Ubiquitous Computing Security Issues and Redress Free Essay Example
ABSTRACT
Ubiquitous Computing is evolving tremendously and becoming the integrated part with solutions of various application domains. Covering not only Computers and Cell phones but even Cars & Homes. This has increased the no. of users and network and chances for attackers to attack the network.
Increased need in the automation advancement of the environment is leading us towards an era with various security issues and solutions. Tons of data is produced, processed and preserved for the betterment of our race.
Computing paradigm is evolving the environment but also showcasing the network issues which can be a threat to the ecosystem and intellectual property. This leads towards unique and unexpected security challenges and unique and appropriate solution for the threats.
The increased number of network and data flowing within network is vulnerable towards malicious threats, minimizing sudden unexpected attacks can be done by identifying, prioritizing and defending the network against misuse, attacks and vulnerabilities.
INTRODUCTION
Ubicomp is stepping up the conventional computing as in it the user interacts with the single computing device at a time which is connected to internet, where as in Ubiquitous Computing all the feasible devices could be connected to internet and work connectively and collectively for more advancement .
This evolving technology is eliminating the time and position barrier an also becoming Intelligent so that we can design better environment. Ubiquitous Computing is used to mimic and enhance the day to day human abilities as daily tasks , medicine , education , entertainment by making our environment smarter and cooperative.
Devices are integrated with computing abilities. “Computing everywhere for everything & everyone”. Whole ecosystem for a person is turned into a smart ecosystem and focused on making it automated for the betterment for our race and saving time and efforts to increase efficiency. Electrical devices are made automated and connected with other devices in that network and east to use by changing using style and automation “Adjust with device without whole knowledge” i.e. someone who need a service doesn’t needs to fully understand the system.
With the increase in networks and data the extreme points for attacks and intrusion is privacy are found and fixed with unique security solution. The devices cooperatively produce tons of data which can be used in destructive was as well as constructive way for the betterment of the system and this is leading us towards new and dynamic solution for dynamic problems. Main issues are the Security and Privacy.
Over the years, machine learning and data mining and analysis techniques have received attention in the Ubicomp. This has led to various techniques being used for the purpose of security purposes.
METHODOLOGY
To gain a better understanding of the topic discussed in this paper, the methodology adopted involves an in-depth study of related study material in the form of books, research papers, journals, etc.
In the beginning, study material was gathered from various sources [see references]. This paper focuses more on books and research papers which have been published in various conferences and journals. These study materials were then read and re read to learn and have a better understanding of the topic. The internet also provided information related to the topic. Diagrams were found and added to explain the topic better in the
Drafts for the paper were made. It was corrected and added upon to complete the term paper.
LITERATURE REVIEW
In this digital era we are moving through a phase of change in convention of one computing device to multiple computing devices at once. The concept of automation is now been implemented along connectivity with other devices of the network and service provider. With Ubiquitous Computing we are enabling various services and application and implementations. Users of Ubicomp are provided with access to various networks from remote location with high portability, reliability and availability of the network with increase in security risk.
Some Services of Ubi-Comp:
- Context aware applications – Designed for research and automation purposes and support in mobility and physiology of the user. Senses are provided to electrical devices with the sensors and recorded data is processed for the solution made for satisfying the need.
- Smart tool-box – Devices with RFIDs and network connectivity are used for the reconfiguration and schema selection for the devices.
- Ubiquitous Healthcare – A economizing step for healthcare resources by using healthcare ubiquitous healthcare devices for tracking , monitoring and suggesting health related and disease related data which could lead to a healthy future.
- Smart Supply Chain – With the help of Ubiquitous Computing in the industries can decrease the error counts and make the work faster and efficient.
- Smart Home – Integrating Ubiquitous Computing with Homes is creating and further controlling array of automated household devices remotely regardless anyone is home or not. Smart Homes results in security upgrade, energy efficiency and convenience at all times regardless location.
With the increase in need of the automation and ubicomp the No. of devices connected to internet and the data produced is multiplied. Figures shows the increase rate of devices –
With such increase rate of devices the number of networks around us are multiplying too which makes all these changes possible for advancement. And whenever the network is included there are chances for the intrusion and threats for data loss and privacy issues. Which is keeping the world a step behind from whole automation.
Remember! This is just a sample.
You can get a custom paper by one of our expert writers.
Get your custom essay
Helping students since 2015
Top-quality papers guaranteed
100% original papers
We sell only unique pieces of writing completed according to your demands.
Confidential service
We use security encryption to keep your personal data protected.
Money-back guarantee
We can give your money back if something goes wrong with your order.
Enjoy the free features we offer to everyone
-
Title page
Get a free title page formatted according to the specifics of your particular style.
-
Custom formatting
Request us to use APA, MLA, Harvard, Chicago, or any other style for your essay.
-
Bibliography page
Don’t pay extra for a list of references that perfectly fits your academic needs.
-
24/7 support assistance
Ask us a question anytime you need to—we don’t charge extra for supporting you!
Calculate how much your essay costs
What we are popular for
- English 101
- History
- Business Studies
- Management
- Literature
- Composition
- Psychology
- Philosophy
- Marketing
- Economics