Professional Documents
Culture Documents
Group Assignment
Intake Code:
GF1131COM / GF1171COM
Submitted To:
Mr.Tharindu Ekenayake Amarasekara
Submitted By:
Prasanga Wadanambi (CB003340)
Nilushi Silva (CB003423)
Eeshwaren Veerabahu (CB003120)
Date Assigned:
13th August 2011
Date Due:
3rd October 2011
Acknowledgment
GF1131COM / GF1171COM
It would be most appropriate first to have this opportunity to express our sincere thanks
for the people who guide and encourage throughout this project.
We sincerely thank our lecturer Mr.Tharindu Amarasekara for all his support and passion
towards guiding us and providing assistance to clarify our doubts.
Next we sincerely thank our friends who had always been around to support us. Finally
would like to express or sincere gratitude for all people who gave their massive support
to make this project a success.
GF1131COM / GF1171COM
Table of Contents
Acknowledgment...............................................................................................................ii
Table of figures................................................................................................................vii
1 Introduction.....................................................................................................................2
2 Features of the intelligent tab and the technology behind them......................................3
2.1 Device Dimension Morphing Feature......................................................................3
2.1.1 Technology behind Device Dimension Morphing Feature...............................4
2.2 Hardware extendibility Feature................................................................................5
2.2.1 Technology behind Hardware Extendibility Feature.........................................6
2.3 Adaptive Interface Host Feature...............................................................................8
2.3.1 Technology behind Adaptive Interface Host Feature........................................9
2.4 Intelligence Acquisition from the Environment Feature........................................11
2.4.1 Technologies behind Intelligence Acquisition from the Environment Feature
..................................................................................................................................12
2.5 Environment Personalization Feature....................................................................16
2.5.1 Technology behind Environment Personalization Feature..............................16
2.6 Adaptability to Environment Variations Feature....................................................18
2.6.1 Technology behind the Adaptability to environment variations feature.........18
2.7 User Authentication Feature...................................................................................20
2.7.1 Technology behind User Authentication Feature............................................20
2.8 Device Hardware Features.....................................................................................23
2.8.1 Nano Sensing...................................................................................................23
2.8.2 Nano Wire Grass (Solar power harvest)..........................................................24
2.8.3 Super Hydrophobic Surface (Self Cleaning)...................................................25
2.8.4 Transparent Electronics...................................................................................25
GF1131COM / GF1171COM
3 Screen shots...................................................................................................................27
4 Critical Evaluations.......................................................................................................33
4.1 Critical Evaluation- Prasanga Wadanambi.............................................................33
4.2 Critical Evaluation- Nilushi Silva..........................................................................34
4.3 Critical Evaluation- Eshwaran Veerabahu..............................................................36
5 Conclusion.....................................................................................................................38
6 References.....................................................................................................................39
7 Individual Research.......................................................................................................41
GF1131COM / GF1171COM
Table of figures
Figure 1: Device Dimension Morphing.............................................................................3
Figure 2: Nano Material before and after stretch...............................................................4
Figure 3: Fibril Protein weaves before and after stretch....................................................5
Figure 4: RFID Tags Application.......................................................................................6
Figure 5: AD-Hoc mode communication between intelligent tab and extendible
hardware.............................................................................................................................7
Figure 6: Ad-hoc Network..................................................................................................8
Figure 7: Intelligent acquisition from objects in the environment...................................11
Figure 8: Computer Vision Applied in Face Recognition for Security Purposes.............14
Figure 9: Object and Environment Recognition Using Computer Vision........................14
Figure 10: Augmented Reality.........................................................................................15
Figure 11: Environment Personalization..........................................................................16
Figure 12: House temperature change adaptability to environment variations................18
Figure 13: Face thermogram authentication.....................................................................21
Figure 14: Nano scale bio-mechanical sensing organs....................................................23
Figure 15: Nano wire solar cells......................................................................................24
Figure 16: Super Hydrophobic Surface............................................................................25
Figure 17: Transparent Electronics..................................................................................26
Figure 18: Thermograph Identification............................................................................27
Figure 19: Voice recognition............................................................................................27
Figure 20: Expandability..................................................................................................28
Figure 21: Capability of input surfaces...........................................................................29
Figure 22: Device hosting................................................................................................29
Figure 23: Intelligent Acquisition....................................................................................30
Figure 24: User identification..........................................................................................31
Figure 25: Personalization of environments.....................................................................31
Figure 26: Capability of Decision making.......................................................................32
Figure 27: Schematic view of smart environments..........................................................48
Figure 28: Eavesdropping attack in the network..............................................................64
Figure 29: Denial-of-Service Attack................................................................................65
5
GF1131COM / GF1171COM
GF1131COM / GF1171COM
GF1131COM / GF1171COM
1 Introduction
The Abode intelligent tab is a smart device that is built for the purpose of simplifying the
activities that the user carries out in a daily basis. The Intelligent tab is able to
accomplish the task of simplifying users activities by, being the central control board
for all essential devices that are part of the activities performed by the user. By being
able to control, gather information and integrate with the various devices, the intelligent
tab helps to define a higher purpose for all devices it interacts with. Without the
intelligent tab, other devices would only be carrying out simple tasks which require a
great deal of interaction from the user.
The intelligent tab has many features which are powered by advanced technologies;
these features will help users to automatically control appliances, the environment and
even acquire information from objects in the environment. Some of the most important
features of the intelligent tab are listed below, these features and the technology behind
them will be discussed in depth, later in this report.
Abode Intelligent Tabs Primary Features
These primary features of the intelligent tab apply to most general activities carried out
by the user, hence enhancing the users life by automating the activities, regardless of
the environment.
GF1131COM / GF1171COM
GF1131COM / GF1171COM
(nokiamorph,2008)
The figures above illustrate the Nano technology based material focused at X 10,000.
The figure on left illustrates the material when its not stretched and the figure on right
illustrates the material when it is stretched.
GF1131COM / GF1171COM
(nokiamorph,2008)
The above figures illustrate the process of molecular level self-construction of weaving
and unweaving fibril protein mesh, on the Nano material.
(nokiamorph,2008)
Docking the intelligent tab to any of the above hardware, can alter the way these
hardware behave, if we consider a typical scenario; docking the intelligent tab after it
has been morphed to the correct proportions, that is compliant with the extendible
hardware. The intelligent tab detects the presence of the extendible hardware by means
of wireless communication. The newly created communication path between the
intelligent tab and the extendible hardware will then be used to exchange information
and hardware resources. The initial information that would be shared by both devices
will be the classification of the device. At this stage realizing that the extendible
hardware is an intelligent workstation, the tab will activate the extendible hardwares
5
GF1131COM / GF1171COM
features (e.g. when the tab acknowledges that the extendible hardware is a work station
capable of activating a reactive surface. It commands the extendible hardware to activate
its feature)
The intelligent tab can be aware of the extendible hardware its compatible with by
integrating RFID (Radio Frequency Identification) tags within the hardware, these RFID
tags will be used to identify the hardware and harvest information about the hardware,
RFID tags integrated within the hardware need to comply with the standards of the
intelligent tab, to maintain uniformity in the design of the extendible devices. Encoding
information and features within these Tags, will allow devices that need to access the
hardware to gauge the devices functionalities and capabilities.
(aimglobal,2008)
The figure above illustrates the function of RFID tags in the real world.
GF1131COM / GF1171COM
Figure 5: AD-Hoc mode communication between intelligent tab and extendible hardware
GF1131COM / GF1171COM
GF1131COM / GF1171COM
Gesture Recognition
o Gesture recognition technology helps the above discussed feature, such
that it acts as a trigger for transferring the interface to a display host in the
environment. The main advantage of this technology is that, it allows
users to interact with mechanical devices without the need for input
devices such as keyboards, mouse and even touch screen. This
technology interprets human gestures using mathematical algorithms. The
computer interface recognizes two gesture types, they are
The intelligent tab supports both of the above discussed gesture types,
since they are applied to most of the tabs features, to enhance the users
experience.
To track the users movement to identify what gesture the user is
performing, the intelligent tab uses depth-aware cameras namely Timeof-Flight cameras (TOF), this generates a depth map of what is being
viewed by the camera at a short range, then it uses the data acquired to
approximate a 3 dimensional representation of things being seen. The tab
then cross references the representation with preloaded representations of
the gestures to interpret them as user interactions. Depth cameras are
GF1131COM / GF1171COM
10
GF1131COM / GF1171COM
11
GF1131COM / GF1171COM
Computer Vision
Computer vision is the technology that models and replicates human vision via
the usage of software and hardware. It identifies properties such as structures
within objects and environments present in a 2D image and then reconstruct and
interpret it as a 3D scene. The output of this technology is mostly a description,
interpretation or a quantitative measurement of an object in a 3D scene. The
Computer Vision technology uses image processing as one of its primitive
techniques to achieve its purpose. Computer Vision technology can be divided
into 3 main levels, they are
o Low-level Vision: This level of the computer vision technology is only
used to extract the features of an image such as corner, edge and light
flow.
o Intermediate-level Vision: this level of the computer vision technology is
used to recognize objects and interpret 3D scenes via the usage of
information obtained from low-level vision.
o High-level Vision: This level of the computer vision technology involves
in interpreting evolving information that is extracted from intermediatelevel vision. This level also directs what type of tasks low and
intermediate level should perform. High-level vision can provide
12
GF1131COM / GF1171COM
Augmented Reality
13
GF1131COM / GF1171COM
(Geekosystem, 2008)
The figure above illustrates the use of Computer Vision for face recognition, which can
be applied for security purposes.
(Adelaide, 2005)
The figure above illustrates the usage of computer vision technology for identifying
objects and environment in a scene.
14
GF1131COM / GF1171COM
(media.koyoto, 2004)
The above images illustrates the information layer that is applied on top of the real scene
by the usage of augmented reality
15
GF1131COM / GF1171COM
16
GF1131COM / GF1171COM
adopted by the intelligent tab, such that it can clearly differentiate between
several users. This technology is discussed in detail, later in this document, refer
to (2.7.1)
17
GF1131COM / GF1171COM
18
GF1131COM / GF1171COM
The second and third process involve the same technology, which is multi agent
communication, which is discussed in length in the individual research for Agent
Communication in Ubiquitous Computing, refer to ( 2.3 Ad-Hoc Network for Agents ,
3.1 Layered Ontologies)
19
GF1131COM / GF1171COM
20
GF1131COM / GF1171COM
Voice Authentication
21
GF1131COM / GF1171COM
not require any action ) than other biometric authentication methods. Mostly voice
authentication is able to provide fairly accuracy of identify and authenticate the user.
But due to the certain factors such as significant change in individuals voice (with
the users age, with users health conditions, with users mood) and environmental
factors (background noise) will affect voice authentication.
Therefore voice
22
GF1131COM / GF1171COM
(nokiamorph, 2008)
23
GF1131COM / GF1171COM
(nokiamorph,2008)
24
GF1131COM / GF1171COM
(nokiamorph,2008)
25
GF1131COM / GF1171COM
processors, graphic processors etc. that employs wide band-gap semiconductors, this
way all the electronic components that would be fit into a device could become invisible.
Also electronics at the Nano scale become invisible to the naked eye of the human, this
allows the device to adapt to a glass surface seamlessly, yet function without any
hardware shortcomings. This feature was implemented to support the idea of the device
blending in with the background as well as enhance the aesthetics of the device.
(John F.Wager, 2008)
(nokiamorph,2008)
26
GF1131COM / GF1171COM
3 Screen shots
Scanning
When a user switches on a device, it will use two level approaches to identify the user.
First the device scans and takes a thermograph image of the users face in order to
compare it with default template.
Voice Recognition
Voice Commands
Frequency Diagram
27
GF1131COM / GF1171COM
If the thermograph image comparison does not work, the device itself enables the
secondary mode of authentication via voice recognition.
The device can change its scale according to the requirements of the user. It provides
expandability of visual controls and broad capabilities of the functions embedded in the
devices.
28
GF1131COM / GF1171COM
Device got the capability of identify and attach surfaces such as multi task tables shown
in the above figure. In that case the device can be in any scale that preferred by the
functions.
29
GF1131COM / GF1171COM
The device got the capability of identify interfaces and devices which are enable of
adaptive workability. After the identification, it can also host such devices in order to
simplify the complexity and ease users works by controlling number of devices
simultaneously.
Identification of objects and gain its details which are important to user is another
function that embedded into this device.
30
GF1131COM / GF1171COM
Environmental personalization:
Step 1: Identification of user
31
GF1131COM / GF1171COM
Personalize the environment which the user currently in according to the history data or
user entered data. It eases the users life by undertaking all environmental aspects by its
own.
User involvement of such scenarios reduces by the device and allows the user to stay
calmly on any environmental change or any concern-able situation.
32
GF1131COM / GF1171COM
4 Critical Evaluations
33
GF1131COM / GF1171COM
34
GF1131COM / GF1171COM
And also with the use of the research, I was able to avoid the security attacks which can
be occur in the proposed intelligent tab. The research which is done on security and
ethics in ubiquitous computing environments supported me to recognize the main areas
which security needs to be considered and implemented. Therefore the contribution was
able reduce possible security attacks and increase the privacy in the proposed smart
device.
35
GF1131COM / GF1171COM
36
GF1131COM / GF1171COM
37
GF1131COM / GF1171COM
5 Conclusion
Ubiquitous computing is the new era of human life evaluation. In present it is a maturing
area where various research institutes and companies are working on, in-order to
implement ubiquitous devices and make ubiquitous project reality for the public users.
The proposed intelligent tab is a prototype for a smart device which can be adopted in a
ubiquitous environment. The intelligent tab is proposed with consideration of all the
aspects of ubiquitous computing such as security, intelligence and etc. The proposed
device is able bind the users day-to-day activities and offer a smart comfortable life.
38
GF1131COM / GF1171COM
6 References
FAQ.
[Online]
Available
from:
http://compnetworking.about.com/cs/wirelessfaqs/f/adhocwireless.html
[Online]
Available
from:
http://www.slideshare.net/ubik/beyond-augmented-reality-ubiquitous-media
September 2011]
Gesture
Recognition.
(2011).
[Online]
Available
from:
[Accessed:
Available
14th
from:
http://www.slideshare.net/ubik/beyond-augmented-reality-ubiquitous-media
Available
from:
http://electronics.howstuffworks.com/everyday-tech/haptic-technology.htm
[Online]
Available
from:
2011]
Nanotechnology.
http://www.crnano.org/whatis.htm
[Accessed: 1st October 2011]
Nokia Morph. (2011). [Online] Available from: http://research.nokia.com/morph
(2011).
[Online]
Available
Available
from:
from:
http://research.nokia.com/research/high_performance_mobile_platforms
from:
http://www.nanoscience.cam.ac.uk/index.php?
39
GF1131COM / GF1171COM
option=com_content&task=blogsection&id=1&Itemid=91
[Accessed:
21st
September 2011]
We are bulletproof. (2011). Minority Report. [Online] Available from:
http://wearebulletproof.blog.com/files/2011/07/30-07_minority_report.jpg
Electronics.
[Online]
Available
from:
http://www.springer.com/materials/optical+%26+electronic+materials/book/978
2011]
Nature. (2011). Self-assembled nanoscale biosensors based on quantum dot
FRET
donors.
[Online]
Available
from:
September 2011]
Super Hydrophobic Coating. (2011).Super Hydrophobic Coating. [Online]
Available from: http://superhydrophobiccoating.com/ [Accessed: 21st September
2011]
Media Koyoto. (2011).Images. [Online] Available from: http://mm.media.kyotou.ac.jp/members/yangwu/images/R5_FGLR.jpg [Accessed: 22nd September
2011]
Ecse.
(2011).3dvsision
intro.
[Online]
Available
from:
2011]
The Star. (2011). Hair-like nanowires at root of solar's future. [Online] Available
from:
http://www.thestar.com/Business/article/326750
September 2011]
7 Individual Research
40
[Accessed:
22nd
GF1131COM / GF1171COM
41
GF1131COM / GF1171COM
Abstract
In present, ubiquitous intelligence is the core of development of the smart devices in all
over the world. Any device which has integrated ubiquitous intelligence contains its own
capabilities of doing functions by its own. Therefore, Ubiquitous intelligence became an
imperative technology for people in their day to day life.
In present intelligent became a factor which is known as most challenging from all other
factors of information technology. Ubiquitous intelligence deals beyond from intelligent
factor and spreads around a larger scale of area on the smart world. Therefore ubiquitous
intelligence faces challenges which are integrated with social and technological factors.
The research article would cover the areas which related to the involvement of
ubiquitous intelligence in the Smart world and the challenges which are to be faced
during the interaction with physical world.
42
GF1131COM / GF1171COM
Introduction
Day by day, the introduction of new devices enables the human to a new dimension of
their lives. While their lives get complicated, an expectation of devices which enables to
ease their work gets higher. Therefore the development of devices which are small in
size and compact with multiple technologies are carrying out by main technological
devices vendors can be seen these days.
At the beginning, most of the devices were made by aiming at a set of specific
requirements. However the concept of developing such devices failed due to the lower
user acceptance rate, constraints offered by the devices and other technological,
environmental and physical factors. Due to these reasons, developers had to come up
with ideas which fulfill the user expectations and with higher level usability. Therefore
the concept of smart world appeared and suddenly the pattern which the technological
devices were developed, changed. The devices such as traditional mobile phones and
televisions became smart by integrating larger number of functions into a single device.
So on, the devices which we are using nowadays was a mythical approach at the early
19s. However the innovativeness of the technological industry is mainly to achieve
humans requirements effectively.
Smart world concept is growing up day by day in order to find smarter solutions than
ever for peoples requirements. Therefore newest technology concepts and device are
taking place to fulfill peoples requirements more effectively. Due to these sorts of
situations, the use of Ubiquitous intelligence is having challenges while the involvement
with todays devices.
This research article is based on three context areas which address the content of Smart
world that integrated technologies such as Ubiquitous computing and the use of
Ubiquitous intelligence in the real world along with the challenges.
GF1131COM / GF1171COM
According to Ma (n.d) Smart World is the physical world which embedded with all
computer related technologies, devices and materials. However, Smart world is the
concept which merged from the primary concept of Mirror World invented by
computer scientist David Gelernter. According to David Gelernter the Mirror World
was described as follows. You will look into a computer screen and see reality. Some
part of your world. The town you live in, the company you work for, your school
system, the city hospital will hang there in a sharp color image, abstract but
recognizable, moving subtly in a thousand places. (David Gelernter, 1990 cited in The
Economist, 2010)
In 1991 the chief scientist and the creator of Xerox PARC, Mark Weiser came up with
the idea of Ubiquitous Computing which is known as the third wave of the computing.
Weiser (1996) stated that, its concept is opposite from virtual reality and it force
computers to work with people invincibly.
Follow up; European Unions Information Society Technologies Program Advisory
Group (ISTAG) mentioned a term called Ambient Intelligence in their 1999 vision
statement in order to give a similar idea of living along with intelligent interfaces which
embedded in objects around us. (Bohn et al, 2004)
After years of experiments, concepts that introduced by different individuals and
organizations are reformed as a one concept of Smart World and it integrate
technologies which were mythical approaches at 1990s. However the concepts became
reality and after years back mankind is in search of multiple mirror worlds or smart
systems which they can meet their needs effectively. The devices which we are using
today are embedded with technologies which are considered as components of the Smart
World. As an example, the mobile phones were the first to introduce as a mobile device
in the world. It was only made for the communication purpose between two or multiple
devices. After decades of the invention, mobile phone is not just a device which can use
to communicate, but also to work on more and more functions such as web browsing,
navigation etc.
44
GF1131COM / GF1171COM
As mentioned earlier, The Smart World is embedded with technologies which are in
multidimensional form of computing. The areas which these dimensions are included
can be list as follows.
Universal identification
Interface and interaction
Physical & social awareness
Deployment and management
Smart object
Model and design
Platform and middleware
Smart environment
(Ma, n.d)
Each area is based on technical perspective of devices and systems which is going to be
implemented.
45
GF1131COM / GF1171COM
All the devices, networks, sensors and other physical entities with some smartness
embedded into them are known as smart objects. Mobile phone is the one simple
example of smart object which we are using for multiple purposes. Parley (2005) stated
46
GF1131COM / GF1171COM
that the first mobile phone was cellular radio system in 1947 by D.H Ring with help
from W.R Young for a company only to do communication purposes internally. Now that
device has reached its peak in technology factor and got the smartness embedded with it
in order to simplify the tasks of humankind.
Data or voice networks, middleware for platforms of smart devices and smart
applications can be considered as smart systems. Data and voice networks that we are
using for our day to day communication needs are the perfect example for smart
systems. According to Harrison (1995) now, networks are in a position where Data
networks have evolved from providing point-to-point connections into store and forward
packet networks and Voice networks have also evolved from providing point-to-point
connections to redirecting calls, call blocking, call screening, mobile communication and
roaming among multiple carriers.
Due to the evolution, networks in nowadays are capable of handling multiple
communication tasks from single network as well as able to be intelligent.
Smart environment is a physical environment which embedded with smart objects and
devices to perform a set of user required tasks in order to simplify their day to day
activities. As indicated in Figure 1, the smart devices, appliances and robot agents are
the closest components to the physical world which the users regularly interact with.
47
GF1131COM / GF1171COM
48
GF1131COM / GF1171COM
Social
Technological
Social
o People are used to involve technological substances into their lives nowadays.
Therefore the complexity of their lifestyle and essential needs such as medical
equipments put them into a situation where the attitudes of a person change and
incline into a world which operates by smart devices and systems. Afterward, that
person has to become a client of a network which operates by servers called smart
devices and systems. Bohn et al (2004) stated that the potential benefits from the
economic are the key factors of propagation of such information technology
though it is challengeable for the humans.
o Still we got the ability of decision making on things in most cases. But in a smarter
world than this might not let us to make decisions. Due to the higher rate of
dependency on technological devices will lead us number of social challenges such
as privacy and controllability concerns.
Technological
49
GF1131COM / GF1171COM
o The core concept of Smart world is accompanied with intelligent devices and
systems which perform in the background of our lives according to needs of our
lives. Due to various reasons, our needs and circumstances change time to time.
Thus the systems and devices should adapt to these changeable circumstances and
needs in order to keep the Smart world concept steadily.
o Manageability is another concern that needs to focus on. When it comes to larger
scale ubiquitous environment set-ups, millions of intelligent devices and systems
can be involve for one specific task. In that case, two major concerns appear which
questioned as follows.
Will the devices and systems still be able to meet their original
requirements though they are involved in massive numbers and smaller in
size?
Will they able to understand and control a smart environment which is
known as a highly dynamical environment by operating as a group of
individual objects or systems?
(Bohn et al, 2004)
These questions can be listed as major technological concerns which might build a
discussion among people who are interested in these concepts.
o While using a regular phone, when it rings, the person who is in the callers end
knows whether the connection is successful or unsuccessful by listening to the
Beep sound from the receiver. But in an environment which includes smart
devices and systems only designed for respond on success factors, may not
configure and predict such situations. So on, the users have to depend upon fault
scenarios which might end up with damages on without noticing. This can be
identified as another concern which occurs due to the minimum ability of
predicting system behaviors.
o In a smart world, all the devices and systems are designed to work individually by
using their own intelligence. Involve in an environment similar to smart world,
50
GF1131COM / GF1171COM
51
GF1131COM / GF1171COM
5.0 Conclusion
Technology has become an important aspect of human life. Computers, mobile phones,
televisions etc. are become more embedded into or lives. Rapid development in
technologies and new inventions creates a virtual bridge between human and technology
in search of a perfect interaction mechanism which simplify our day to day work. Near
future, it will become a part of our lives and will be able to feel the simplicity of things
which we were used to do more hardly. The environment will be the source of each
device, system and function as well as the resource generator for humans.
To achieve above goals, there are factors which we needs to consider on before
implementing new technologies embedded with ubiquitous intelligence. While creating a
smart world, it is a must to look forward with social and technological aspects in order to
become a success one.
52
GF1131COM / GF1171COM
6.0 References
from:
http://books.google.com/books?id=fZ5gfxMLw-
oC&printsec=frontcover&source=gbs_ge_summary_r&cad=0#v=onepage&q&f
September 2011]
Harrison, G.C. (1995). Smart networks and intelligent agents. [Online] Available
from: www.research.ibm.com/massive/smartnw.ps [Accessed: 10th September
2011]
Ma, J et al. (2005). Towards a Smart World and Ubiquitous Intelligence: A
Walkthrough from Smart Things to Smart Hyperspaces and UbicKids. Journal of
[Online]
Available
from:
http://books.google.lk/books?id=-
Se2tX3Mru0C&pg=PA240&lpg=PA240&dq=Ubiquitous+Intelligence+in+Smart
+World&source=bl&ots=ahuQqqDKKq&sig=eot85FLFK6RtXyDE89x3lgpaQIg
&hl=en&ei=kqmHTr3DIb5rQej7_zVDA&sa=X&oi=book_result&ct=result&resnum=6&ved=0CDgQ
6AEwBTgK#v=onepage&q=Ubiquitous%20Intelligence%20in%20Smart
[Online]
Available
http://cis.k.hosei.ac.jp/~jianhua/mahome/UbicKids.pdf
September 2011]
53
from:
[Accessed:
27th
GF1131COM / GF1171COM
September 2011]
Rozenberg, G & Spaink, P.H. (2005). Natural computing. [Online] Available
from:
http://www.springer.com/computer/theoretical+computer+science/journal/11047
54
GF1131COM / GF1171COM
55
GF1131COM / GF1171COM
Abstract
Ubiquitous computing is simply an approach of creating an environment through
computer intelligence devices embedded in such a way, where connectivity is available
always and users are allowed to use the connectivity anytime at anywhere. Ubiquitous
computing is still maturing, growing area and currently many companies working on to
make ubiquitous projects reality for general public.
Within last few years security in ubiquitous computing has become a one of the
challenging research topic area in information technology. It is important that the
sensitive information of users are secured from the rest. The privacy in ubiquitous
environment should always require a careful consideration. Currently lack of proper
security technologies in ubiquitous computing has become a serious issue on
development of ubiquitous systems. Without well-defined standards of user privacy,
ubiquitous computing application may lose the control of personal information of its
user to the worse. Therefore security and privacy in ubiquitous computing environments
should be highly considered.
56
GF1131COM / GF1171COM
1.0 Introduction
According to Stajano (2002, p.8) Ubiquitous Computing (ubicomp) denotes vision of
the world which defines as Everywhere Computing. Furthermore Greenfiled (2006,
p.11) mentioned that Mark Weiser who is the creator of Ubiquitous Computing,
introduce ubiquitous computing as Invisible computing where computation is
integrated with physical environments of human beings. Weiser & Brown (1996) stated
that Ubiquitous Computing is the third paradigm of computing revaluation. The era of
Ubiquitous computing still is a maturing area where researchers and companies are
working in-order to make it a reality to general public.
With the increasing users of Ubiquitous environment, the power and limitations such as
connectivity, invisibility and etc. of ubicomp leads to consider the security and privacy
of these environments. The imagination effort will only be effective when potential
security steps were identified in-order to ensure the security of the ubicomp
environments.
57
GF1131COM / GF1171COM
Confidentiality
The Confidentiality is ensuring that the information can only be read by authorized
principals. (Stajano, 2002) The confidentiality needs protection mechanisms which
avoids threat of information disclosure. According to Stajano (2002, p.61) the
primary mechanism used for protect confidentiality of information is encryption,
decryption. Since ubiquitous computing is an everywhere connectivity available
computing approach, confidentiality of information is highly essential. With the use
of different powerful encryption methods the confidentiality can be ensured.
Integrity
Integrity is the property which ensures that the information can only accessed and
modified by the authorized principals. The integrity is applied for information within
a host as well as for information which transit between hosts.
Mostly the
Availability
Availability is that ensuring authorized principals are able to access the system and
the information in the system as preferred without any delays. According to Stajano
(2002, p.75) when a user issued a request to a particular service, depending on the
corresponding waiting time the threat to availability which is called as Denial of
Service can be determined. Availability is primary important concern in Ubiquitous
58
GF1131COM / GF1171COM
59
GF1131COM / GF1171COM
3.0 Authentication
Authentication is a security feature which is used to identify the legitimate users. It is an
essential considerable entity in ubiquitous environment. Security authentication
approaches that are used in current are passwords, PIN codes, biometric information and
use of tokens (badges/rings etc.). According to Mallow (n.d) in-order to increase the
reliability and security of a particular system, some propose security mechanism named
as multi-factor authentication which consists with combination of multiple factors. In
current biometric authentication has become a popular authentication approach while
traditional authentication approaches such as password and username becomes less used
in high security systems. Biometric authentication is discussed further in the following
section.
60
GF1131COM / GF1171COM
jaw, chin, width of the node and etc. With use of these measurements the each
different unique thermograms) which will be not change due to any factor.
Fingerprint recognition - Fingerprint of an individual is a unique characteristic
which remains constant throughout a ones life time. According to the
technovelgy (n.d) fingerprint recognition uses pattern of ridges on the finger and
template is created with the distinctive pattern found in the image. But when
livescan is performed, due to dust, dirt on the finger or scanner it may provide
inaccurate results.
Voice recognition - Voice recognition is performed with measuring the audio
patterns of a individual. Like face authentication the voice authentication is nonintrusive. (Because it can be performed without users knowledge). But since
voice recognition is affected by certain factors such as background noise, users
scan.
Iris recognition - Iris recognition measures for the iris patterns and color of the
iris in the eye. A persons iris patterns are unique and remain same throughout the
lifetime. In-order to perform the measurements the factors such as light
conditions, distance between camera and the user are considered. Iris recognition
61
GF1131COM / GF1171COM
(Mallow, n.d)
Benefits of biometrics
With use of biometric authentication, security flows of a system can be enhanced.
Biometric authentication approaches are less susceptible from human errors since the
security of a particular device doesnt depend of human effort. Also biometrics are less
affected by attacker than traditional passwords. Since biometrics are characteristic which
will not require any human remembrance and carrying, it is very convenient for the users
and less prone to misuse compared to other authentication approaches.
62
GF1131COM / GF1171COM
63
GF1131COM / GF1171COM
4.2.1 Eavesdropping
According to OWASP (2008) Eavesdropping is an attack allows adversaries to capture
data packets which transmits over the network between the users and read the sensitive
information such as passwords or any other confidential data of the users without
awareness of the legitimate user. The network eavesdropping is done with the use of tool
named network sniffers (OWASP, 2008) and this tool is capable of capturing the
packets which are in the network. According to Mayrhofer (2008, p.8) in-order to
protect sensitive information of the users from eavesdropping attack the messages which
transmits over the network should be encrypted.
(OWASP, 2009)
64
GF1131COM / GF1171COM
GF1131COM / GF1171COM
they actually communicate with the adversary which will block, modify the messages
sent on the link. With use of cryptography protocol and strong authentication will
prevent system from Man-in-the-Middle attacks.
(OWASP, 2009)
4.3.1 Confusion
According to Mayrhofer (2008, p.9) Confusion is a threat which uses services such as
interacting with another user or device than intended to. Mostly this threat causes by
positioning devices close or having similar names and the respective user interface will
take the responsible in order to prevent it. Confusions will also occur by interacting with
malicious services instead of the original one. Generally those kinds of threats are hard
to identify other than some specific programs which takes effective actions against it.
However, different protocols can use to reduce the impact of the threat.
66
GF1131COM / GF1171COM
67
GF1131COM / GF1171COM
5.0 Conclusion
Security and privacy of ubiquitous computing environment should always require an
important priority. In future ubiquitous computing will be a powerful technology which
leads the human activities. But without considering the standards of security and ethics
the new technology will not be effective to the user as it requires.
In any ubiquitous device the fundamental properties of security which are
confidentiality, integrity and availability should be well maintained in-order to have a
well secured, successful device. The ubiquitous computing environment consists with
devices interconnected network architecture. Therefore ubiquitous devices are more
prone for attacks if appropriate powerful security mechanisms as not performed.
And also when concerning authentication of ubiquitous environment, biometric
authentication approaches such as face thermogram authentication, fingerprint
authentication are more reliable and convenient than traditional authentication methods.
Though face thermogram authentication requires large capacity storage within few
years time there will be mechanism to decrease the capacities of the files. Therefore
with the improvement of the technology these drawbacks will be fade away and will
become more powerful authentication mechanisms in ubiquitous environment.
Currently there are no standardized ethical principles available and which is only
available are ethical guidelines proposed by different recognized authors. Therefore
with use of standardized ethical guidelines will enhance the security of ubiquitous
environment.
68
GF1131COM / GF1171COM
6.0 References
[Accessed:
25th
September 2011]
DigitalPersona. (n.d). Enhancing Security with Biometric Authentication.
[Online]
Available
from:
http://www.comptalk.com/documents/white-
http://books.google.lk/books?
id=dc0hNrV0CwMC&printsec=frontcover#v=onepage&q&f=false
[Accessed:
Available
from:
http://www.technovelgy.com/ct/Technology-
69
Available
[Accessed:
from:
30th
GF1131COM / GF1171COM
[Accessed:
30th
September 2011]
US-CERT. (2009). National Cyber Alert System. [Online] Available from:
http://www.us-cert.gov/cas/tips/ST04-015.html [Accessed: 2nd October 2011]
Weiser, M. & Brown, J. (1996). The coming age of calm technology. [Online]
Available from: http://www.ubiq.com/hypertext/weiser/acmfuture2endnote.htm
[Accessed: 1st October 2011]
70
GF1131COM / GF1171COM
71
GF1131COM / GF1171COM
1.0 Introduction
Ubiquitous computing is achieved through the interoperability of sensors/actuators,
context-awareness, social computing, continuous computing and digital memories.
While each of the above mentioned components play a major role in ubiquitous
computing; context awareness can be considered as the primary component that drives
ubiquitous computing. Context awareness in essence is a framework which comprises of
the context (which is the information gathered in relation to the questions of who, what,
when, where and why) and agents. Agents can be considered as components of a system
or a software abstraction that assist people and act on their behalf, they are autonomous,
reactive and goal driven. By tying the awareness of the five questions (5w), into an
intelligent system, the context aware framework is able to organize a halo of information
around an individual.
(Mark Weiser, 1996)
In its initial stage, ubiquitous computing was envisioned as multiple computers and other
agents such as sensors etc. working together to achieve the purpose of simplifying
peoples lives while being invisible. Since then a great deal of research has been
conducted towards multi agent systems, which identified key challenges such as
achieving serendipitous interoperability (the ability for agents to discover and utilize
services that they are not familiar with) and an efficient ontology (the hierarchical data
structure that contains the relevant entities and their relationships and rules within a
provided knowledge area), identifying the solutions to these challenges, requires that an
efficient communication network is setup between agents. Hence this research will
cover communication infrastructure and efficient communication strategies that ought to
be practiced for deploying an interoperable multi agent system in ubiquitous computing.
(Kevin Reagan, 2010)
72
GF1131COM / GF1171COM
According to (Dr.P.C. Jain, 2006) the infrastructure of ubiquitous network is such that, it
would be presented as a federation of networks, where services which are user oriented,
will be available anywhere at any time, at no operational cost. Users, who are an integral
part of ubiquitous computing, are able to access and share information regardless of their
location or the device they are interacting with. This is made possible by the use of
mobile access, broad band and intelligent home appliances that can access the network.
Nano scale computer will be embedded into the users environment and objects within
that environment, such that they will be integrated via a wireless network, and also be
linked to the internet. Deploying the communication infrastructure for ubiquitous
computing depends heavily on the combination of IP networks and broad band wireless
access, such that mobile, consumer electronics and optical communications are
combined into one universal network as viewed by (Dr.P.C. Jain, 2006).
73
GF1131COM / GF1171COM
74
GF1131COM / GF1171COM
Figure 31: Agent Communication Infrastructure in Ubiquitous Computing - Use of RFID tags
( thewirelessreport.com, 2009)
75
GF1131COM / GF1171COM
76
GF1131COM / GF1171COM
Since agents (devices) are mostly mobile, the topology can be considered as
dynamic
Figure 32: Agent Communication Infrastructure in Ubiquitous Computing - Comparison of WAUN with other
Wireless Standards
77
GF1131COM / GF1171COM
( ntt.co.jp, 2009 )
78
GF1131COM / GF1171COM
hardware resources.
Models that consist of mobile devices with limited energy can be affected by
information overload, since mobile communication is heavy on power
consumption.
Models which might also involve humans can be affected, since humans are
more prone to information overload than computers.
79
GF1131COM / GF1171COM
Quantitative AI based solutions can also be applied to this problem, which will allow the
usage of decision trees and probability theory; these will be discussed in depth later in
this report.
When discussing efficient communication strategies for agents, it is important to take
into consideration minimizing communication loads, this can be achieved by agents
adopting efficiency measures such as:
acquired.
Using efficient interaction Query and Publish/Subscribe mechanisms.
Using Conditional Subscription mechanism, which allows the agent to be
notified about something when a condition is true.
The above discussed efficiency mechanisms will be discussed in detail later in this
report.
80
GF1131COM / GF1171COM
Artificial Intelligence
Software Engineering
Semantic Web
Information Architecture
Library Science
81
GF1131COM / GF1171COM
The above figure is an example that illustrates the use of layered ontology for
communication in a multi agent system in ubiquitous computing. In this example the
PDA (Agent 3) deals with a high level concept of what constitutes a crisis level. The
other component (Agent 2) has less abstract information such as fire and other hazards,
the sensory agent (Agent 1) possess low level information such as the temperature of an
environment.
The ontology of each of these agents is composed of several contexts, which are then
related by the translations of the contexts between them, specified by mappings. As
shown above each concept (e.g. Temperature) belong to a specific context (e.g. Temp),
Agent 3s ontology consist of concepts from two contexts (Fire and Temp), hence Agent
3 relates context Fire with context Crisis by means of mapping, which is indicated in the
figure above by a blue layer.
Given that a wireless ad-hoc network exists, allowing agents to pick up on each others
presence, explore the contexts that are embed within each others ontologies and also
transfer data to each other. A communication path is initiated to resolve the information
need of an agent. Taking into consideration the above example, Agent 3 finds the need
for the information (Crisis: Dangerous). To satisfy its information needs for the concept
(Dangerous), it starts searching other agents ontologies thats contain the concept
82
GF1131COM / GF1171COM
(Dangerous), since no other agent has this concept Agent 3 translates the concept
(Dangerous) into a lower level concept (Fire) via the usage of mapping. The concept fire
can be there for be queried to Agent 2 which is familiar with the concept, but needs to
translate the concept (Fire) to a lower level concept (Temperature), such that it can pass
on the query to Agent 1, and since Agent 1 is a sensory agent, it is able to obtain
information directly from the world, this transition marks the end of the chain of queries.
83
GF1131COM / GF1171COM
84
GF1131COM / GF1171COM
least likely to occur causes ). To apply this same mechanism in agent communication, a
quantitative measure known as the information gain is used. This measure allows the
agent to gain an insight as to how close the agent is getting to satisfy its information
need by targeting its queries towards a specific concept.
Information gain measures the expected reduction in information entropy (which
measures the purity of information), this process allows for reducing information load,
by means of agents basing their queries on concepts that have the highest information
gain. Then by repeatedly organizing the concepts in order based on their information
gain, decision trees can be constructed which will inform the agent, the order in which
the concepts are to be queried. The construction of the decision tree is primarily done by
ID3 algorithms. The figure below illustrates the process of deriving decision trees for
agents to identify the order in which they are supposed to query concepts.
(Robert-Jan Beun, 2008)
Figure 34: Agent Communication - Using Information Gain to Derive Decision Trees
85
GF1131COM / GF1171COM
86
GF1131COM / GF1171COM
Figure 35: Agent Communication - Conditional Subscription and Redirected Information Flow
87
GF1131COM / GF1171COM
4.0 Conclusion
Agents, who are the most integral part of the UC paradigm, allowed me to conclude, that
communication amongst these agents is as important as agents themselves. Since
integration of agents enhance the UC paradigm to unprecedented levels.
While having established that seamless communication amongst agents is important, its
should be realized that efficient communication is also important.
This will allow for efficient usage of resources, which agents in ubiquitous computing
have in limited levels.
88
GF1131COM / GF1171COM
5.0 Reference
Ubiquitious
Computing.
http://www.slideshare.net/kmregan/ubiquitous-computing-2179363.
Last
Last
Available:
Last
Available:
(2008).
Agent
(2008).
Layered
Ontologies.
Available:
2011.
Jurriaan van Diggelen, Robbert-Jan Beun, Rogier M. van Eijk, Peter J.
Werkhoven (2008). Agent . (2008).Communication Mechanism. Available:
www.cs.uu.nl/research/projects/icis/IA/AAMAS08.pdf. Last accessed 27th Sep
2011.
Jurriaan van Diggelen, Robbert-Jan Beun, Rogier M. van Eijk, Peter J.
Werkhoven (2008). Agent . (2008). Informative Concepts. Available:
www.cs.uu.nl/research/projects/icis/IA/AAMAS08.pdf. Last accessed 27th Sep
2011.
thewirelessreport.
(2009).
RFID
tracking
capabilities.
Available:
GF1131COM / GF1171COM
(2008).
Agent
(2008).
Decision
Trees.
Available:
2011.
Jurriaan van Diggelen, Robbert-Jan Beun, Rogier M. van Eijk, Peter J.
Werkhoven
(2008). Agent
(2008).
Query
vs
Subscribe. Available:
2011.
Dr.P.C.Jain. (2006). Ubiquitous Computing and Communication An
Introduction.
Available:
http://220.156.188.21/CDAC/ASCNT_2009/ASCNT
Available:
90