Abstract
Pervasive computing environments with their interconnected devices and services promise seamless integration of digital infrastructure into our everyday lives. While the focus of current research is on how to connect new devices and build useful applications to improve functionality, the security and privacy issues in such environments have not been explored in any depth. While traditional distributed computing research attempts to abstract away physical location of users and resources, pervasive computing applications often exploit physical location and other context information about users and resources to enhance the user experience. The need to share resources and collaborate introduces new types of interaction among users as well as between the virtual and physical worlds. In this context, it becomes difficult to separate physical security from digital security. Existing policies and mechanisms may not provide adequate guarantees to deal with new exposures and vulnerabilities introduced by the pervasive computing paradigm. In this paper we explore the challenges for building security and privacy into pervasive computing environments, describe our prototype implementation that addresses some of these issues, and propose some directions for future work.
This research is supported by a grant from the National Science Foundation, NSF CCR 0086094 ITR and NSF 99-72884 EQ.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
“Bluetooth.” http://www.bluetooth.com/.
M. Langheinrich, “Privacy by Design-Principles of Privacy-Aware Ubiquitous Systems,” presented at ACM UbiComp 2001, Atlanta, GA, 2001.
M. Langheinrich, “A Privacy Awareness System for Ubiquitous Computing Environments,” presented at 4th International Conference on Ubiquitous Computing, 2002.
F. Stajano, Security for Ubiquitous Computing: Halsted Press, 2002.
L. Kagal, T. Finin, and A. Joshi, “Trust-Based Security in Pervasive Computing Environments,” IEEE Computer, 2001.
L. Kagal, J. Undercoffer, F. Perich, A. Joshi, and T. Finin, “Vigil: Enforcing Security in Ubiquitous Environments,” in Grace Hopper Celebration of Women in Computing 2002, 2002.
J. Boyle and e. al, “The COPS Protocol.” Internet Draft, Feb. 24, 1999.
R. Mundy, D. Partain, and B. Stewart, “Introduction to SNMPv3.” RFC 2570, April 1999.
M. Stevens and e. al, “Policy Framework.” IETF draft, September 1999.
P. Loscocco and S. Smalley, “Integrating Flexible Support for Security Policies into the Linux Operating System,” presented at Proceedings of the FREENIX Track of the 2001 USENIX, 2001.
E. A. M. Luiijf, “Information Assurance and the Information Society,” presented at EICAR Best Paper Proceedings, 1999.
M. Román, C. K. Hess, R. Cerqueira, A. Ranganat, R. H. Campbell, and K. Nahrstedt, “Gaia: A Middleware Infrastructure to Enable Active Spaces,” IEEE Pervasive Computing (accepted), 2002.
M. Roman and R. Campbell, “GAIA: Enabling Active Spaces,” presented at 9th ACM SIGOPS European Workshop, Kolding, Denmark, 2000.
M. Roman, C. Hess, A. Ranganathan, P. Madhavarapu, B. Borthakur, P. Viswanathan, R. Cerqueira, R. Campbell, and M. D. Mickunas, “GaiaOS: An Infrastructure for Active Spaces,” University of Illinois at Urbana-Champaign Technical Report UIUCDCS-R-2001-2224 UILU-ENG-2001-1731, 2001.
L. Zadeh, “Fuzzy sets as basis for a theory of possibility,” Fuzzy Sets and Systems, vol. 1, pp. 3–28, 1978.
V. Samar and R. Schemers, “Unified Login with Pluggable Authentication Modules (PAM),” RFC 86.0, 1995.
P. Kaijser, T. Parker, and D. Pinkas, “SESAME: The Solution to Security for Open Distributed Systems,” Computer Communications, vol. 17, pp. 501–518, 1994.
M. Roman, F. Kon, and R. H. Campbell, “Reflective Middleware: From Your Desk to Your Hand,” IEEE Distributed Systems Online Journal, Special Issue on Reflective Middleware, 2001.
J. Al-Muhtadi, R. Campbell, A. Kapadia, D. Mickunas, and S. Yi, “Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments,” presented at International Conference of Distributed Computing Systems (ICDCS 2002), Vienna, Austria, 2002.
J. Al-Muhtadi, R. Campbell, A. Kapadia, D. Mickunas, and S. Yi, “Routing through the Mist: Design and Implementation,” UIUCDCS-R-2002-2267, March 2002.
Z. Liu, P. Naldurg, S. Yi, R. H. Campbell, and M. D. Mickunas, “An Agent Based Architecture for Supporting Application Level Security,” presented at DARPA Information Survivability Conference (DISCEX 2000), Hilton Head Island, South Carolina, 2000.
P. Naldurg and R. Campbell, “Dynamic Access Control Policies in Seraphim,” Department of Computer Science, University of Illinois at Urbana-Champaign UIUCDCS-R-2002-2260, 2002.
P. Naldurg, R. Campbell, and M. D. Mickunas, “Developing Dynamic Security Policies,” presented at Proceedings of the 2002 DARPA Active Networks Conference and Exposition (DANCE 2002), San Francisco, CA, USA, 2002.
G. Sampemane, P. Naldurg, and R. Campbell, “Access Control for Active Spaces,” presented at the Annual Computer Security Applications Conference (ACSAC), Las Vegas, NV, 2002.
R. Sandhu, E. Coyne, H. Fienstein, and C. Youman, “Role Based Access Control Models,” in IEEE Computer, vol. 29, 1996.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Campbell, R., Al-Muhtadi, J., Naldurg, P., Sampemane, G., Dennis Mickunas, M. (2003). Towards Security and Privacy for Pervasive Computing. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds) Software Security — Theories and Systems. ISSS 2002. Lecture Notes in Computer Science, vol 2609. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36532-X_1
Download citation
DOI: https://doi.org/10.1007/3-540-36532-X_1
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00708-1
Online ISBN: 978-3-540-36532-7
eBook Packages: Springer Book Archive