Microcontrollers as (In)Security Devices for Pervasive Computing Applications
نویسندگان
چکیده
منابع مشابه
Laser Pointers as Interaction Devices for Collaborative Pervasive Computing
We present a system that supports collaborative interactions for arbitrary environments. The system uses laser pointers as interaction devices and employs a video camera to detect where each laser pointer is pointing. Time-division multiplexing together with a wireless link affords discrimination between laser pointer dots belonging to different pointers. Safety issues with laser pointers are a...
متن کاملBrave New World: Pervasive Insecurity of Embedded Network Devices
Embedded network devices have become an ubiquitous fixture in the modern home, office as well as in the global communication infrastructure. Devices like routers, NAS appliances, home entertainment appliances, wifi access points, web cams, VoIP appliances, print servers and video conferencing units reside on the same networks as our personal computers and enterprise servers and together form ou...
متن کاملDiaSim: a simulator for pervasive computing applications
Pervasive computing applications involve both software concerns, like any software system, and integration concerns, for the constituent networked devices of the pervasive computing environment. This situation is problematic for testing because it requires acquiring, testing and interfacing a variety of software and hardware entities. This process can rapidly become costly and time-consuming wh...
متن کاملField-Based Coordination for Pervasive Computing Applications
Emerging pervasive computing technologies such as sensor networks and RFID tags can be embedded in our everyday environment to digitally store and elaborate a variety of information. By having application agents access in a dynamic and wireless way such distributed information, it is possible to enforce a notable degree of context-awareness in applications, and increase the capabilities of inte...
متن کاملOntology-Enabled Pervasive Computing Applications
application-rich environments where we live and work. Let's consider the ritual of visiting a lab or a business unit to deliver a presentation and collaborate with colleagues. We exchange printed business cards that end up in a desk drawer because we never have the time to enter them into our personal information manager. We must deal with capricious projectors that might not work as intended w...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings of the IEEE
سال: 2014
ISSN: 0018-9219,1558-2256
DOI: 10.1109/jproc.2014.2325397