Role of Ubiquitous Computing and Mobile WSN Technologies and Implementation

Computing capabilities such as real time data, unlimited connection, data from sensors, environmental analysis, automated decisions (machine learning) are demanded by many areas like industry for example decision making, machine learning, by research and military, for example GPS, sensor data collection. The possibility to make these features compatible with each domain that demands them is known as ubiquitous computing. Ubiquitous computing includes network topologies such as wireless sensor networks (WSN) which can help further improving the existing communication, for example the Internet. Also, ubiquitous computing is included in the Internet of Things (IoT) applications. In this article, it is discussed the mobility of WSN and its advantages and innovations, which make possible implementations for smart home and office. Knowing the growing number of mobile users, we place the mobile phone as the key factor of the future ubiquitous wireless networks. With secure computing, communicating, and storage capacities of mobile devices, they can be taken advantage of in terms of architecture in the sense of scalability, energy efficiency, packet delay, etc. Our work targets to present a structure from a ubiquitous computing point of view for researchers who have an interest in ubiquitous computing and want to research on the analysis, to implement a novel method structure for the ubiquitous computing system in military sectors. Also, this paper presents security and privacy issues in ubiquitous sensor networks (USN).

[1]  K Vimal,et al.  Passive IP Traceback : Disclosing the Locations of IP Spoofers from Path Backscatter , 2016 .

[2]  Sanna Järvelä,et al.  Four Stages of Research on the Educational Use of Ubiquitous Computing , 2015, IEEE Transactions on Learning Technologies.

[3]  Suresh Singh,et al.  Exploiting heterogeneity in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[4]  S. Saravana Kumar,et al.  Dynamic anomaly detection using cross layer security in MANET , 2017, Comput. Electr. Eng..

[5]  Di Tian,et al.  A coverage-preserving node scheduling scheme for large wireless sensor networks , 2002, WSNA '02.

[6]  Michael Friedewald,et al.  Ubiquitous computing: An overview of technology impacts , 2011, Telematics Informatics.

[7]  Miguel A. Labrador,et al.  G-Sense: a scalable architecture for global sensing and monitoring , 2010, IEEE Network.

[8]  Wei Wang,et al.  Using mobile relays to prolong the lifetime of wireless sensor networks , 2005, MobiCom '05.

[9]  Bo Rong,et al.  Ensuring Reliable and Stable Communications in Mobile Ad-Hoc Networks , 2017, 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall).

[10]  Jaydip Sen,et al.  Ubiquitous Computing: Potentials and Challenges , 2010, ArXiv.

[11]  Tatsuo Nakajima,et al.  Alternative Reality: An Augmented Daily Urban World Inserting Virtual Scenes Temporally , 2016, UCAmI.

[12]  Tracy Camp,et al.  Constructing rigorous MANET simulation scenarios with realistic mobility , 2010, 2010 European Wireless Conference (EW).

[13]  Gregory D. Abowd,et al.  Charting past, present, and future research in ubiquitous computing , 2000, TCHI.

[14]  Henning Schulzrinne,et al.  Ubiquitous computing in home networks , 2003, IEEE Commun. Mag..

[15]  Kannan Kathiravan,et al.  Cross-layer based multiclass intrusion detection system for secure multicast communication of MANET in military networks , 2016, Wirel. Networks.

[16]  Stefan Poslad,et al.  Ubiquitous Computing: Smart Devices, Environments and Interactions , 2009 .

[17]  Tareq Hayajna,et al.  Ensuring two routes connectivity in mobile ad hoc networks with Random Waypoint mobility , 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM).

[18]  Gaurav S. Sukhatme,et al.  Studying the feasibility of energy harvesting in a mobile sensor network , 2003, 2003 IEEE International Conference on Robotics and Automation (Cat. No.03CH37422).

[19]  Yusuf Pisan,et al.  A Survey of Major Challenges and Future Directions for Next Generation Pervasive Computing , 2006, ISCIS.

[20]  M. Weiser The Computer for the Twenty-First Century , 1991 .

[21]  John Anderson,et al.  Wireless sensor networks for habitat monitoring , 2002, WSNA '02.

[22]  Sherali Zeadally,et al.  PEAR: A Privacy-Enabled Architecture for Crowdsensing , 2017, RACS.