+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)


Pervasive Computing and Networking. Edition No. 1

  • ID: 1922640
  • Book
  • June 2011
  • 344 Pages
  • John Wiley and Sons Ltd
This book presents state-of-the-art research on architectures, algorithms, protocols and applications in pervasive computing and networks

With the widespread availability of wireless and mobile networking technologies and the expected convergence of ubiquitous computing with these emerging technologies in the near future, pervasive computing and networking research and applications are among the hot topics on the agenda of researchers working on the next generation of mobile communications and networks.

This book provides a comprehensive guide to selected topics, both ongoing and emerging, in pervasive computing and networking. It contains contributions from high profile researchers and is edited by leading experts in this field. The main topics covered in the book include pervasive computing and systems, pervasive networking security, and pervasive networking and communication.

Key Features:

  • Discusses existing and emerging communications and computing models, design architectures, mobile and pervasive wireless applications, technology and research challenges in pervasive computing systems, networking and communications
  • Provides detailed discussions of key research challenges and open research issues in the field of autonomic computing and networking
  • Offers information on existing experimental studies including case studies, implementation test-beds in industry and academia
  • Includes a set of PowerPoint slides for each chapter for instructors adopting it as a textbook

Pervasive Computing and Networking will be an ideal reference for practitioners and researchers working in the areas of communication networking and pervasive computing and networking. It also serves as an excellent textbook for graduate and senior undergraduate courses in computer science, computer engineering, electrical engineering, software engineering, and information engineering and science.

Note: Product cover images may vary from those shown
List of Contributors

About the Editors


1 Introduction
Mohammad S. Obaidat and Isaac Woungang

1.1 Pervasive Computing and Its Significance

1.2 Research Trends in Pervasive Computing and Networking

1.3 Scanning the Book

1.4 Target Audience

1.5 Supplementary Resources

1.6 Acknowledgments


2 Tools and Techniques for Dynamic Reconfiguration and Interoperability of Pervasive Systems
Evens Jean, Sahra Sedigh, Ali R. Hurson, and Behrooz A. Shirazi

2.1 Introduction.

2.2 Mobile Agent Technology

2.3 Sensor Networks

2.4 Collaboration and Interoperability Among Sensor Networks

2.5 Applications

2.6 Conclusion


3 Models for Service and Resource Discovery in Pervasive Computing
Mehdi Khouja, Carlos Juiz, Ramon Puigjaner, and Farouk Kamoun

3.1 Introduction

3.2 Service Oriented Architecture

3.3 Industry and Consortia Supported Models for Service Discovery

3.4 Research Initiatives in Service Discovery for Pervasive Systems

3.5 Conclusions


 4 Pervasive Learning Tools and Technologies
Neil Y. Yen, Qun Jin, Hiroaki Ogata, Timothy K. Shih, and Y. Yano

4.1 Introduction

4.2 Pervasive Learning: A Promising Innovative Paradigm

4.3 Emerging Technologies and Systems for Pervasive Learning

4.4 Integration of Real-World Practice and Experience with Pervasive Learning

4.5 Nature of Pervasive Learning and Provision of Well-Being in Education

4.6 Conclusion


 5 Service Management in Pervasive Computing Environments
Jiannong Cao, Joanna Siebert, and Vaskar Raychoudhury

5.1 Introduction

5.2 Service Management in Pervasive Computing Environments

5.3 Techniques for Service Management in PvCE

5.4 Service Composition

5.5 Conclusions


 6 Wireless Sensor Cooperation for a Sustainable Quality of Information
Abdelmajid Khelil, Christian Reinl, Brahim Ayari, Faisal Karim Shaikh, Piotr Szczytowski, Azad Ali, and Neeraj Suri

6.1 Introduction

6.2 Sensing the Real World

6.3 Inter-Sensor Cooperation

6.4 Mobile Sensor Cooperation

6.5 Cooperation Across Mobile Entities

6.6 Inter-WSN Cooperation

6.7 Conclusions and Future Research Directions


 7 An Opportunistic Pervasive Networking Paradigm: Multi-Hop Cognitive Radio Networks
Didem Gozupek and Fatih Alagoz

7.1 Introduction

7.2 Overview of Multi-Hop Cognitive Radio Networks MAC Layer

7.3 Proposed Mac Layer Protocols

7.4 Open Issues

7.5 Conclusions


 8 Wearable Computing and Sensor Systems for Healthcare
Franca Delmastro and Marco Conti

8.1 Introduction

8.2 The Health Body Area Network

8.3 Medical and Technological Requirements of Health Sensors

8.4 Wearable Sensors for Vital Signals Monitoring

8.5 Wearable Sensors for Activity Recognition

8.6 Sensors and Signals for Emotion Recognition

8.7 Intra-BAN Communications in Pervasive Healthcare Systems: Standards and Protocols

8.8 Conclusions


 9 Standards and Implementation of Pervasive Computing Applications
Daniel Cascado, Jose Luis Sevillano, Luis Fernandez-Luque, Karl Johan Grøttum, L. Kristian Vognild, and T. M. Burkow

9.1 Introduction

9.2 Wireless Technologies and Standards

9.3 Middleware

9.4 Case Studies



10 Security and Privacy in Pervasive Networks
Tarik Guelzim and Mohammad S. Obaidat

10.1 Introduction

10.2 Security Classics

10.3 Hardening Pervasive Networks

10.4 Privacy in Pervasive Networks

10.5 Conclusion


11 UnderstandingWormhole Attacks in Pervasive Networks
Isaac Woungang, Sanjay Kumar Dhurandher, and Abhishek Gupta

11.1 Introduction

11.2 A Wormhole Attack

11.3 Severity of a Wormhole Attack

11.4 Background

11.5 Classification of Wormholes

11.6 Wormhole Attack Modes

11.7 Mitigating Wormhole Attacks

11.8 Discussion of Some Mitigating Solutions to Avoid Wormhole Attacks

11.9 Conclusion and Future Work


12 An Experimental Comparison of Collaborative Defense Strategies for Network Security
Hao Chen and Yu Chen

12.1 Introduction

12.2 Background

12.3 Small-World Network Based Modeling Platform

12.4 Internet Worm Attack and Defense

12.5 Experiments and Performance Evaluation

12.6 Conclusions


13 Smart Devices, Systems and Intelligent Environments
Joaquin Entrialgo and Mohammad S. Obaidat

13.1 Introduction

13.2 Smart Devices and Systems

13.3 Intelligent Environments

13.4 Trends

13.5 Limitations and Challenges

13.6 Applications and Case Studies

13.7 Conclusion



14 Autonomic and Pervasive Networking
Thabo K. R. Nkwe, Mieso K. Denko, and Jason B. Ernst

14.1 Introduction

14.2 Ubiquitous/Pervasive Networks

14.3 Applying Autonomic Techniques to Ubiquitous/Pervasive Networks

14.4 Self-* (star) In Autonomic and Pervasive Networks

14.5 Autonomic and Pervasive Networking Challenges

14.6 Conclusions and Future Directions


15 An Adaptive Architecture of Service Component for Pervasive Computing
Fei Li, Y. He, Athanasios V. Vasilakos, and Naixue Xiong

15.1 Introduction

15.2 Motivation

15.3 An Overview of the Delaying Adaptation Tool

15.4 Case Study

15.5 Related Work

15.6 Conclusions


16 On Probabilistic k-Coverage in Pervasive Wireless Sensor Networks
Habib M. Ammari

16.1 Introduction

16.2 The Coverage Problem

16.3 Coverage Configuration Problem

16.4 Stochastic k-Coverage Protocol

16.5 Conclusion


17 On the Usage of Overlays to Provide QoS Over IEEE 802.11b/g/e Pervasive and Mobile Networks
Luca Caviglione, Franco Davoli, and Piergiulio Maryni

17.1 Introduction

17.2 A Glance at P2P Overlay Networks and QoS Mechanisms

17.3 Design of Overlays to Support QoS

17.4 Performance Evaluation

17.5 Conclusions and Future Developments

Appendic I. The Distributed Algortihm for Bandwidth Management


18 Performance Evaluation of Pervasive Networks Based on WiMAX Networks
Elmabruk Laias and Irfan Awan

18.1 Introduction

18.2 IEEE 802.16 Architecture and QoS Requirements

18.3 Related Work

18.4 Proposed QoS Framework

18.5 Simulation Experiments and Numerical Results

18.6 Summary


19 Implementation Frameworks for Mobile and Pervasive Networks
Bilhanan Silverajan and Jarmo Harju

19.1 Introduction

19.2 Correlating Design to Implementations

19.3 Challenges for Implementation Frameworks

19.4 State of the Art in Implementation Frameworks

19.5 Current Frameworks Research for Network Protocols and Applications

19.6 Evaluating Frameworks and Implementations

19.7 Conclusion



Note: Product cover images may vary from those shown
Mieso Denko University of Guelph.

Isaac Woungang Ryerson University.

Mohammad S. Obaidat Monmouth University.
Note: Product cover images may vary from those shown