Solving the Challenges of Pervasive Computing


Modern research emphasizes Pervasive Computing change faces, learning cultures, structures, communications, intellectual properties, information securities, data presentations and web dis-plays to make attraction for human interaction. Pervasive systems have a broad range of applica-tions but it is relatively challenging for pervasive applications to meet emergence into existing physical environment and newly built structure requirements. Due to their interaction to gather information and change the environment via activating devices independently is highlighted. Se-curity of the pervasive devices and applications which control our activities has primary importance and will be destroyed, if the pervasive system operations are not secure. There is a need to improve the security measures for data to travel rapidly, unbroken, unchanged and invisible by deceptive recipients. Pervasive Computing allows users to get information and services access anytime and anywhere but need to discuss issues and solutions to deliver secure information with privacy and trust. Possible solutions for these challenges of Pervasive Computing interaction between human are emphasized. A collection of papers and articles have been collected in order to investigate the previous study of Pervasive Computing interaction and its challenges. Is it possible for us to understand what the scientific world will be close to generate new avenues? Expectations of future bring new openings for user interaction with systems, data, information and the environments in which they live, work and play.

Share and Cite:

Shaheed, S. , Abbas, J. , Shabbir, A. and Khalid, F. (2015) Solving the Challenges of Pervasive Computing. Journal of Computer and Communications, 3, 41-50. doi: 10.4236/jcc.2015.39005.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] Bashir, R.N., Qadri, S., Saleem, R.M., Naeem, M. and Ghafoor, Y. (2014) Human Computer Interaction (HCI) in Ubiquitous Computing. International Journal of Innovation and Applied Studies, 9, 534.
[2] Weiser, M. (1991) The Computer for the 21st Century. Scientific American, 265, 94-104.
[3] Fouad, R., Hashem, M., Badr, N. and Talha, H. (2011) Exploring a Hybrid of Geospatial Semantic Information in Ubi- quitous Computing Environments. Global Journal of Computer Science and Technology, 11(19).
[4] Brodersen, C. and Kristensen, J.F. (2004) Interaction through Negotiation. Proceedings of the 3rd Nordic Conference on Human-Computer Interaction, 259-268.
[5] Sandhu, R. (2013) Shifting Paradigm from Mobile Computing to Ubiquitous/Pervasive Computing. Indexing Journal Indexing: Our Journal Has Recently Joined International Database for Indexing with DOAJ, Index Copernicus, Open J Gate, CAS, Google Scholar.
[6] (2013) Pervasive Computing. IEEE Computer Society, 12, 18-20.
[7] Sharifi, A. and Abdulahshah, M.K. (2013). Security Attacks and Solutions on Ubiquitous Computing Network. International Journal of Engineering and Innovative Technology (IJEIT), 3, 40-45.
[8] Ye, J. and Dobson, S. Pervasive Computing Needs Better Situation—Awareness. Awareness Magazine.
[9] Ismail, A., Hajjar, A.E.S.A. and Ismail, Z. (2011) A New System Architecture for Pervasive Computing. arXiv Preprint arXiv:1108.2389.
[10] Abowd, G.D. and Mynatt, E.D. (2000) Charting Past, Present, and Future Research in Ubiquitous Computing. ACM Transactions on Computer-Human Interaction (TOCHI), 7, 29-58.
[11] Joshi, Y. and Prasad, L. (2012) Pervasive Computing Goals and Its Challenges for Modern Era. International Journal of Computer Science and Network (IJCSN), Volume 1, Issue 3, ISSN 2277-5420.
[12] Nielsen, J. (1993) Noncommand User Interfaces. Communications of the ACM, 36, 83-99.
[13] Morariu, A., Clipa, B.D., De Lausnay, S., De Strycker, L. and Pentiuc, S. (2011) Combining Natural Human-Computer Interaction and Wireless Communication. Journal of Applied Computer Science & Mathematics, 5, 47-52.
[14] Schmidt, A. (2013) Context-Aware Computing: Context-Awareness, Context-Aware User Interfaces, and Implicit Interaction. In: Soegaard, M. and Dam, R.F., Eds., The Encyclopedia of Human-Computer Interaction, 2nd Edition, The Interaction Design Foundation, Aarhus.
[15] Chihani, B., Bertin, E. and Crespi, N. (2011) A Comprehensive Framework for Context-Aware Communication Services. Proceedings of the 15th International Conference on Intelligence in Next Generation Networks (ICIN), Berlin, 4-7 October 2011, 52-57.
[16] Chihani, B., Bertin, E., Jeanne, F. and Crespi, N. (2011) Context-Aware Systems: A Case Study. In: Cherifi, H., Zain, J.M. and El-Qawasmeh, E., Eds., Digital Information and Communication Technology and Its Applications, Springer, Berlin, 718-732.
[17] Karray, F., Alemzadeh, M., Saleh, J.A. and Arab, M.N. (2008) Human-Computer Interaction: Overview on State of the Art. International Journal on Smart Sensing and Intelligent Systems.
[18] Hachman, M. (2002) Canesta Says “Virtual Keyboard” Is Reality.
[19] Grudin, J. (2011) A Moving Target: The Evolution of HCI. In: Jacko, J., Ed., The Human-Computer Interaction Handbook, 3rd Edition, Taylor & Francis, New York.
[20] Oviatt, S., Cohen, P., Wu, L., Duncan, L., Suhm, B., Bers, J., et al. (2000) Designing the User Interface for Multimodal Speech and Pen-Based Gesture Applications: State-of-the-Art Systems and Future Research Directions. Human-Computer Interaction, 15, 263-322.
[21] Gavrila, D.M. (1999) The Visual Analysis of Human Movement: A Survey. Computer Vision and Image Understanding, 73, 82-98.
[22] Sibert, L.E. and Jacob, R.J. (2000) Evaluation of Eye Gaze Interaction. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, The Hague, 1-6 April 2000, 281-288.
[23] Zacharia, K., Elias, E.P. and Varghese, S.M. (2011) Modelling Gesture Based Ubiquitous Applications.
[24] Poslad, S. (2011) Ubiquitous Computing: Smart Devices, Environments and Interactions. John Wiley & Sons, Chichester.
[25] Chandini, N., Reddy, N.C.S. and Bashwanth, N. (2014) Pervasive Computing Goals and Its Challenges for New Epoch. International Journal of Advanced Research in Computer and Communication Engineering, 3, 6437-6439.
[26] Rao, D.H. (2014) A Scenario Based Approach for Dealing with Challenges in a Pervasive Computing Environment.
[27] Das, S.K., Kant, K. and Zhang, N. (2012) Handbook on Securing Cyber-Physical Critical Infrastructure. Elsevier, Amsterdam.
[28] Roy, N., Misra, A., Julien, C., Das, S.K. and Biswas, J. (2011) An Energy-Efficient Quality Adaptive Framework for Multi-Modal Sensor Context Recognition. Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PerCom), Seattle, 21-25 March 2011, 63-73.
[29] Rajkumar, R. and Lee, I. (2006) NSF Workshop on Cyber-Physical Systems. 16-17 October 2006, Austin.
[30] Hayes, G.R., Poole, E.S., Iachello, G., Patel, S.N., Grimes, M., Abowd, G.D. and Truong, K.N. (2007) Physical, Social, and Experiential Knowledge in Pervasive Computing Environments. IEEE Pervasive Computing, 6, 56-63.
[31] Campbell, A.T., Eisenman, S.B., Lane, N.D., Miluzzo, E., Peterson, R., Lu, H., et al. (2008) The Rise of People-Centric Sensing. IEEE Internet Computing, 12, 12-21.
[32] Leung, A., Sheng, Y. and Cruickshank, H. (2007) The Security Challenges for Mobile Ubiquitous Services. Information Security Technical Report, 12, 162-171.
[33] Pallapa, G., Kumar, M. and Das, S.K. (2007) Privacy Infusion in Ubiquitous Computing. Proceedings of the Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, Philadelphia, 6-10 August, 1-8.
[34] Ganesh, M. and Krishna, S.M. (2010) Privacy Enhanced Context-Aware Architecture for Ubiquitous Computing. International Journal of Electronics and Computer Science Engineering, 2, 53-64.
[35] Khiabani, H., Sidek, Z.M. and Manan, J.L.A. (2010) Towards a Unified Trust Model in Pervasive Systems. Proceedings of the 24th International Conference on Advanced Information Networking and Applications Workshops (WAINA), Perth, 20-23 April 2010, 831-835.
[36] Campbell, R., Al-Muhtadi, J., Naldurg, P., Sampemane, G. and Mickunas, M.D. (2003) Towards Security and Privacy for Pervasive Computing. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H. and Yonezawa, A., Eds., Software Security—Theories and Systems, Springer, Berlin, 1-15.
[37] Forné, J., Hinarejos, F., Marín, A., Almenárez, F., Lopez, J., Montenegro, J.A., et al. (2010) Pervasive Authentication and Authorization Infrastructures for Mobile Users. Computers & Security, 29, 501-514.
[38] Wang, G., Zhou, W. and Yang, L.T. (2013) Trust, Security and Privacy for Pervasive Applications. The Journal of Supercomputing, 64, 661-663.
[39] Zhou, B., Shi, Q. and Merabti, M. (2007) Towards Energy-Efficient Intrusion Detection in Pervasive Computing. Proceedings of the IEEE International Conference on Communications, Glasgow, 24-28 June 2007, 1417-1422.
[40] Bharadwaj, S., Vatsa, M. and Singh, R. (2014) Biometric Quality: A Review of Fingerprint, Iris, and Face. EURASIP Journal on Image and Video Processing, 2014, 34.

Copyright © 2021 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.