10 CHAPTER Wireless, Mobile Computing, and Mobile Commerce 1. Mobile Computing and Mobile Commerce 2. Pervasive Computing普及運算 3. Wireless Security >>> 1. Provide a specific example of how each of the five major m-commerce applications can benefit a business. 2. Describe technologies that underlie pervasive computing, providing examples of how businesses can utilize each one. 3. Explain how the four major threats主要威脅 to wireless networks can damage a business. 10.3 Mobile Computing and Mobile Commerce • Mobile Computing, Mobility, and Broad Reach – Mobile Computing: a real-time connection between a mobile device and other computing environments, such as the Internet or an intranet. – Mobility流動性: means that users carry a device with them and can initiate a real-time contact啟動實時聯繫with other systems from wherever they happen to be. – Broad Reach廣泛的覆蓋範圍: when users carry an open mobile device, they can be reached instantly,瞬間達到 even across great distances. • Mobile Commerce • Mobile Commerce Applications Mobility and Broad Reach Mobility and Broad Reach Create Five Value-added Attributes: 1. Ubiquity無處不在 – can get information and comm. from anywhere 2. Convenience 3. Instant connectivity連接 - Without booting up a PC 4. Personalization - Company sends customize SMS to consumer 5. Localization本土化of products and services (in Ad) Mobile Commerce • Mobile commerce (m-commerce) – E-commerce transaction conducted in a wireless environment, esp. via the Internet Development of M-Commerce is Driven by: – Widespread availability廣泛的可用性of mobile devices – Declining prices (wireless device) – Bandwidth improvement頻寬的改善 • Bandwidth for transmitting text, voice, video, and multimedia. • Wi-Fi, 4G cellular technology, and WiMAX all provide the necessary bandwidth Mobile Commerce Applications • Location-Based Applications and Services • Financial Services • Intrabusiness Applications • Accessing Information • Telemetry Applications Location-Based Applications and Services基於位置的應用程 序和服務 • Location-Based Applications and Services: M-commerce B2C applications include: – location-based applications and location-based services. • Location-Based Commerce (LCommerce): (is) Location-based mobile commerce. Benefits of Location-Based Services for Users: • Request the nearest business or service (ATM, restaurant) • Receive alerts接收警報 (traffic jam, accident) • Find a friend • Locating taxis, service personnel服 務人員, doctors, and rental equipment租用設備 Benefits of Location-Based Services for Service Providers 服務提供商 • Schedule fleets調動車隊 • Tracking objects such as packages and train boxcars包裹和火車貨車車廂 • Find information such as navigation導 航, weather, traffic, and room schedules房間時間表 • Targeting advertising定位/目標廣告 • Automating airport check-ins報到 Mobile Commerce Applications: Financial Services • Banking – Offer access to financial and account information • Money Transfers匯款 • Micropayments小額支付 – Use mobile to pay (taxi driver) – Very small purchase amounts (generally less than $10) are called micropayments • Wireless Mobile Wallets (M-Wallets) – Helpful for increasing the volume of (micropayment transactions) – Enable cardholders to make purchases with a single click from their mobile devices • Bill Payment繳費Services (in China for companies – www.172.com, launched by Smartpay for paying phone bills and utilities bills, etc.) Intrabusiness企業內部 Applications Intrabusiness Applications: Although business-to-consumer (B2C) m-commerce receives considerable publicity相當宣傳, most of today’s m-commerce applications actually are used within organizations. Mobile Computing For Employee Support: • Workflow工作流程Applications • Dispatch Functions調度功能 Target Areas目標領域for Mobile Delivery and Dispatch輸送和調 度Services: • Employee job assignment任務分配 • Transportation(delivery of food, oil, newspapers, cargo; courier services; tow trucks; taxis) • Utilities公用設施 (gas, electricity, phone, water) • Field service現場服務(computers, office equipment, home repair) • Healthcare衛生保健(visiting nurses上門服務護士, doctors, social services) • Security (patrols巡邏, alarm installation警報器設置) Mobile Computing Applications: Telemetry • Telemetry Applications: the wireless transmission無 線傳輸and receipt of data gathered from remote sensors遠端傳感器. • Application areas: – Car manufacturer: Identify maintenance problems in equipment (www.onstar.com) – Monitor medical patients病人 – Control medical equipment醫療設備remotely – Remote vehicle diagnosis & preventive maintenance汽車診 斷和預防性維護 – Find My iPhone (app) (https://www.apple.com/icloud/find-my-iphone.html) • You can immediately lock your device and send it a message with a contact number. Then whoever finds it can call you from the Lock screen without accessing the rest of the information on your device 10.4 Pervasive Computing • Radio-Frequency Identification (RFID) • Wireless Sensor • Networks • The Internet of Things Radio-Frequency Identification (RFID) • RFID • Bar Codes • QR Codes RFID • Radio-Frequency Identification (RFID): technology that allows manufacturers to attach tags with antennas and computer chips on goods and then track their movement through radio signals. RFID was developed to replace bar codes. • RFID Systems: tags have embedded microchips, which contain data, and antennas to transmit radio signals over a short distance to RFID readers including information that uniquely identifies an item (location and when it was made). • Two Basic Types of RFID Tags – Active RFID: tags that use internal batteries for power, and they broadcast radio waves to a reader. – Passive RFID: tags rely entirely on readers for their power, less expensive than active tags, and can be read only up to 20 feet. Bar Codes Universal Product Code (UPC): A typical bar code made up of 12 digits that are batched in various groups. The first digit identifies the item type, the next five digits identify the manufacturer, and the next five identify the product. The last digit is a check digit for error detection. Limitations of Bar Codes: • Requires line of sight from scanning device • Pose substantial problems in manufacturing plants, warehouses and shipping/receiving docks • Paper bar codes are easily damaged • Identifies the manufacturer and product but not the actual item QR Codes: Advantages Over Bar Codes (QR code: a two-dimensional code, readable by dedicated QR readers and camera phones) • Store more information • Data types stored include numbers, text, URLs, and even Japanese characters. • Smaller because they store information both horizontally and vertically. • Read from any direction or angle • More resistant to damage Wireless Sensor Networks • Motes • Capability of Wireless Sensor Networks • Applications of Wireless Sensor Networks Capability of Wireless Sensor Networks • If one mote fails the gap is covered by nearby motes • Provides data on activities from different angles • Determine direction of movement • Weight of a vehicle • Amount of rainfall over a field of crops Applications of Wireless Sensor Networks • Digital thermostats for energy efficiency • Repair alerts on bridges and oil rigs • Real time operating performance reporting in jet engines • Warning of produce spoilage • Improve a city’s use of utilities • Smart/digital water meters • Smart electrical meters The Internet of Things (IoT) Internet of Things (IoT): a scenario in which objects, animals, and people are provided with unique identifiers and the ability to automatically transfer data over a network without requiring human-to-human or human-to-computer interaction. • Capabilities of IoT • Examples of IoT Use Capabilities of IoT • Reducing waste, loss, and cost • Identifying the need for repair, replacement, or recall • Tracking expiration data on perishable items Examples of IoT Use • Coke machines • A heart monitor implant • A farm animal with a biochip transmitter • An automobile tire pressure 10.5 Wireless Security (1) Four Major Threats to Wireless Networks • Rogue Access Point (Evil Twin) – An unauthorized access point connected to a wireless network. – Evil Twin Attack: • the attacker is in the vicinity with a Wi-Fi-enabled computer and a separate connection to the Internet. Using a hotspotter—a device that detects wireless networks and provides information on them the attacker simulates a wireless access point with the same wireless network name, or SSID, as the one that authorized users expect. If the signal is strong enough, users will connect to the attacker’s system instead of the real access point. 10.5 Wireless Security (2) • War Driving: – The act of locating WLANs while driving (or walking) around a city or elsewhere. • Eavesdropping: – Efforts by unauthorized users to access data that are traveling over wireless networks. • Radio-Frequency (RF) Jamming: – A person or a device intentionally or unintentionally interferes with your wireless network transmissions.