Pervasive Computing and Networking
Herausgegeben von Obaidat, Mohammad S.; Denko, Mieso; Woungang, Isaac
Pervasive Computing and Networking
Herausgegeben von Obaidat, Mohammad S.; Denko, Mieso; Woungang, Isaac
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book presents state-of-the-art research on architectures, algorithms, protocols and applications in pervasive computing and networks
With the widespread availability of wireless and mobile networking technologies and the expected convergence of ubiquitous computing with these emerging technologies in the near future, pervasive computing and networking research and applications are among the hot topics on the agenda of researchers working on the next generation of mobile communications and networks.
This book provides a comprehensive guide to selected topics, both ongoing and…mehr
Andere Kunden interessierten sich auch für
- Paolo SantiMobility Models for Next Generation Wireless Networks131,99 €
- Harry G. PerrosAn Introduction to ATM Networks133,99 €
- Maciej StasiakModeling and Dimensioning of Mobile Wireless Networks116,99 €
- Kaveh PahlavanNetworking Fundamentals223,99 €
- Vijay KumarFundamentals of Pervasive Information Management Systems119,99 €
- Kihong Park / Walter Willinger (Hgg.)Self-Similar Network Traffic and Performance Evaluation214,99 €
- Kaveh PahlavanNetworking Fundamentals108,99 €
-
-
-
This book presents state-of-the-art research on architectures, algorithms, protocols and applications in pervasive computing and networks
With the widespread availability of wireless and mobile networking technologies and the expected convergence of ubiquitous computing with these emerging technologies in the near future, pervasive computing and networking research and applications are among the hot topics on the agenda of researchers working on the next generation of mobile communications and networks.
This book provides a comprehensive guide to selected topics, both ongoing and emerging, in pervasive computing and networking. It contains contributions from high profile researchers and is edited by leading experts in this field. The main topics covered in the book include pervasive computing and systems, pervasive networking security, and pervasive networking and communication.
Key Features:
Discusses existing and emerging communications and computing models, design architectures, mobile and pervasive wireless applications, technology and research challenges in pervasive computing systems, networking and communications
Provides detailed discussions of key research challenges and open research issues in the field of autonomic computing and networking
Offers information on existing experimental studies including case studies, implementation test-beds in industry and academia
Includes a set of PowerPoint slides for each chapter for instructors adopting it as a textbook
Pervasive Computing and Networking will be an ideal reference for practitioners and researchers working in the areas of communication networking and pervasive computing and networking. It also serves as an excellent textbook for graduate and senior undergraduate courses in computer science, computer engineering, electrical engineering, software engineering, and information engineering and science.
With the widespread availability of wireless and mobile networking technologies and the expected convergence of ubiquitous computing with these emerging technologies in the near future, pervasive computing and networking research and applications are among the hot topics on the agenda of researchers working on the next generation of mobile communications and networks.
This book provides a comprehensive guide to selected topics, both ongoing and emerging, in pervasive computing and networking. It contains contributions from high profile researchers and is edited by leading experts in this field. The main topics covered in the book include pervasive computing and systems, pervasive networking security, and pervasive networking and communication.
Key Features:
Discusses existing and emerging communications and computing models, design architectures, mobile and pervasive wireless applications, technology and research challenges in pervasive computing systems, networking and communications
Provides detailed discussions of key research challenges and open research issues in the field of autonomic computing and networking
Offers information on existing experimental studies including case studies, implementation test-beds in industry and academia
Includes a set of PowerPoint slides for each chapter for instructors adopting it as a textbook
Pervasive Computing and Networking will be an ideal reference for practitioners and researchers working in the areas of communication networking and pervasive computing and networking. It also serves as an excellent textbook for graduate and senior undergraduate courses in computer science, computer engineering, electrical engineering, software engineering, and information engineering and science.
Produktdetails
- Produktdetails
- Verlag: Wiley & Sons
- 1. Auflage
- Seitenzahl: 344
- Erscheinungstermin: 13. Juni 2011
- Englisch
- Abmessung: 257mm x 180mm x 25mm
- Gewicht: 828g
- ISBN-13: 9780470747728
- ISBN-10: 0470747722
- Artikelnr.: 33684616
- Verlag: Wiley & Sons
- 1. Auflage
- Seitenzahl: 344
- Erscheinungstermin: 13. Juni 2011
- Englisch
- Abmessung: 257mm x 180mm x 25mm
- Gewicht: 828g
- ISBN-13: 9780470747728
- ISBN-10: 0470747722
- Artikelnr.: 33684616
Professor Mohammad Obaidat, Monmouth University, USA Mohammad Obaidat received his Ph.D. and M. S. degrees in Computer Engineering with a minor in Computer Science from The Ohio State University, Columbus, Ohio, USA. Dr. Obaidat is currently a full Professor of Computer Science at Monmouth University, NJ, USA. Among his previous positions are Chair of the Department of Computer Science and Director of the Graduate Program at Monmouth University and a faculty member at the City University of New York. Professor Mieso Denko, University of Guelph, Canada Mieso Denko received his MSc form the University of Wales, UK, and his PhD from the University of Natal, South Africa, both in Computer Science. Since November 2002, Dr. Denko has been with the Department of Computing and Information Science, Guelph, Ontario, Canada, where he is now an Associate Professor. Dr. Isaac Woungang, Ryerson University, Canada Isaac Woungang received his M.Sc and Ph.D degrees all in Mathematics from Université de la Méditerranée-Aix Marseille II, Luminy, France, and Université du Sud, Toulon-Var, France, in 1990 and 1994 respectively. In 1999, he received an M.A.Sc from the INRS-Énergie, Matériaux et Télécommunications, University of Quebec, Montreal, Canada. From 1999 to 2002, he worked as a Software engineer at Nortel Networks. Since 2002, he has been with the Department of Computer Science at Ryerson University.
List of Contributors About the Editors PART ONE PERVASIVE COMPUTING AND
SYSTEMS 1 Introduction Mohammad S. Obaidat and Isaac Woungang 1.1 Pervasive
Computing and Its Significance 1.2 Research Trends in Pervasive Computing
and Networking 1.3 Scanning the Book 1.4 Target Audience 1.5 Supplementary
Resources 1.6 Acknowledgments References 2 Tools and Techniques for Dynamic
Reconfiguration and Interoperability of Pervasive Systems Evens Jean, Sahra
Sedigh, Ali R. Hurson, and Behrooz A. Shirazi 2.1 Introduction. 2.2 Mobile
Agent Technology 2.3 Sensor Networks 2.4 Collaboration and Interoperability
Among Sensor Networks 2.5 Applications 2.6 Conclusion References 3 Models
for Service and Resource Discovery in Pervasive Computing Mehdi Khouja,
Carlos Juiz, Ramon Puigjaner, and Farouk Kamoun 3.1 Introduction 3.2
Service Oriented Architecture 3.3 Industry and Consortia Supported Models
for Service Discovery 3.4 Research Initiatives in Service Discovery for
Pervasive Systems 3.5 Conclusions References 4 Pervasive Learning Tools and
Technologies Neil Y. Yen, Qun Jin, Hiroaki Ogata, Timothy K. Shih, and Y.
Yano 4.1 Introduction 4.2 Pervasive Learning: A Promising Innovative
Paradigm 4.3 Emerging Technologies and Systems for Pervasive Learning 4.4
Integration of Real-World Practice and Experience with Pervasive Learning
4.5 Nature of Pervasive Learning and Provision of Well-Being in Education
4.6 Conclusion References 5 Service Management in Pervasive Computing
Environments Jiannong Cao, Joanna Siebert, and Vaskar Raychoudhury 5.1
Introduction 5.2 Service Management in Pervasive Computing Environments 5.3
Techniques for Service Management in PvCE 5.4 Service Composition 5.5
Conclusions References 6 Wireless Sensor Cooperation for a Sustainable
Quality of Information Abdelmajid Khelil, Christian Reinl, Brahim Ayari,
Faisal Karim Shaikh, Piotr Szczytowski, Azad Ali, and Neeraj Suri 6.1
Introduction 6.2 Sensing the Real World 6.3 Inter-Sensor Cooperation 6.4
Mobile Sensor Cooperation 6.5 Cooperation Across Mobile Entities 6.6
Inter-WSN Cooperation 6.7 Conclusions and Future Research Directions
References 7 An Opportunistic Pervasive Networking Paradigm: Multi-Hop
Cognitive Radio Networks Didem Gozupek and Fatih Alagoz 7.1 Introduction
7.2 Overview of Multi-Hop Cognitive Radio Networks MAC Layer 7.3 Proposed
Mac Layer Protocols 7.4 Open Issues 7.5 Conclusions References 8 Wearable
Computing and Sensor Systems for Healthcare Franca Delmastro and Marco
Conti 8.1 Introduction 8.2 The Health Body Area Network 8.3 Medical and
Technological Requirements of Health Sensors 8.4 Wearable Sensors for Vital
Signals Monitoring 8.5 Wearable Sensors for Activity Recognition 8.6
Sensors and Signals for Emotion Recognition 8.7 Intra-BAN Communications in
Pervasive Healthcare Systems: Standards and Protocols 8.8 Conclusions
References 9 Standards and Implementation of Pervasive Computing
Applications Daniel Cascado, Jose Luis Sevillano, Luis Fernandez-Luque,
Karl Johan Grøttum, L. Kristian Vognild, and T. M. Burkow 9.1 Introduction
9.2 Wireless Technologies and Standards 9.3 Middleware 9.4 Case Studies
References PART TWO PERVASIVE NETWORKING SECURITY. 10 Security and Privacy
in Pervasive Networks Tarik Guelzim and Mohammad S. Obaidat 10.1
Introduction 10.2 Security Classics 10.3 Hardening Pervasive Networks 10.4
Privacy in Pervasive Networks 10.5 Conclusion References 11
UnderstandingWormhole Attacks in Pervasive Networks Isaac Woungang, Sanjay
Kumar Dhurandher, and Abhishek Gupta 11.1 Introduction 11.2 A Wormhole
Attack 11.3 Severity of a Wormhole Attack 11.4 Background 11.5
Classification of Wormholes 11.6 Wormhole Attack Modes 11.7 Mitigating
Wormhole Attacks 11.8 Discussion of Some Mitigating Solutions to Avoid
Wormhole Attacks 11.9 Conclusion and Future Work References 12 An
Experimental Comparison of Collaborative Defense Strategies for Network
Security Hao Chen and Yu Chen 12.1 Introduction 12.2 Background 12.3
Small-World Network Based Modeling Platform 12.4 Internet Worm Attack and
Defense 12.5 Experiments and Performance Evaluation 12.6 Conclusions
References 13 Smart Devices, Systems and Intelligent Environments Joaquin
Entrialgo and Mohammad S. Obaidat 13.1 Introduction 13.2 Smart Devices and
Systems 13.3 Intelligent Environments 13.4 Trends 13.5 Limitations and
Challenges 13.6 Applications and Case Studies 13.7 Conclusion References
PART THREE PERVASIVE NETWORKING AND COMMUNICATIONS. 14 Autonomic and
Pervasive Networking Thabo K. R. Nkwe, Mieso K. Denko, and Jason B. Ernst
14.1 Introduction 14.2 Ubiquitous/Pervasive Networks 14.3 Applying
Autonomic Techniques to Ubiquitous/Pervasive Networks 14.4 Self-* (star) In
Autonomic and Pervasive Networks 14.5 Autonomic and Pervasive Networking
Challenges 14.6 Conclusions and Future Directions References 15 An Adaptive
Architecture of Service Component for Pervasive Computing Fei Li, Y. He,
Athanasios V. Vasilakos, and Naixue Xiong 15.1 Introduction 15.2 Motivation
15.3 An Overview of the Delaying Adaptation Tool 15.4 Case Study 15.5
Related Work 15.6 Conclusions References 16 On Probabilistic k-Coverage in
Pervasive Wireless Sensor Networks Habib M. Ammari 16.1 Introduction 16.2
The Coverage Problem 16.3 Coverage Configuration Problem 16.4 Stochastic
k-Coverage Protocol 16.5 Conclusion References 17 On the Usage of Overlays
to Provide QoS Over IEEE 802.11b/g/e Pervasive and Mobile Networks Luca
Caviglione, Franco Davoli, and Piergiulio Maryni 17.1 Introduction 17.2 A
Glance at P2P Overlay Networks and QoS Mechanisms 17.3 Design of Overlays
to Support QoS 17.4 Performance Evaluation 17.5 Conclusions and Future
Developments Appendic I. The Distributed Algortihm for Bandwidth Management
References 18 Performance Evaluation of Pervasive Networks Based on WiMAX
Networks Elmabruk Laias and Irfan Awan 18.1 Introduction 18.2 IEEE 802.16
Architecture and QoS Requirements 18.3 Related Work 18.4 Proposed QoS
Framework 18.5 Simulation Experiments and Numerical Results 18.6 Summary
References 19 Implementation Frameworks for Mobile and Pervasive Networks
Bilhanan Silverajan and Jarmo Harju 19.1 Introduction 19.2 Correlating
Design to Implementations 19.3 Challenges for Implementation Frameworks
19.4 State of the Art in Implementation Frameworks 19.5 Current Frameworks
Research for Network Protocols and Applications 19.6 Evaluating Frameworks
and Implementations 19.7 Conclusion References Index
SYSTEMS 1 Introduction Mohammad S. Obaidat and Isaac Woungang 1.1 Pervasive
Computing and Its Significance 1.2 Research Trends in Pervasive Computing
and Networking 1.3 Scanning the Book 1.4 Target Audience 1.5 Supplementary
Resources 1.6 Acknowledgments References 2 Tools and Techniques for Dynamic
Reconfiguration and Interoperability of Pervasive Systems Evens Jean, Sahra
Sedigh, Ali R. Hurson, and Behrooz A. Shirazi 2.1 Introduction. 2.2 Mobile
Agent Technology 2.3 Sensor Networks 2.4 Collaboration and Interoperability
Among Sensor Networks 2.5 Applications 2.6 Conclusion References 3 Models
for Service and Resource Discovery in Pervasive Computing Mehdi Khouja,
Carlos Juiz, Ramon Puigjaner, and Farouk Kamoun 3.1 Introduction 3.2
Service Oriented Architecture 3.3 Industry and Consortia Supported Models
for Service Discovery 3.4 Research Initiatives in Service Discovery for
Pervasive Systems 3.5 Conclusions References 4 Pervasive Learning Tools and
Technologies Neil Y. Yen, Qun Jin, Hiroaki Ogata, Timothy K. Shih, and Y.
Yano 4.1 Introduction 4.2 Pervasive Learning: A Promising Innovative
Paradigm 4.3 Emerging Technologies and Systems for Pervasive Learning 4.4
Integration of Real-World Practice and Experience with Pervasive Learning
4.5 Nature of Pervasive Learning and Provision of Well-Being in Education
4.6 Conclusion References 5 Service Management in Pervasive Computing
Environments Jiannong Cao, Joanna Siebert, and Vaskar Raychoudhury 5.1
Introduction 5.2 Service Management in Pervasive Computing Environments 5.3
Techniques for Service Management in PvCE 5.4 Service Composition 5.5
Conclusions References 6 Wireless Sensor Cooperation for a Sustainable
Quality of Information Abdelmajid Khelil, Christian Reinl, Brahim Ayari,
Faisal Karim Shaikh, Piotr Szczytowski, Azad Ali, and Neeraj Suri 6.1
Introduction 6.2 Sensing the Real World 6.3 Inter-Sensor Cooperation 6.4
Mobile Sensor Cooperation 6.5 Cooperation Across Mobile Entities 6.6
Inter-WSN Cooperation 6.7 Conclusions and Future Research Directions
References 7 An Opportunistic Pervasive Networking Paradigm: Multi-Hop
Cognitive Radio Networks Didem Gozupek and Fatih Alagoz 7.1 Introduction
7.2 Overview of Multi-Hop Cognitive Radio Networks MAC Layer 7.3 Proposed
Mac Layer Protocols 7.4 Open Issues 7.5 Conclusions References 8 Wearable
Computing and Sensor Systems for Healthcare Franca Delmastro and Marco
Conti 8.1 Introduction 8.2 The Health Body Area Network 8.3 Medical and
Technological Requirements of Health Sensors 8.4 Wearable Sensors for Vital
Signals Monitoring 8.5 Wearable Sensors for Activity Recognition 8.6
Sensors and Signals for Emotion Recognition 8.7 Intra-BAN Communications in
Pervasive Healthcare Systems: Standards and Protocols 8.8 Conclusions
References 9 Standards and Implementation of Pervasive Computing
Applications Daniel Cascado, Jose Luis Sevillano, Luis Fernandez-Luque,
Karl Johan Grøttum, L. Kristian Vognild, and T. M. Burkow 9.1 Introduction
9.2 Wireless Technologies and Standards 9.3 Middleware 9.4 Case Studies
References PART TWO PERVASIVE NETWORKING SECURITY. 10 Security and Privacy
in Pervasive Networks Tarik Guelzim and Mohammad S. Obaidat 10.1
Introduction 10.2 Security Classics 10.3 Hardening Pervasive Networks 10.4
Privacy in Pervasive Networks 10.5 Conclusion References 11
UnderstandingWormhole Attacks in Pervasive Networks Isaac Woungang, Sanjay
Kumar Dhurandher, and Abhishek Gupta 11.1 Introduction 11.2 A Wormhole
Attack 11.3 Severity of a Wormhole Attack 11.4 Background 11.5
Classification of Wormholes 11.6 Wormhole Attack Modes 11.7 Mitigating
Wormhole Attacks 11.8 Discussion of Some Mitigating Solutions to Avoid
Wormhole Attacks 11.9 Conclusion and Future Work References 12 An
Experimental Comparison of Collaborative Defense Strategies for Network
Security Hao Chen and Yu Chen 12.1 Introduction 12.2 Background 12.3
Small-World Network Based Modeling Platform 12.4 Internet Worm Attack and
Defense 12.5 Experiments and Performance Evaluation 12.6 Conclusions
References 13 Smart Devices, Systems and Intelligent Environments Joaquin
Entrialgo and Mohammad S. Obaidat 13.1 Introduction 13.2 Smart Devices and
Systems 13.3 Intelligent Environments 13.4 Trends 13.5 Limitations and
Challenges 13.6 Applications and Case Studies 13.7 Conclusion References
PART THREE PERVASIVE NETWORKING AND COMMUNICATIONS. 14 Autonomic and
Pervasive Networking Thabo K. R. Nkwe, Mieso K. Denko, and Jason B. Ernst
14.1 Introduction 14.2 Ubiquitous/Pervasive Networks 14.3 Applying
Autonomic Techniques to Ubiquitous/Pervasive Networks 14.4 Self-* (star) In
Autonomic and Pervasive Networks 14.5 Autonomic and Pervasive Networking
Challenges 14.6 Conclusions and Future Directions References 15 An Adaptive
Architecture of Service Component for Pervasive Computing Fei Li, Y. He,
Athanasios V. Vasilakos, and Naixue Xiong 15.1 Introduction 15.2 Motivation
15.3 An Overview of the Delaying Adaptation Tool 15.4 Case Study 15.5
Related Work 15.6 Conclusions References 16 On Probabilistic k-Coverage in
Pervasive Wireless Sensor Networks Habib M. Ammari 16.1 Introduction 16.2
The Coverage Problem 16.3 Coverage Configuration Problem 16.4 Stochastic
k-Coverage Protocol 16.5 Conclusion References 17 On the Usage of Overlays
to Provide QoS Over IEEE 802.11b/g/e Pervasive and Mobile Networks Luca
Caviglione, Franco Davoli, and Piergiulio Maryni 17.1 Introduction 17.2 A
Glance at P2P Overlay Networks and QoS Mechanisms 17.3 Design of Overlays
to Support QoS 17.4 Performance Evaluation 17.5 Conclusions and Future
Developments Appendic I. The Distributed Algortihm for Bandwidth Management
References 18 Performance Evaluation of Pervasive Networks Based on WiMAX
Networks Elmabruk Laias and Irfan Awan 18.1 Introduction 18.2 IEEE 802.16
Architecture and QoS Requirements 18.3 Related Work 18.4 Proposed QoS
Framework 18.5 Simulation Experiments and Numerical Results 18.6 Summary
References 19 Implementation Frameworks for Mobile and Pervasive Networks
Bilhanan Silverajan and Jarmo Harju 19.1 Introduction 19.2 Correlating
Design to Implementations 19.3 Challenges for Implementation Frameworks
19.4 State of the Art in Implementation Frameworks 19.5 Current Frameworks
Research for Network Protocols and Applications 19.6 Evaluating Frameworks
and Implementations 19.7 Conclusion References Index
List of Contributors About the Editors PART ONE PERVASIVE COMPUTING AND
SYSTEMS 1 Introduction Mohammad S. Obaidat and Isaac Woungang 1.1 Pervasive
Computing and Its Significance 1.2 Research Trends in Pervasive Computing
and Networking 1.3 Scanning the Book 1.4 Target Audience 1.5 Supplementary
Resources 1.6 Acknowledgments References 2 Tools and Techniques for Dynamic
Reconfiguration and Interoperability of Pervasive Systems Evens Jean, Sahra
Sedigh, Ali R. Hurson, and Behrooz A. Shirazi 2.1 Introduction. 2.2 Mobile
Agent Technology 2.3 Sensor Networks 2.4 Collaboration and Interoperability
Among Sensor Networks 2.5 Applications 2.6 Conclusion References 3 Models
for Service and Resource Discovery in Pervasive Computing Mehdi Khouja,
Carlos Juiz, Ramon Puigjaner, and Farouk Kamoun 3.1 Introduction 3.2
Service Oriented Architecture 3.3 Industry and Consortia Supported Models
for Service Discovery 3.4 Research Initiatives in Service Discovery for
Pervasive Systems 3.5 Conclusions References 4 Pervasive Learning Tools and
Technologies Neil Y. Yen, Qun Jin, Hiroaki Ogata, Timothy K. Shih, and Y.
Yano 4.1 Introduction 4.2 Pervasive Learning: A Promising Innovative
Paradigm 4.3 Emerging Technologies and Systems for Pervasive Learning 4.4
Integration of Real-World Practice and Experience with Pervasive Learning
4.5 Nature of Pervasive Learning and Provision of Well-Being in Education
4.6 Conclusion References 5 Service Management in Pervasive Computing
Environments Jiannong Cao, Joanna Siebert, and Vaskar Raychoudhury 5.1
Introduction 5.2 Service Management in Pervasive Computing Environments 5.3
Techniques for Service Management in PvCE 5.4 Service Composition 5.5
Conclusions References 6 Wireless Sensor Cooperation for a Sustainable
Quality of Information Abdelmajid Khelil, Christian Reinl, Brahim Ayari,
Faisal Karim Shaikh, Piotr Szczytowski, Azad Ali, and Neeraj Suri 6.1
Introduction 6.2 Sensing the Real World 6.3 Inter-Sensor Cooperation 6.4
Mobile Sensor Cooperation 6.5 Cooperation Across Mobile Entities 6.6
Inter-WSN Cooperation 6.7 Conclusions and Future Research Directions
References 7 An Opportunistic Pervasive Networking Paradigm: Multi-Hop
Cognitive Radio Networks Didem Gozupek and Fatih Alagoz 7.1 Introduction
7.2 Overview of Multi-Hop Cognitive Radio Networks MAC Layer 7.3 Proposed
Mac Layer Protocols 7.4 Open Issues 7.5 Conclusions References 8 Wearable
Computing and Sensor Systems for Healthcare Franca Delmastro and Marco
Conti 8.1 Introduction 8.2 The Health Body Area Network 8.3 Medical and
Technological Requirements of Health Sensors 8.4 Wearable Sensors for Vital
Signals Monitoring 8.5 Wearable Sensors for Activity Recognition 8.6
Sensors and Signals for Emotion Recognition 8.7 Intra-BAN Communications in
Pervasive Healthcare Systems: Standards and Protocols 8.8 Conclusions
References 9 Standards and Implementation of Pervasive Computing
Applications Daniel Cascado, Jose Luis Sevillano, Luis Fernandez-Luque,
Karl Johan Grøttum, L. Kristian Vognild, and T. M. Burkow 9.1 Introduction
9.2 Wireless Technologies and Standards 9.3 Middleware 9.4 Case Studies
References PART TWO PERVASIVE NETWORKING SECURITY. 10 Security and Privacy
in Pervasive Networks Tarik Guelzim and Mohammad S. Obaidat 10.1
Introduction 10.2 Security Classics 10.3 Hardening Pervasive Networks 10.4
Privacy in Pervasive Networks 10.5 Conclusion References 11
UnderstandingWormhole Attacks in Pervasive Networks Isaac Woungang, Sanjay
Kumar Dhurandher, and Abhishek Gupta 11.1 Introduction 11.2 A Wormhole
Attack 11.3 Severity of a Wormhole Attack 11.4 Background 11.5
Classification of Wormholes 11.6 Wormhole Attack Modes 11.7 Mitigating
Wormhole Attacks 11.8 Discussion of Some Mitigating Solutions to Avoid
Wormhole Attacks 11.9 Conclusion and Future Work References 12 An
Experimental Comparison of Collaborative Defense Strategies for Network
Security Hao Chen and Yu Chen 12.1 Introduction 12.2 Background 12.3
Small-World Network Based Modeling Platform 12.4 Internet Worm Attack and
Defense 12.5 Experiments and Performance Evaluation 12.6 Conclusions
References 13 Smart Devices, Systems and Intelligent Environments Joaquin
Entrialgo and Mohammad S. Obaidat 13.1 Introduction 13.2 Smart Devices and
Systems 13.3 Intelligent Environments 13.4 Trends 13.5 Limitations and
Challenges 13.6 Applications and Case Studies 13.7 Conclusion References
PART THREE PERVASIVE NETWORKING AND COMMUNICATIONS. 14 Autonomic and
Pervasive Networking Thabo K. R. Nkwe, Mieso K. Denko, and Jason B. Ernst
14.1 Introduction 14.2 Ubiquitous/Pervasive Networks 14.3 Applying
Autonomic Techniques to Ubiquitous/Pervasive Networks 14.4 Self-* (star) In
Autonomic and Pervasive Networks 14.5 Autonomic and Pervasive Networking
Challenges 14.6 Conclusions and Future Directions References 15 An Adaptive
Architecture of Service Component for Pervasive Computing Fei Li, Y. He,
Athanasios V. Vasilakos, and Naixue Xiong 15.1 Introduction 15.2 Motivation
15.3 An Overview of the Delaying Adaptation Tool 15.4 Case Study 15.5
Related Work 15.6 Conclusions References 16 On Probabilistic k-Coverage in
Pervasive Wireless Sensor Networks Habib M. Ammari 16.1 Introduction 16.2
The Coverage Problem 16.3 Coverage Configuration Problem 16.4 Stochastic
k-Coverage Protocol 16.5 Conclusion References 17 On the Usage of Overlays
to Provide QoS Over IEEE 802.11b/g/e Pervasive and Mobile Networks Luca
Caviglione, Franco Davoli, and Piergiulio Maryni 17.1 Introduction 17.2 A
Glance at P2P Overlay Networks and QoS Mechanisms 17.3 Design of Overlays
to Support QoS 17.4 Performance Evaluation 17.5 Conclusions and Future
Developments Appendic I. The Distributed Algortihm for Bandwidth Management
References 18 Performance Evaluation of Pervasive Networks Based on WiMAX
Networks Elmabruk Laias and Irfan Awan 18.1 Introduction 18.2 IEEE 802.16
Architecture and QoS Requirements 18.3 Related Work 18.4 Proposed QoS
Framework 18.5 Simulation Experiments and Numerical Results 18.6 Summary
References 19 Implementation Frameworks for Mobile and Pervasive Networks
Bilhanan Silverajan and Jarmo Harju 19.1 Introduction 19.2 Correlating
Design to Implementations 19.3 Challenges for Implementation Frameworks
19.4 State of the Art in Implementation Frameworks 19.5 Current Frameworks
Research for Network Protocols and Applications 19.6 Evaluating Frameworks
and Implementations 19.7 Conclusion References Index
SYSTEMS 1 Introduction Mohammad S. Obaidat and Isaac Woungang 1.1 Pervasive
Computing and Its Significance 1.2 Research Trends in Pervasive Computing
and Networking 1.3 Scanning the Book 1.4 Target Audience 1.5 Supplementary
Resources 1.6 Acknowledgments References 2 Tools and Techniques for Dynamic
Reconfiguration and Interoperability of Pervasive Systems Evens Jean, Sahra
Sedigh, Ali R. Hurson, and Behrooz A. Shirazi 2.1 Introduction. 2.2 Mobile
Agent Technology 2.3 Sensor Networks 2.4 Collaboration and Interoperability
Among Sensor Networks 2.5 Applications 2.6 Conclusion References 3 Models
for Service and Resource Discovery in Pervasive Computing Mehdi Khouja,
Carlos Juiz, Ramon Puigjaner, and Farouk Kamoun 3.1 Introduction 3.2
Service Oriented Architecture 3.3 Industry and Consortia Supported Models
for Service Discovery 3.4 Research Initiatives in Service Discovery for
Pervasive Systems 3.5 Conclusions References 4 Pervasive Learning Tools and
Technologies Neil Y. Yen, Qun Jin, Hiroaki Ogata, Timothy K. Shih, and Y.
Yano 4.1 Introduction 4.2 Pervasive Learning: A Promising Innovative
Paradigm 4.3 Emerging Technologies and Systems for Pervasive Learning 4.4
Integration of Real-World Practice and Experience with Pervasive Learning
4.5 Nature of Pervasive Learning and Provision of Well-Being in Education
4.6 Conclusion References 5 Service Management in Pervasive Computing
Environments Jiannong Cao, Joanna Siebert, and Vaskar Raychoudhury 5.1
Introduction 5.2 Service Management in Pervasive Computing Environments 5.3
Techniques for Service Management in PvCE 5.4 Service Composition 5.5
Conclusions References 6 Wireless Sensor Cooperation for a Sustainable
Quality of Information Abdelmajid Khelil, Christian Reinl, Brahim Ayari,
Faisal Karim Shaikh, Piotr Szczytowski, Azad Ali, and Neeraj Suri 6.1
Introduction 6.2 Sensing the Real World 6.3 Inter-Sensor Cooperation 6.4
Mobile Sensor Cooperation 6.5 Cooperation Across Mobile Entities 6.6
Inter-WSN Cooperation 6.7 Conclusions and Future Research Directions
References 7 An Opportunistic Pervasive Networking Paradigm: Multi-Hop
Cognitive Radio Networks Didem Gozupek and Fatih Alagoz 7.1 Introduction
7.2 Overview of Multi-Hop Cognitive Radio Networks MAC Layer 7.3 Proposed
Mac Layer Protocols 7.4 Open Issues 7.5 Conclusions References 8 Wearable
Computing and Sensor Systems for Healthcare Franca Delmastro and Marco
Conti 8.1 Introduction 8.2 The Health Body Area Network 8.3 Medical and
Technological Requirements of Health Sensors 8.4 Wearable Sensors for Vital
Signals Monitoring 8.5 Wearable Sensors for Activity Recognition 8.6
Sensors and Signals for Emotion Recognition 8.7 Intra-BAN Communications in
Pervasive Healthcare Systems: Standards and Protocols 8.8 Conclusions
References 9 Standards and Implementation of Pervasive Computing
Applications Daniel Cascado, Jose Luis Sevillano, Luis Fernandez-Luque,
Karl Johan Grøttum, L. Kristian Vognild, and T. M. Burkow 9.1 Introduction
9.2 Wireless Technologies and Standards 9.3 Middleware 9.4 Case Studies
References PART TWO PERVASIVE NETWORKING SECURITY. 10 Security and Privacy
in Pervasive Networks Tarik Guelzim and Mohammad S. Obaidat 10.1
Introduction 10.2 Security Classics 10.3 Hardening Pervasive Networks 10.4
Privacy in Pervasive Networks 10.5 Conclusion References 11
UnderstandingWormhole Attacks in Pervasive Networks Isaac Woungang, Sanjay
Kumar Dhurandher, and Abhishek Gupta 11.1 Introduction 11.2 A Wormhole
Attack 11.3 Severity of a Wormhole Attack 11.4 Background 11.5
Classification of Wormholes 11.6 Wormhole Attack Modes 11.7 Mitigating
Wormhole Attacks 11.8 Discussion of Some Mitigating Solutions to Avoid
Wormhole Attacks 11.9 Conclusion and Future Work References 12 An
Experimental Comparison of Collaborative Defense Strategies for Network
Security Hao Chen and Yu Chen 12.1 Introduction 12.2 Background 12.3
Small-World Network Based Modeling Platform 12.4 Internet Worm Attack and
Defense 12.5 Experiments and Performance Evaluation 12.6 Conclusions
References 13 Smart Devices, Systems and Intelligent Environments Joaquin
Entrialgo and Mohammad S. Obaidat 13.1 Introduction 13.2 Smart Devices and
Systems 13.3 Intelligent Environments 13.4 Trends 13.5 Limitations and
Challenges 13.6 Applications and Case Studies 13.7 Conclusion References
PART THREE PERVASIVE NETWORKING AND COMMUNICATIONS. 14 Autonomic and
Pervasive Networking Thabo K. R. Nkwe, Mieso K. Denko, and Jason B. Ernst
14.1 Introduction 14.2 Ubiquitous/Pervasive Networks 14.3 Applying
Autonomic Techniques to Ubiquitous/Pervasive Networks 14.4 Self-* (star) In
Autonomic and Pervasive Networks 14.5 Autonomic and Pervasive Networking
Challenges 14.6 Conclusions and Future Directions References 15 An Adaptive
Architecture of Service Component for Pervasive Computing Fei Li, Y. He,
Athanasios V. Vasilakos, and Naixue Xiong 15.1 Introduction 15.2 Motivation
15.3 An Overview of the Delaying Adaptation Tool 15.4 Case Study 15.5
Related Work 15.6 Conclusions References 16 On Probabilistic k-Coverage in
Pervasive Wireless Sensor Networks Habib M. Ammari 16.1 Introduction 16.2
The Coverage Problem 16.3 Coverage Configuration Problem 16.4 Stochastic
k-Coverage Protocol 16.5 Conclusion References 17 On the Usage of Overlays
to Provide QoS Over IEEE 802.11b/g/e Pervasive and Mobile Networks Luca
Caviglione, Franco Davoli, and Piergiulio Maryni 17.1 Introduction 17.2 A
Glance at P2P Overlay Networks and QoS Mechanisms 17.3 Design of Overlays
to Support QoS 17.4 Performance Evaluation 17.5 Conclusions and Future
Developments Appendic I. The Distributed Algortihm for Bandwidth Management
References 18 Performance Evaluation of Pervasive Networks Based on WiMAX
Networks Elmabruk Laias and Irfan Awan 18.1 Introduction 18.2 IEEE 802.16
Architecture and QoS Requirements 18.3 Related Work 18.4 Proposed QoS
Framework 18.5 Simulation Experiments and Numerical Results 18.6 Summary
References 19 Implementation Frameworks for Mobile and Pervasive Networks
Bilhanan Silverajan and Jarmo Harju 19.1 Introduction 19.2 Correlating
Design to Implementations 19.3 Challenges for Implementation Frameworks
19.4 State of the Art in Implementation Frameworks 19.5 Current Frameworks
Research for Network Protocols and Applications 19.6 Evaluating Frameworks
and Implementations 19.7 Conclusion References Index