Search for a Planet: The Google Cluster Architecture , 2003, IEEE Micro.

[62]  Claudio Soriente,et al.  On the difficulty of software-based attestation of embedded devices , 2009, CCS.

[63]  George Coulouris,et al.  Distributed systems (3rd ed.): concepts and design , 2000 .

[64]  Frank Dürr,et al.  Pervasive and Mobile Computing , 2012 .

[65]  Sajal K. Das,et al.  RADON: reputation-assisted data forwarding in opportunistic networks , 2010, MobiOpp '10.

[66]  Daniele Quercia,et al.  Recommending Social Events from Mobile Phone Location Data , 2010, 2010 IEEE International Conference on Data Mining.

[67]  An Energy Efficient Quality Adaptive Multi-Modal Sensor Framework for Context Recognition , 2011 .

[68]  Chatschik Bisdikian,et al.  Sentire: a framework for building middleware for sensor and actuator networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[69]  Diane M. Strong,et al.  Beyond Accuracy: What Data Quality Means to Data Consumers , 1996, J. Manag. Inf. Syst..

[70]  Van Jacobson,et al.  Networking named content , 2009, CoNEXT '09.

[71]  Archan Misra,et al.  MASTAQ: a middleware architecture for sensor applications with statistical quality constraints , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[72]  Daniel P. Siewiorek,et al.  System Level Design as Applied to CMU Wearable Computers , 1999, J. VLSI Signal Process..

[73]  George Coulouris,et al.  Distributed systems - concepts and design , 1988 .

[74]  Mohan Kumar,et al.  Opportunities in Opportunistic Computing , 2010, Computer.

[75]  Guang-Zhong Yang,et al.  The use of pervasive sensing for behaviour profiling - a survey , 2009, Pervasive Mob. Comput..

[76]  Paul Lukowicz,et al.  Collecting complex activity datasets in highly rich networked sensor environments , 2010, 2010 Seventh International Conference on Networked Sensing Systems (INSS).

[77]  Richard Y. Wang,et al.  Anchoring data quality dimensions in ontological foundations , 1996, CACM.

[78]  Sajal K. Das,et al.  Supporting pervasive computing applications with active context fusion and semantic context delivery , 2010, Pervasive Mob. Comput..

[79]  Yu-Chee Tseng,et al.  Pervasive and Mobile Computing ( ) – Pervasive and Mobile Computing Review from Wireless Sensor Networks towards Cyber Physical Systems , 2022 .

[80]  Minho Shin,et al.  AnonySense: A system for anonymous opportunistic sensing , 2011, Pervasive Mob. Comput..

[81]  Sajal K. Das,et al.  A trust-based framework for data forwarding in opportunistic networks , 2013, Ad Hoc Networks.

[82]  Gene Tsudik,et al.  Groupthink: usability of secure group association for wireless devices , 2010, UbiComp.

[83]  Mirco Musolesi,et al.  Introduction to the special issue on "Human Behavior in Ubiquitous Environments: Modeling of Human Mobility Patterns" , 2010, Pervasive Mob. Comput..

[84]  Alex Pentland,et al.  MIThril 2003: applications and architecture , 2003, Seventh IEEE International Symposium on Wearable Computers, 2003. Proceedings..

[85]  Pan Hui,et al.  BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks , 2008, IEEE Transactions on Mobile Computing.

[86]  David Tse,et al.  Mobility increases the capacity of ad-hoc wireless networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[87]  G. Moruzzi Opportunistic networking overlays for ICT services in crisis management , 2008 .

[88]  James H. Aylor,et al.  Computer for the 21st Century , 1999, Computer.

[89]  Na Li,et al.  Preserving Relation Privacy in Online Social Network Data , 2011, IEEE Internet Computing.

[90]  Claudio Soriente,et al.  HAPADEP: Human-Assisted Pure Audio Device Pairing , 2008, ISC.

[91]  Arun Kumar,et al.  Caveat Emptor: A Comparative Study of Secure Device Pairing Methods , 2009, PerCom.

[92]  F. Zambonelli Self-Management and the Many Facets of “ Non-Self ” Franco Zambonelli , 2005 .

[93]  Wolfgang Lehner,et al.  Representing Data Quality in Sensor Data Streaming Environments , 2009, JDIQ.

[94]  G. Tröster,et al.  Woven Electronic Fibers with Sensing and Display Functions for Smart Textiles , 2010, Advanced materials.

[95]  Kin K. Leung,et al.  QoI-Aware Wireless Sensor Network Management for Dynamic Multi-Task Operations , 2010, 2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).

[96]  Trent Jaeger,et al.  Design and Implementation of a TCG-based Integrity Measurement Architecture , 2004, USENIX Security Symposium.

[97]  Diane J. Cook,et al.  Author's Personal Copy Pervasive and Mobile Computing Ambient Intelligence: Technologies, Applications, and Opportunities , 2022 .

[98]  Chatschik Bisdikian,et al.  On Sensor Sampling and Quality of Information: A Starting Point , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[99]  Mirco Musolesi,et al.  Human behavior in ubiquitous environments: Experience and interaction design , 2010, Pervasive Mob. Comput..

[100]  Baik Hoh,et al.  Dynamic pricing incentive for participatory sensing , 2010, Pervasive Mob. Comput..

[101]  Mani B. Srivastava,et al.  Quality Tradeoffs in Object Tracking with Duty-Cycled Sensor Networks , 2010, 2010 31st IEEE Real-Time Systems Symposium.

[102]  A. Ephremides,et al.  Energy-driven detection scheme with guaranteed accuracy , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.

[103]  Paul Lukowicz,et al.  Design of the QBIC wearable computing platform , 2004 .

[104]  Nitesh Saxena,et al.  Automated Device Pairing for Asymmetric Pairing Scenarios , 2008, ICICS.

[105]  P. Cochat,et al.  Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.

[106]  Carlo Ratti,et al.  Eigenplaces: Segmenting Space through Digital Signatures , 2010, IEEE Pervasive Computing.

[107]  Yogesh L. Simmhan,et al.  A survey of data provenance in e-science , 2005, SGMD.

[108]  Paul Lukowicz,et al.  On-Body Sensing: From Gesture-Based Input to Activity-Driven Interaction , 2010, Computer.

[109]  Mary Shaw,et al.  Software Engineering for Self-Adaptive Systems: A Research Roadmap , 2009, Software Engineering for Self-Adaptive Systems.

[110]  Claude Castelluccia,et al.  Shake them up!: a movement-based pairing protocol for CPU-constrained devices , 2005, MobiSys '05.

[111]  Sajal K. Das,et al.  Context-aware resource management in multi-inhabitant smart homes: A framework based on Nash H , 2006, Pervasive Mob. Comput..

[112]  Michael K. Reiter,et al.  Seeing-is-believing: using camera phones for human-verifiable authentication , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[113]  Franco Zambonelli,et al.  MyAds: A system for adaptive pervasive advertisements , 2009, Pervasive Mob. Comput..

[114]  Eric J. Lind,et al.  A sensate liner for personnel monitoring applications , 1997, Digest of Papers. First International Symposium on Wearable Computers.

[115]  David J. DeWitt,et al.  Parallel database systems: the future of high performance database systems , 1992, CACM.

[116]  Franco Zambonelli,et al.  Self-Organized Data Ecologies for Pervasive Situation-Aware Services: The Knowledge Networks Approach , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[117]  Erich M. Nahum,et al.  Data Quality and Query Cost in Pervasive Sensing Systems , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).

[118]  Jacek Becla,et al.  Report from the 3rd Workshop on Extremely Large Databases , 2008, Data Sci. J..

[119]  Feng Zhao,et al.  Information-Driven Dynamic Sensor Collaboration for Tracking Applications , 2002 .

[120]  Marco Conti,et al.  From opportunistic networks to opportunistic computing , 2010, IEEE Communications Magazine.

[121]  Wearable Computing: Toward Humanistic Intelligence , 2001 .

[122]  Mads Haahr,et al.  Social Network Analysis for Information Flow in Disconnected Delay-Tolerant MANETs , 2009, IEEE Transactions on Mobile Computing.