SlideShare ist ein Scribd-Unternehmen logo
1 von 16
ACCESSIBILITY OF MOBILE
CYBER PHYSICAL SYSTEM
Partha Sarathi Kar
Supervisor: Mohan Liyanage
RECAP
What is CPS and mCPS
Application of CPS and mCPS
What is accessibility
Importance of accessibility
CHALLENGES
Energy Efficient Sensing
Big Data Challenges
Networking Issues
Object mobility
Security
Social Challenges
ENERGY EFFICIENT SENSING
Mobile devices operate on a finite supply of energy
Continuously capturing user context through sensors
imposes heavy workload
It drains the battery power rapidly
So, EES is one of the key challenge in MCPS.
ENERGY EFFICIENT SENSING
EXAMPLE
- Galaxy SIII smartphone consumes 805 mW in idle mode puts
extra 573 mW power consumption while employing GPS
connectivity. [1]
- When the HTC Touch Pro uses accelerometer, overall power
consumption on device increases by 370 mW . [2]
NETWORKING CHALLENGES
NETWORK ARCHITECTURE AND SYSTEM DESIGN
- Finding a scalable, flexible, secure and cost-efficient
-Proposed in the past years [3], [4],e.g., healthcare [5] , meter
reading [6] , enterprise services [7])
NETWORKING CHALLENGES
ADDRESSING AND NAMING
To Identify and interact with the huge number of mCPS objects .
(i) How can we identify and interact
(ii) How can we make it efficiently if mCPS objects are
heterogeneous or homogeneous in character.
OBJECT MOBILITY CHALLENGES
A large part of mCPS objects are not fixed.
Because, most of the services are expected to be delivered to
mobile users.
Example: Autonomous Car
BIG DATA CHALLENGES
SCALABILITY
-Sometimes it produces multi-petabyte data
COMPLEXITY
-In Multi-point correlations (e.g., moving taxies and e.g., rivers,
buildings, roads, etc.)
-Raw data collected from sensors are likely to be incomplete and
inaccurate.
BIG DATA CHALLENGES
REPRODUCIBILITY
-10% of the disk space is used for storing “hot” data, while the
remaining 90% space is “wasted” .
DATA CALIBRATION AND ROBUSTNESS
-Suppose an accelerometer based application,
Upward or downward position and the device causes x-axis
flipped to y-axis or vice versa.
SECURITY
• Secure authentication and authorization,
• Secure bootstrapping of objects and transmission of
data,
• Security of CPS data,
• Secure access to data by authorized persons
SECURITY
EXAMPLE
Monitor the medical parameters of a patient. [8]
• The device has to securely join CPS
• Secure data transmission
• Secure storage mechanisms are essential
• Data access should be guaranteed only to authorized people
such as doctors
SOCIAL CHALLENGES
Design of a suitable human-system cooperation.
-System should manageable and trustworthy for human as well
as user of this service.
Image src:https://iot-analytics.com/10-internet-of-things-applications/ https://www.researchgate.net/publication/262160531_Cyber-Physical_Systems_Imminent_Challenges
SOCIAL CHALLENGES
EXAMPLE:
• When it will be trustworthy Then a business man will
exchange his data with this system or a user will accept this
system to use it. [9]
• Similarly, If it is easily manageable, then a car driver easily will
be able to update and to trained himself in the latest version of
a route. [9]
RESOURCE LINKS
1. B. Priyantha, D. Lymberopoulos, and J. Liu, “LittleRock: Enabling Energy-Efficient Continuous Sensing on Mobile Phones,” IEEE
Pervasive Comput., vol. 10, no. 2, pp. 12–15, Apr. 2011.
2. A. Carroll and G. Heiser, “The systems hacker’s guide to the galaxy energy usage in a modern smartphone,” in Proceedings of
the 4th Asia-Pacific workshop on systems, 2013, p. 5.
3. H. Ning and Z. Wang, “Future internet of things architecture: like mankind neural system or social organization framework?,”
Commun. Lett. IEEE, vol. 15, no. 4, pp. 461–463, 2011.
4. M. Wu, T. Lu, F.-Y. Ling, L. Sun, and H.-Y. Du, “Research on the architecture of Internet of things,” in Advanced Computer Theory
and Engineering (ICACTE), 2010 3rd International Conference on, 2010, vol. 5, pp. V5–484.
5. A. J. Jara, M. A. Zamora, and A. F. G. Skarmeta, “An architecture based on internet of things to support mobility and security in
medical environments,” in Consumer Communications and Networking Conference (CCNC), 2010 7th IEEE, 2010, pp. 1–5.
6. D. Guinard, V. Trifa, and E. Wilde, “A resource oriented architecture for the web of things,” in Internet of Things (IOT), 2010, 2010,
pp. 1–8.
7. P. Spiess, S. Karnouskos, D. Guinard, D. Savio, O. Baecker, L. Souza, and V. Trifa, “SOA-based integration of the internet of
things in enterprise services,” in Web Services, 2009. ICWS 2009. IEEE International Conference on, 2009, pp. 968–975.
8. The Internet of Things vision: Key features, applications and open issues Eleonora Borgia ⇑ nstitute of Informatics and Telematics
(IIT), Italian National Research Council (CNR), via G. Moruzzi 1, 56124 Pisa, Italy
9. Cyber-Physical Systems: Imminent Challenges - https://www.researchgate.net/publication/262160531_Cyber-
Physical_Systems_Imminent_Challenges
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

Context Aware Multisensor Image Fusion for Military Sensor Networks using Mul...
Context Aware Multisensor Image Fusion for Military Sensor Networks using Mul...Context Aware Multisensor Image Fusion for Military Sensor Networks using Mul...
Context Aware Multisensor Image Fusion for Military Sensor Networks using Mul...
ijasuc
 
Augmented Reality as A Pervasive Technology: Context-Aware Approach
Augmented Reality as A Pervasive Technology: Context-Aware ApproachAugmented Reality as A Pervasive Technology: Context-Aware Approach
Augmented Reality as A Pervasive Technology: Context-Aware Approach
Aditya Yudiantika
 

Was ist angesagt? (20)

How Cyber-Physical Systems Are Reshaping the Robotics Landscape
How Cyber-Physical Systems Are Reshaping the Robotics LandscapeHow Cyber-Physical Systems Are Reshaping the Robotics Landscape
How Cyber-Physical Systems Are Reshaping the Robotics Landscape
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Mobile Cloud Comuting
Mobile Cloud Comuting Mobile Cloud Comuting
Mobile Cloud Comuting
 
Opportunities and Challenges of Large-scale IoT Data Analytics
Opportunities and Challenges of Large-scale IoT Data AnalyticsOpportunities and Challenges of Large-scale IoT Data Analytics
Opportunities and Challenges of Large-scale IoT Data Analytics
 
AI/ML-Innovation-2019
AI/ML-Innovation-2019AI/ML-Innovation-2019
AI/ML-Innovation-2019
 
Internet of Things and Large-scale Data Analytics
Internet of Things and Large-scale Data Analytics Internet of Things and Large-scale Data Analytics
Internet of Things and Large-scale Data Analytics
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
10 uses cases - Artificial Intelligence and Machine Learning in Construction ...
10 uses cases - Artificial Intelligence and Machine Learning in Construction ...10 uses cases - Artificial Intelligence and Machine Learning in Construction ...
10 uses cases - Artificial Intelligence and Machine Learning in Construction ...
 
Context Aware Multisensor Image Fusion for Military Sensor Networks using Mul...
Context Aware Multisensor Image Fusion for Military Sensor Networks using Mul...Context Aware Multisensor Image Fusion for Military Sensor Networks using Mul...
Context Aware Multisensor Image Fusion for Military Sensor Networks using Mul...
 
Security and Privacy in Mobile Cloud Computing
Security and Privacy in Mobile Cloud ComputingSecurity and Privacy in Mobile Cloud Computing
Security and Privacy in Mobile Cloud Computing
 
Technology trends ppt
Technology trends pptTechnology trends ppt
Technology trends ppt
 
AIIM Chicago's Submission for Best Event
AIIM Chicago's Submission for Best EventAIIM Chicago's Submission for Best Event
AIIM Chicago's Submission for Best Event
 
Augmented Reality as A Pervasive Technology: Context-Aware Approach
Augmented Reality as A Pervasive Technology: Context-Aware ApproachAugmented Reality as A Pervasive Technology: Context-Aware Approach
Augmented Reality as A Pervasive Technology: Context-Aware Approach
 
IoT
IoTIoT
IoT
 
The Internet of Things: What's next?
The Internet of Things: What's next? The Internet of Things: What's next?
The Internet of Things: What's next?
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Autonomic Computing PPT
Autonomic Computing PPTAutonomic Computing PPT
Autonomic Computing PPT
 
Information Engineering in the Age of the Internet of Things
Information Engineering in the Age of the Internet of Things Information Engineering in the Age of the Internet of Things
Information Engineering in the Age of the Internet of Things
 
Latest Trends in Computer Science
Latest Trends in Computer ScienceLatest Trends in Computer Science
Latest Trends in Computer Science
 
DEMETER Overview
DEMETER OverviewDEMETER Overview
DEMETER Overview
 

Ähnlich wie ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02

SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16, .docx
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16, .docxSPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16, .docx
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16, .docx
rosiecabaniss
 
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16,
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16, SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16,
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16,
ChereCheek752
 
A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...
Amber Wheeler
 
Provisioning Quality of Service of Wireless Telemedicine for E-health Services
Provisioning Quality of Service of Wireless  Telemedicine for E-health Services Provisioning Quality of Service of Wireless  Telemedicine for E-health Services
Provisioning Quality of Service of Wireless Telemedicine for E-health Services
Mustafa Algaet
 

Ähnlich wie ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02 (20)

IRJET- Secured Mind Uploading Method in Wireless Body Area Network
IRJET-  	  Secured Mind Uploading Method in Wireless Body Area NetworkIRJET-  	  Secured Mind Uploading Method in Wireless Body Area Network
IRJET- Secured Mind Uploading Method in Wireless Body Area Network
 
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16, .docx
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16, .docxSPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16, .docx
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16, .docx
 
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16,
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16, SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16,
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16,
 
A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...
 
Provisioning Quality of Service of Wireless Telemedicine for E-health Services
Provisioning Quality of Service of Wireless  Telemedicine for E-health Services Provisioning Quality of Service of Wireless  Telemedicine for E-health Services
Provisioning Quality of Service of Wireless Telemedicine for E-health Services
 
E-Health Care Cloud Solution
E-Health Care Cloud SolutionE-Health Care Cloud Solution
E-Health Care Cloud Solution
 
SAGAR PPT.pptx
SAGAR PPT.pptxSAGAR PPT.pptx
SAGAR PPT.pptx
 
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
 
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using CloudIRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
 
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionCloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
 
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud ComputingIRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
 
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
 
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...
 
Ms3422732277
Ms3422732277Ms3422732277
Ms3422732277
 
[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P
[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P
[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 
Secure Data Access Using ABE Process Model
Secure Data Access Using ABE Process Model Secure Data Access Using ABE Process Model
Secure Data Access Using ABE Process Model
 
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Kürzlich hochgeladen (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02

  • 1. ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM Partha Sarathi Kar Supervisor: Mohan Liyanage
  • 2. RECAP What is CPS and mCPS Application of CPS and mCPS What is accessibility Importance of accessibility
  • 3. CHALLENGES Energy Efficient Sensing Big Data Challenges Networking Issues Object mobility Security Social Challenges
  • 4. ENERGY EFFICIENT SENSING Mobile devices operate on a finite supply of energy Continuously capturing user context through sensors imposes heavy workload It drains the battery power rapidly So, EES is one of the key challenge in MCPS.
  • 5. ENERGY EFFICIENT SENSING EXAMPLE - Galaxy SIII smartphone consumes 805 mW in idle mode puts extra 573 mW power consumption while employing GPS connectivity. [1] - When the HTC Touch Pro uses accelerometer, overall power consumption on device increases by 370 mW . [2]
  • 6. NETWORKING CHALLENGES NETWORK ARCHITECTURE AND SYSTEM DESIGN - Finding a scalable, flexible, secure and cost-efficient -Proposed in the past years [3], [4],e.g., healthcare [5] , meter reading [6] , enterprise services [7])
  • 7. NETWORKING CHALLENGES ADDRESSING AND NAMING To Identify and interact with the huge number of mCPS objects . (i) How can we identify and interact (ii) How can we make it efficiently if mCPS objects are heterogeneous or homogeneous in character.
  • 8. OBJECT MOBILITY CHALLENGES A large part of mCPS objects are not fixed. Because, most of the services are expected to be delivered to mobile users. Example: Autonomous Car
  • 9. BIG DATA CHALLENGES SCALABILITY -Sometimes it produces multi-petabyte data COMPLEXITY -In Multi-point correlations (e.g., moving taxies and e.g., rivers, buildings, roads, etc.) -Raw data collected from sensors are likely to be incomplete and inaccurate.
  • 10. BIG DATA CHALLENGES REPRODUCIBILITY -10% of the disk space is used for storing “hot” data, while the remaining 90% space is “wasted” . DATA CALIBRATION AND ROBUSTNESS -Suppose an accelerometer based application, Upward or downward position and the device causes x-axis flipped to y-axis or vice versa.
  • 11. SECURITY • Secure authentication and authorization, • Secure bootstrapping of objects and transmission of data, • Security of CPS data, • Secure access to data by authorized persons
  • 12. SECURITY EXAMPLE Monitor the medical parameters of a patient. [8] • The device has to securely join CPS • Secure data transmission • Secure storage mechanisms are essential • Data access should be guaranteed only to authorized people such as doctors
  • 13. SOCIAL CHALLENGES Design of a suitable human-system cooperation. -System should manageable and trustworthy for human as well as user of this service. Image src:https://iot-analytics.com/10-internet-of-things-applications/ https://www.researchgate.net/publication/262160531_Cyber-Physical_Systems_Imminent_Challenges
  • 14. SOCIAL CHALLENGES EXAMPLE: • When it will be trustworthy Then a business man will exchange his data with this system or a user will accept this system to use it. [9] • Similarly, If it is easily manageable, then a car driver easily will be able to update and to trained himself in the latest version of a route. [9]
  • 15. RESOURCE LINKS 1. B. Priyantha, D. Lymberopoulos, and J. Liu, “LittleRock: Enabling Energy-Efficient Continuous Sensing on Mobile Phones,” IEEE Pervasive Comput., vol. 10, no. 2, pp. 12–15, Apr. 2011. 2. A. Carroll and G. Heiser, “The systems hacker’s guide to the galaxy energy usage in a modern smartphone,” in Proceedings of the 4th Asia-Pacific workshop on systems, 2013, p. 5. 3. H. Ning and Z. Wang, “Future internet of things architecture: like mankind neural system or social organization framework?,” Commun. Lett. IEEE, vol. 15, no. 4, pp. 461–463, 2011. 4. M. Wu, T. Lu, F.-Y. Ling, L. Sun, and H.-Y. Du, “Research on the architecture of Internet of things,” in Advanced Computer Theory and Engineering (ICACTE), 2010 3rd International Conference on, 2010, vol. 5, pp. V5–484. 5. A. J. Jara, M. A. Zamora, and A. F. G. Skarmeta, “An architecture based on internet of things to support mobility and security in medical environments,” in Consumer Communications and Networking Conference (CCNC), 2010 7th IEEE, 2010, pp. 1–5. 6. D. Guinard, V. Trifa, and E. Wilde, “A resource oriented architecture for the web of things,” in Internet of Things (IOT), 2010, 2010, pp. 1–8. 7. P. Spiess, S. Karnouskos, D. Guinard, D. Savio, O. Baecker, L. Souza, and V. Trifa, “SOA-based integration of the internet of things in enterprise services,” in Web Services, 2009. ICWS 2009. IEEE International Conference on, 2009, pp. 968–975. 8. The Internet of Things vision: Key features, applications and open issues Eleonora Borgia ⇑ nstitute of Informatics and Telematics (IIT), Italian National Research Council (CNR), via G. Moruzzi 1, 56124 Pisa, Italy 9. Cyber-Physical Systems: Imminent Challenges - https://www.researchgate.net/publication/262160531_Cyber- Physical_Systems_Imminent_Challenges