Skip to main content

A Novel Survey on Ubiquitous Computing

  • Conference paper
  • First Online:
Data Intelligence and Cognitive Informatics

Part of the book series: Algorithms for Intelligent Systems ((AIS))

Abstract

The rapid developments in IoT, wireless technology, and mobile computing devices imply that ubiquitous computing is not a far-off dream from the present. But while it is not wrong to assume that ubiquitous computing will be achievable and feasible in the future, the concept is still plagued by a very high number of limitations. These numerous limitations are mainly related to the device’s hardware, security concerns, and energy maintenance for each device, cost and usability of the ubicomputing environment, connectivity, and complex user interface. This paper has pinpointed these exact issues and limitations that are stopping Ubicomp from becoming a reality. Along with finding these issues, we have also researched and mentioned potential solutions to them, which are being rapidly developed. Additionally, we have discussed  comparative study of these solutions and their limitations and what can be improved. Toward the end, we have added our suggestions on what can be done to overcome the obstacles for UbiComp, and the future possibilities for the technology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Takayama L (2017) The motivations of ubiquitous computing: revisiting the ideas behind and beyond the prototypes. Pers Ubiquit Comput 21(3):557–569

    Article  Google Scholar 

  2. Poslad S (2011) Ubiquitous computing: smart devices, environments, and interactions. Wiley

    Google Scholar 

  3. Krumm J (Ed) (2018) Ubiquitous computing fundamentals. CRC Press

    Google Scholar 

  4. Meshram V, Meshram V, Patil K (2016) A survey on ubiquitous computing. ICTACT J Soft Comput 6(2):1130–1135

    Article  Google Scholar 

  5. Poushter J (2016) Smartphone ownership and internet usage continue to climb in emerging economies. Pew Res Center 22(1):1–44

    Google Scholar 

  6. Lee I, Lee K (2015) The Internet of Things (IoT): applications, investments, and challenges for enterprises. Bus Horiz 58(4):431–440

    Article  Google Scholar 

  7. Mohadisdudis HM, Ali NM (2014) A study of smartphone usage and barriers among the elderly. In: 2014 3rd international conference on user science and engineering (i-USEr). IEEE, pp 109–114

    Google Scholar 

  8. Fu LP, Landay J, Nebeling M, Xu Y, Zhao C (2018) Redefining natural user interface. In: Extended abstracts of the 2018 CHI conference on human factors in computing systems, pp 1–3

    Google Scholar 

  9. Liberati N (2016) Augmented reality and ubiquitous computing: the hidden potentialities of augmented reality. AI Soc 31(1):17–28

    Article  Google Scholar 

  10. Ghotkar A, Vidap P, Deo K (2016) Dynamic hand gesture recognition using hidden Markov model by Microsoft Kinect sensor. Int J Comput Appl 150(5):5–9

    Google Scholar 

  11. Mhatre M, Choudhari S, Chourasia N (2015) Microsoft pixelsense—interactive surface computing platform for Samsung SUR40. Int J Res Eng Technol 4(11):108–110

    Article  Google Scholar 

  12. Zhou J, Cao Z, Dong X, Vasilakos AV (2017) Security and privacy for cloud-based IoT: challenges. IEEE Commun Mag 55(1):26–33

    Article  Google Scholar 

  13. Kušen E, Strembeck M (2017) Security-related research in ubiquitous computing—results of a systematic literature review. arXiv:1701.00773

  14. Venkatasen M, Mani P (2018) A risk-centric defensive architecture for threat modelling in e-government application. Electron Gov Int J 14(1):16–31

    Google Scholar 

  15. Maheshwari V, Prasanna M (2016) Integrating risk assessment and threat modeling within SDLC process. In: 2016 international conference on inventive computation technologies (ICICT), (vol 1). IEEE, pp 1–5

    Google Scholar 

  16. Anagha VK (2019) Implementation of enhanced security designs for PICO: an ultra-lightweight, robust and low power Cipher for ubiquitous computing. J VLSI Design Advance 2(2)

    Google Scholar 

  17. Wooten D (2016) U.S. Patent No. 9,230,109. U.S. Patent and Trademark Office, Washington, DC

    Google Scholar 

  18. Lin JF, Sheu MH, Hwang YT, Wong CS, Tsai MY (2017) Low-power 19-transistor true single-phase clocking flip-flop design based on logic structure reduction schemes. IEEE Trans Very Large Scale Integrat (VLSI) Syst 25(11):3033–3044

    Google Scholar 

  19. Lin JF, Tsai MY, Chang CS, Tsai YM (2018) A novel low power flip-flop design using footless scheme. Analog Integr Circ Sig Process 97(2):365–370

    Article  Google Scholar 

  20. Srinivasan N, Prakash NS, Shalakha D, Sivaranjani D, Sundari BBT (2015) Power reduction by clock gating technique. Procedia Technol 21:631–635

    Google Scholar 

  21. Geng L, Shen JZ, Xu CY (2016) Power-efficient dual-edge implicit pulse-triggered flip-flop with an embedded clock-gating scheme. Front Inf Technol Electron Eng 17(9):962–972

    Article  Google Scholar 

  22. Vogelmann P, Wagner J, Haas M, Ortmanns M (2019) A dynamic power reduction technique for incremental ∆Σ modulators. IEEE J Solid-State Circuits 54(5):1455–1467

    Article  Google Scholar 

  23. Padmavathi B, Geetha BT, Bhuvaneshwari K (2017) Low power design techniques and implementation strategies adopted in VLSI circuits. In: 2017 IEEE international conference on power, control, signals and instrumentation engineering (ICPCSI). IEEE, pp 1764–1767

    Google Scholar 

  24. Kumar MS (2018) Research and development of virtualization in wireless sensor networks. JOIV: Int J Inf Vis 2(2):96–103

    Google Scholar 

  25. Lee J, Sung Y, Park JH (2016) Lightweight sensor authentication scheme for energy efficiency in ubiquitous computing environments. Sensors 16(12):2044

    Google Scholar 

  26. Rossler B (2018) The value of privacy. Wiley

    Google Scholar 

  27. Ai Y, Peng M, Zhang K (2018) Edge computing technologies for Internet of Things: a primer. Digital Commun Netw 4(2):77–86

    Article  Google Scholar 

  28. Yu W, Liang F, He X, Hatcher WG, Lu C, Lin J, Yang X (2017) A survey on the edge computing for the Internet of Things. IEEE access 6:6900–6919

    Article  Google Scholar 

  29. Kumar MS, Prabhu J (2021) Recent development in big data analytics: research perspective. Research Anthology Artif Intell Appl Secur 1640–1663

    Google Scholar 

  30. Scoca V, Aral A, Brandic I, De Nicola R, Uriarte RB (2018) Scheduling latency-sensitive applications in edge computing. In: Closer, pp 158–168

    Google Scholar 

  31. Premsankar G, Di Francesco M, Taleb T (2018) Edge computing for the Internet of Things: a case study. IEEE Int Things J 5(2):1275–1284

    Article  Google Scholar 

  32. Satyanarayanan M (2017) The emergence of edge computing. Computer 50(1):30–39

    Article  Google Scholar 

  33. Kumar MS (2017) Analysis of network function virtualization and software-defined virtualization. JOIV: Int J Inf Vis 1(4):122–126

    Google Scholar 

  34. Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on Mobile cloud computing, pp 13–16

    Google Scholar 

  35. Mukherjee M, Shu L, Wang D (2018) Survey of fog computing: Fundamental, network applications, and research challenges. IEEE Commun Surveys Tutorials 20(3):1826–1857

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dhyani, K., Bhachawat, S., Prabhu, J., Kumar, M.S. (2022). A Novel Survey on Ubiquitous Computing. In: Jacob, I.J., Kolandapalayam Shanmugam, S., Bestak, R. (eds) Data Intelligence and Cognitive Informatics. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-16-6460-1_8

Download citation

Publish with us

Policies and ethics