iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.1007/3-540-36532-X_1
Towards Security and Privacy for Pervasive Computing | SpringerLink
Skip to main content

Towards Security and Privacy for Pervasive Computing

  • Conference paper
  • First Online:
Software Security — Theories and Systems (ISSS 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2609))

Included in the following conference series:

  • 1035 Accesses

Abstract

Pervasive computing environments with their interconnected devices and services promise seamless integration of digital infrastructure into our everyday lives. While the focus of current research is on how to connect new devices and build useful applications to improve functionality, the security and privacy issues in such environments have not been explored in any depth. While traditional distributed computing research attempts to abstract away physical location of users and resources, pervasive computing applications often exploit physical location and other context information about users and resources to enhance the user experience. The need to share resources and collaborate introduces new types of interaction among users as well as between the virtual and physical worlds. In this context, it becomes difficult to separate physical security from digital security. Existing policies and mechanisms may not provide adequate guarantees to deal with new exposures and vulnerabilities introduced by the pervasive computing paradigm. In this paper we explore the challenges for building security and privacy into pervasive computing environments, describe our prototype implementation that addresses some of these issues, and propose some directions for future work.

This research is supported by a grant from the National Science Foundation, NSF CCR 0086094 ITR and NSF 99-72884 EQ.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. “Bluetooth.” http://www.bluetooth.com/.

  2. M. Langheinrich, “Privacy by Design-Principles of Privacy-Aware Ubiquitous Systems,” presented at ACM UbiComp 2001, Atlanta, GA, 2001.

    Google Scholar 

  3. M. Langheinrich, “A Privacy Awareness System for Ubiquitous Computing Environments,” presented at 4th International Conference on Ubiquitous Computing, 2002.

    Google Scholar 

  4. F. Stajano, Security for Ubiquitous Computing: Halsted Press, 2002.

    Google Scholar 

  5. L. Kagal, T. Finin, and A. Joshi, “Trust-Based Security in Pervasive Computing Environments,” IEEE Computer, 2001.

    Google Scholar 

  6. L. Kagal, J. Undercoffer, F. Perich, A. Joshi, and T. Finin, “Vigil: Enforcing Security in Ubiquitous Environments,” in Grace Hopper Celebration of Women in Computing 2002, 2002.

    Google Scholar 

  7. J. Boyle and e. al, “The COPS Protocol.” Internet Draft, Feb. 24, 1999.

    Google Scholar 

  8. R. Mundy, D. Partain, and B. Stewart, “Introduction to SNMPv3.” RFC 2570, April 1999.

    Google Scholar 

  9. M. Stevens and e. al, “Policy Framework.” IETF draft, September 1999.

    Google Scholar 

  10. P. Loscocco and S. Smalley, “Integrating Flexible Support for Security Policies into the Linux Operating System,” presented at Proceedings of the FREENIX Track of the 2001 USENIX, 2001.

    Google Scholar 

  11. E. A. M. Luiijf, “Information Assurance and the Information Society,” presented at EICAR Best Paper Proceedings, 1999.

    Google Scholar 

  12. M. Román, C. K. Hess, R. Cerqueira, A. Ranganat, R. H. Campbell, and K. Nahrstedt, “Gaia: A Middleware Infrastructure to Enable Active Spaces,” IEEE Pervasive Computing (accepted), 2002.

    Google Scholar 

  13. M. Roman and R. Campbell, “GAIA: Enabling Active Spaces,” presented at 9th ACM SIGOPS European Workshop, Kolding, Denmark, 2000.

    Google Scholar 

  14. M. Roman, C. Hess, A. Ranganathan, P. Madhavarapu, B. Borthakur, P. Viswanathan, R. Cerqueira, R. Campbell, and M. D. Mickunas, “GaiaOS: An Infrastructure for Active Spaces,” University of Illinois at Urbana-Champaign Technical Report UIUCDCS-R-2001-2224 UILU-ENG-2001-1731, 2001.

    Google Scholar 

  15. L. Zadeh, “Fuzzy sets as basis for a theory of possibility,” Fuzzy Sets and Systems, vol. 1, pp. 3–28, 1978.

    Article  MATH  MathSciNet  Google Scholar 

  16. V. Samar and R. Schemers, “Unified Login with Pluggable Authentication Modules (PAM),” RFC 86.0, 1995.

    Google Scholar 

  17. P. Kaijser, T. Parker, and D. Pinkas, “SESAME: The Solution to Security for Open Distributed Systems,” Computer Communications, vol. 17, pp. 501–518, 1994.

    Article  Google Scholar 

  18. M. Roman, F. Kon, and R. H. Campbell, “Reflective Middleware: From Your Desk to Your Hand,” IEEE Distributed Systems Online Journal, Special Issue on Reflective Middleware, 2001.

    Google Scholar 

  19. J. Al-Muhtadi, R. Campbell, A. Kapadia, D. Mickunas, and S. Yi, “Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments,” presented at International Conference of Distributed Computing Systems (ICDCS 2002), Vienna, Austria, 2002.

    Google Scholar 

  20. J. Al-Muhtadi, R. Campbell, A. Kapadia, D. Mickunas, and S. Yi, “Routing through the Mist: Design and Implementation,” UIUCDCS-R-2002-2267, March 2002.

    Google Scholar 

  21. Z. Liu, P. Naldurg, S. Yi, R. H. Campbell, and M. D. Mickunas, “An Agent Based Architecture for Supporting Application Level Security,” presented at DARPA Information Survivability Conference (DISCEX 2000), Hilton Head Island, South Carolina, 2000.

    Google Scholar 

  22. P. Naldurg and R. Campbell, “Dynamic Access Control Policies in Seraphim,” Department of Computer Science, University of Illinois at Urbana-Champaign UIUCDCS-R-2002-2260, 2002.

    Google Scholar 

  23. P. Naldurg, R. Campbell, and M. D. Mickunas, “Developing Dynamic Security Policies,” presented at Proceedings of the 2002 DARPA Active Networks Conference and Exposition (DANCE 2002), San Francisco, CA, USA, 2002.

    Google Scholar 

  24. G. Sampemane, P. Naldurg, and R. Campbell, “Access Control for Active Spaces,” presented at the Annual Computer Security Applications Conference (ACSAC), Las Vegas, NV, 2002.

    Google Scholar 

  25. R. Sandhu, E. Coyne, H. Fienstein, and C. Youman, “Role Based Access Control Models,” in IEEE Computer, vol. 29, 1996.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Campbell, R., Al-Muhtadi, J., Naldurg, P., Sampemane, G., Dennis Mickunas, M. (2003). Towards Security and Privacy for Pervasive Computing. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds) Software Security — Theories and Systems. ISSS 2002. Lecture Notes in Computer Science, vol 2609. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36532-X_1

Download citation

  • DOI: https://doi.org/10.1007/3-540-36532-X_1

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00708-1

  • Online ISBN: 978-3-540-36532-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics