M2M Architecture: Can It Realize Ubiquitous Computing in Daily life?

نویسنده

  • Seyed Morteza Babamir
چکیده

Ubiquitous computing called pervasive one is based on the thought of pervading ability of computation in daily life applications. In other words, it aims to include computation in devices such as electronic equipment and automobiles. This has led to disengagement of computers from desktop form. Accordingly, the notice in ubiquitous computing being taken of a world steeped in remote and wireless computer-based-services. Handheld and wearable programmed devices such as sense and control appliances are such devices. This advancement is rapidly moving domestic tasks and life from device-and-human communication to the device-and-device model. This model called Machine to Machine (M2M) has led to acceleration of developments in sciences such as nano-science, bio-science, and information science. As a result, M2M led to appearance of applications in various fields such as, environment monitoring, agricultural, health care, logistics, and business. Since it is envisaged that M2M communications will play a big role in the future in all wireless applications and will be emerged as a progressive linkage for next-generation communications, this paper aims to consider how much M2M architectures can realize ubiquitous computing in daily life applications. This is carried out after acquainting and initiating readers with M2M architectures and arguments for M2M. Some of the applications was not achievable before but are becoming viable owing to emergence of M2M communications.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Percolation based M2M Networking Architecture for Data Transmission and Routing

We propose a percolation based M2M networking architecture and its data transmission method. The proposed network architecture can be server-free and router-free, which allows us to operate routing efficiently with percolations based on six degrees of separation theory in small world network modeling. The data transmission can be divided into two phases: routing and data transmission phase. In ...

متن کامل

A Dynamic ID-Based Authentication Scheme for M2M Communication of Healthcare Systems

M2M (machine to machine) applications involving intelligence to ubiquitous environment have been in existence for the past many years. However, its provisioning using mobile technologies raises a new security challenge. Security services such as authentication and key establishment are critical in M2M, especially for healthcare systems. We proposed a simple architecture M2M service to apply any...

متن کامل

Pairwise and group key setup mechanism for secure machine-to-machine communication

In the ubiquitous environment, more and more devices are deployed in our daily life, and need to communicate with one another. M2M (Machine-toMachine) communication is considered to be one of the major issues in future networks. M2M is expected to bring various benefits in wireless communications when it is interconnected with cellular networks. Considering the characteristics of cellular M2M n...

متن کامل

The Finalists

CONSORTS (Architecture for COgNitive reSOurce management with physically-gRounding agents) is a new kind of agent architecture for Ubiquitous computing, which is designed to realize mass-user support in addition to conventional personal assistance. The key concepts in Consorts are "physically-grounding" and "cognitive resources”. By using sensory information brought by ubiquitous environment, a...

متن کامل

Message from Organizers Practical Applications of Sensor Networking

It is pleasure to be able to hold one day workshop focusing on the practical application of sensor networking technology at the SAINT2007. The digital information and communication infrastructure as empowered by Internet technology has already become a major part of the infrastructure platform of people's daily activities and of working environment. The Internet is now mutating toward a new sta...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • TIIS

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2012