You are on page 1of 11

MSC Program

Mobile computing
Individual Assignment

Submitted to Belachew R (Ph.D.)


Introduction
 In 1991 – over 30 years ago – Mark Weiser presented his vision
for the future of computing and the concept of Ubiquitous
Computing in his seminal article The computer for the 21st
Century.
 Ubiquitous Computing is a concept where computing
technologies are becoming small enough to be seamlessly
integrated into our everyday life and “find their way invisibly
into people’s lives” .
 This idea also comes in a variety of other names such as:
pervasive computing, ambient intelligence, or Internet of
Things (IoT).
 Now, 30 years later, we live in the 21st century and a lot of
Weiser’s original vision has already become reality.
 Weiser, in his prophetic paper, argued the
most far-reaching technologies are those that
allow themselves to disappear, vanish into
thin air.
 According to Weiser, this oblivion is a human–
not a technological– phenomenon:
“Whenever people learn something
sufficiently well, they cease to be aware of it,
he claimed.
 A quarter of a century later, however, Weiser’s
dream is far from becoming true. Over the
years, many of his concepts regarding
Ubiquitous Computing Ubi-Comp have been
materialized into what today we call Wireless
Sensor Networks, Internet of Things
Wearable's and Cyber-Physical Systems .
 The applications of these systems range from
traffic accident and CO2 emission monitoring
to autonomous automobile and patient in-
home care.
Summary
• Ubi-Comp poses new drawbacks because,
traditional computing, it exhibits and entirely
different outlook.
• Computer systems in Ubi-Comp, for instance,
feature sensors, CPU, and actuators.
• Those capabilities, in turn, make proposals for
conventional computer Ubi-Comp setting and
present new challenges
 Intheabovescenarios,someofthemostcriticalchall
enges lie in the areas of Security and Privacy .
 This is so because the market and users often
pursue a system full of features at the expense of
proper operation and protection; although,
conversely, as computing elements pervade our
daily lives, the demand for stronger security
schemes becomes greater than ever.
 Notably, there is a dire need for a secure
mechanism able to encompass all aspects and
manifestations of Ubi-comp, across time as well
as space, and in a seamless and efficient manner.
Camper feature recent Technology
 In this paper, we discuss contemporary
security and privacy issues in the context of
Ubi-Comp.
 We examine multiple research problems still
open and point to promising approaches
towards their solutions.
 More precisely, we investigate the following
challenges and their ramifications.
1. Software protection
2. Cryptography engineering
3. Long-term security
4. Privacy implications
We claim that only if we get the challenges
right, we can turn the science fiction of
Ubi-Comp into science fact.
Features Technology
 Ubi-Comp systems are by definition
heterogeneousplatforms,connectingdevicesofmassiv
elydifferentcomputation and storage power.
 Designing a cryptographic architecture for any
heterogeneous system requires assigning clearly
defined roles and security properties to each entity in
the system.
 Resource-constrained devices should receive less
computationally intensive tasks, and their lack of
tamper resistance protections indicate that long-
term secrets should not reside in these devices.
Conclusion
 In the words of Mark Weiser, Ubiquitous
Computing is “the idea of integrating
computers seamlessly into the world at large.
 Thus, far from being a phenomenon from this
time, the design and practice of Ubi-Comp
systems were already being discussed one
quarter of a century ago.
Thank yo u !

You might also like