Javascript must be enabled to continue!
Security in Pervasive Computing
View through CrossRef
Security requirements for pervasive computing environments are different from those in fixed networks. This is due to the intensity and complexity of the communication between the user and the infrastructure, the mobility of the user, and dynamic sharing of limited resources. As pervasive computing makes information access and processing easily available for everyone from anywhere at anytime, the close relationship between distributed systems and mobile computing with a pervasive infrastructure leads us to take a closer look at different types of vulnerabilities and attacks in such environments. Pervasive computing includes numerous, often transparent, computing devices that are frequently mobile or embedded in the environment, and are connected to an increasingly ubiquitous network structure. For example, when an organization employs pervasive computing, the environment becomes more knowledgeable about the users’ behavior and, hence, becomes more proactive with each individual user as time passes. Therefore, the user must be able to trust the environment and the environment must be confident of the user’s identity. This implies security is an important concern in the success of pervasive computing environments. In this chapter we evaluate the suitability of existing security methods for pervasive environments.
Title: Security in Pervasive Computing
Description:
Security requirements for pervasive computing environments are different from those in fixed networks.
This is due to the intensity and complexity of the communication between the user and the infrastructure, the mobility of the user, and dynamic sharing of limited resources.
As pervasive computing makes information access and processing easily available for everyone from anywhere at anytime, the close relationship between distributed systems and mobile computing with a pervasive infrastructure leads us to take a closer look at different types of vulnerabilities and attacks in such environments.
Pervasive computing includes numerous, often transparent, computing devices that are frequently mobile or embedded in the environment, and are connected to an increasingly ubiquitous network structure.
For example, when an organization employs pervasive computing, the environment becomes more knowledgeable about the users’ behavior and, hence, becomes more proactive with each individual user as time passes.
Therefore, the user must be able to trust the environment and the environment must be confident of the user’s identity.
This implies security is an important concern in the success of pervasive computing environments.
In this chapter we evaluate the suitability of existing security methods for pervasive environments.
Related Results
Tools for interdisciplinary design of pervasive computing
Tools for interdisciplinary design of pervasive computing
PurposeTo be successful, pervasive computing requires a balance of computing, design, and business requirements to be considered throughout the design process. Achieving this synth...
Development Tasks of AI-based Security Industry
Development Tasks of AI-based Security Industry
Recently, the government's interest in industries utilizing AI has been amplified, with initiatives such as announcing a roadmap aiming to achieve the goal of becoming the world's ...
Human Security
Human Security
The term “human security” was first employed in the United Nations Development Programme (UNDP) Human Development Report (HDR) of 1994, which argued for a “people-centric” concept ...
Deploying Pervasive Technologies
Deploying Pervasive Technologies
Communication technologies are currently addressing our daily lives. Internet, fixed-line networks, wireless networks, and sensor technologies are converging, and seamless communic...
Personnel Security as an Integral Part of Economic Security at Agricultural Enterprises
Personnel Security as an Integral Part of Economic Security at Agricultural Enterprises
Abstract. Introduction. The article examines the place of personnel security as a component of the system of economic security at enterprises. The main approaches to the formation ...
Sensor Networks in Pervasive Healthcare Computing
Sensor Networks in Pervasive Healthcare Computing
Advances in wireless sensor networking (WSN) have opened up new opportunities in distributed informatics. Pervasive healthcare, based on WSN, is an emerging technology area with gr...
SECURITY THREATS AND COUNTERMEASURES IN CLOUD
SECURITY THREATS AND COUNTERMEASURES IN CLOUD
Cloud computing refers to the continuous availability of computer infrastructure technology, enabling the handling and storage of information without direct client management. Peop...
Meta Model Context Based Space for Ubiquitous Computing
Meta Model Context Based Space for Ubiquitous Computing
Pervasive computing is a paradigm that focuses on the availability of computer resources anytime anywhere for any application and supports integration of computing services into ev...

