Pervasive Computing: Trends and Impacts | ISBN 9783922746768

Pervasive Computing: Trends and Impacts

Vorwort von Udo Helmbrecht
Buchcover Pervasive Computing: Trends and Impacts  | EAN 9783922746768 | ISBN 3-922746-76-4 | ISBN 978-3-922746-76-8

Pervasive Computing: Trends and Impacts

Vorwort von Udo Helmbrecht
The communication and information technology sector is continually reinventing itself. While the PC used to meet everyone's objectives during the 90s, the first decade of the new millennium is witnessing a new focus on mobile devices, enabling access to communication and data networks, irrelevant of location or time. Regarding the future for information and communication technologies, IT experts predict them to become likewise ubiquitous and invisible: In Pervasive Computing, microcomputers will be integrated in common devices, making them smart objects with numerous services for their users. During glazed frost on roads, the driver assistance system throttles the car's celerity and warns the following cars. If a storm is coming, the window in the smart home closes by itself. Passengers in the subway keep their monthly ticket in the pocket, are automatically identified and the travelling fare is written off from their account. How realistic are such visions? What consequence has Pervasive Computing for society and economy? What is the status regarding the security of such services, which are barley noticed by the users? The presented study provides, via an international expert-questioning, an overview on the technological trends and possible areas of application for Pervasive Computing. It additionally gives a view on the socio-economic drivers and consequences of this technological vision. The study also discusses security scenarios and drafts requirements for the security and data protection in Pervasive Computing. The study has been prepared on behalf and in collaboration with the German Federal Office for Information Security (BSI) by VDI/VDE-IT Innovation + Technik GmbH, Berlin; Fraunhofer Institute for Secure Information Technology, Darmstadt; and Sun Microsystems GmbH, Kirchheim-Heimstetten.
Content:
1 Foreword 2 Summary - Pervasive Computing: Developments and Impact 2.1 The two stages of pervasive computing development 2.2 Characteristics of pervasive computing 2.3 The technological foundations of pervasive computing 2.4 Drivers and hurdles in pervasive computing 2.5 The impact of pervasive computing 2.5.1 Impact on privacy 2.5.2 Economic impact 2.5.3 Social impact 2.5.4 Winners and losers in pervasive computing 2.6 Pervasive computing safety 2.7 Study overview 3 Methodology 3.1 International online survey 3.2 Qualitative in-depth interviews 4 Areas of Pervasive Computing Application 4.1 Logistics and production 4.2 Motor traffic 4.3 Inner and external security 4.4 Identification systems 4.5 Smart homes 4.6 Electronic commerce 4.7 Medical technology 5 The Technology of Pervasive Computing 5.1 Microelectronics 5.2 Power supply 5.3 Sensor technology 5.4 Communication technology 5.5 Localisation technology 5.6 Security technologies 5.7 Machine-machine communication 5.8 Human-machine interface 6 Pervasive Computing: Socio-economic Requirements and Impact 6.1 Pervasive computing drivers 6.2 Limiting factors in pervasive computing 6.3 Anticipated impacts of pervasive computing 6.3.1 Impact on privacy 6.3.2 Economic impact 6.3.3 Social impact 6.4 Winners and losers in pervasive computing 6.5 Pervasive computing: assessment of technology effects-conclusions and consequences 7 Security in Pervasive Computing 7.1 Scenario 1: Object identification with TPM 7.1 Trusted Platform Module 7.1.2 Security of object identification via TPM 7.1.3 Opportunities and risks of object identification with a TPM 7.2 Scenario 2: The universal ID 7.2.1 The biometric identification system of UID according to ICAO 7.2.2 The security of a universal ID 7.2.3 Universal ID: opportunities and risks 7.3 Scenario 3: Distributed telematics systems 7.3.1 Security in decentralised telematics systems 7.3.2 Opportunities and risks in distributed telematics systems 7.4 Outlook Security requirements for future pervasive computing 7.4.1 Privacy in pervasive computing 7.4.2 Security 7.4.3 Safety 7.4.4 First steps toward a privacy-compliant pervasive computing 8 Future Outlook List of abbreviations Index Bibliography