Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Skip header Section
Security: for ubiquitous computingMarch 2002
Publisher:
  • John Wiley & Sons, Inc.
  • 605 Third Ave. New York, NY
  • United States
ISBN:978-0-470-84493-9
Published:01 March 2002
Pages:
268
Skip Bibliometrics Section
Reflects downloads up to 24 Jan 2025Bibliometrics
Skip Abstract Section
Abstract

Security for Ubiquitous Computing combines clarity, brevity and authority. It will appeal to developers and researchers in ubiquitous computing, wireless and ad-hoc networking, wearable computing and related areas. Because it is readable and self-contained, it will also prove valuable to managers, analysts, technology watchers and end users who want to understand the new opportunities and risks of ubicomp.

Cited By

  1. El Husseini A, M'hamed A, El Hassan B and Mokhtari M (2013). Trust-based authentication scheme with user rating for low-resource devices in smart environments, Personal and Ubiquitous Computing, 17:5, (1013-1023), Online publication date: 1-Jun-2013.
  2. Delgado-Mohatar O, Fúster-Sabater A and Sierra J (2011). A light-weight authentication scheme for wireless sensor networks, Ad Hoc Networks, 9:5, (727-735), Online publication date: 1-Jul-2011.
  3. ACM
    Oladimeji E, Chung L, Jung H and Kim J Managing security and privacy in ubiquitous eHealth information interchange Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, (1-10)
  4. Gong N, Laibowitz M and Paradiso J Dynamic privacy management in pervasive sensor networks Proceedings of the First international joint conference on Ambient intelligence, (96-106)
  5. Delgado-Mohatar O, Sierra J, Brankovic L and Fúster-Sabater A An energy-efficient symmetric cryptography based authentication scheme for wireless sensor networks Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices, (332-339)
  6. ACM
    Yu Z and Nakamura Y (2010). Smart meeting systems, ACM Computing Surveys, 42:2, (1-20), Online publication date: 1-Feb-2010.
  7. Giannotti F and Saygin Y Privacy and security in ubiquitous knowledge discovery Ubiquitous knowledge discovery, (75-89)
  8. Giannotti F and Saygin Y Privacy and security in ubiquitous knowledge discovery Ubiquitous knowledge discovery, (75-89)
  9. Cagalj M, Saxena N and Uzun E On the Usability of Secure Association of Wireless Devices Based on Distance Bounding Proceedings of the 8th International Conference on Cryptology and Network Security, (443-462)
  10. Shi X and Pazat J (2009). An adaptive and safe ubicomp for HPC applications, International Journal of Ad Hoc and Ubiquitous Computing, 4:6, (363-371), Online publication date: 1-Sep-2009.
  11. ACM
    Stajano F (2009). Foot-driven computing, SIGSPATIAL Special, 1:2, (28-32), Online publication date: 1-Jul-2009.
  12. ACM
    Oyomno W, Jäppinen P and Kerttula E Privacy implications of context-aware services Proceedings of the Fourth International ICST Conference on COMmunication System softWAre and middlewaRE, (1-9)
  13. ACM
    Babulak E Next generation of transportation & information technologies Proceedings of the 2009 Euro American Conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship, (1-4)
  14. Meyer G, Främling K and Holmström J (2009). Intelligent Products, Computers in Industry, 60:3, (137-148), Online publication date: 1-Apr-2009.
  15. Ahamed S and Sharmin M (2008). A trust-based secure service discovery (TSSD) model for pervasive computing, Computer Communications, 31:18, (4281-4293), Online publication date: 1-Dec-2008.
  16. Saxena A, Lacoste M, Jarboui T, Lücking U and Steinke B A software framework for autonomic security in pervasive environments Proceedings of the 3rd international conference on Information systems security, (91-109)
  17. Oliveira P and Barros J Network coding protocols for secret key distribution Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II, (1718-1733)
  18. Bichler D, Stromberg G, Huemer M and Löw M Key generation based on acceleration data of shaking processes Proceedings of the 9th international conference on Ubiquitous computing, (304-317)
  19. Spiekermann S Privacy enhancing technologies for RFID in retail- an empirical investigation Proceedings of the 9th international conference on Ubiquitous computing, (56-72)
  20. Park H, Lim S, Yie I, Kim H, Chun K and Lee J An information aggregation scheme of multi-node in ubiquitous sensor networks Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking, (60-68)
  21. Irshad A, Iqbal M, Ali A and Shafiq M An algorithm for prediction of overhead messages in client-server based wireless networks Proceedings of the 2011 international conference on Computational science and its applications - Volume Part IV, (412-423)
  22. Shi X and Pazat J A novel adaptive and safe framework for ubicomp Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining, (550-561)
  23. Großschädl J, Tillich S, Rechberger C, Hofmann M and Medwed M Energy evaluation of software implementations of block ciphers under memory constraints Proceedings of the conference on Design, automation and test in Europe, (1110-1115)
  24. Park J, Song J, Koh B, Lee D and Park B A hybrid intelligent multimedia service framework in next generation home network environment Proceedings of the 1st international conference on Advances in hybrid information technology, (395-403)
  25. Rosa-Velardo F and de Frutos-Escrig D Symbolic semantics for the verification of security properties of mobile petri nets Proceedings of the 4th international conference on Automated Technology for Verification and Analysis, (461-476)
  26. ACM
    Nosseir A, Connor R, Revie C and Terzis S Question-based authentication using context data Proceedings of the 4th Nordic conference on Human-computer interaction: changing roles, (429-432)
  27. ACM
    Čapkun S and Čagalj M Integrity regions Proceedings of the 5th ACM workshop on Wireless security, (1-10)
  28. Schlott S, Kargl F and Weber M Re-identifying anonymous nodes Proceedings of the Second international conference on Location- and Context-Awareness, (103-115)
  29. Zhou B, Shi Q and Merabti M Real-time intrusion detection in ubiquitous networks with a string-based approach Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV, (352-359)
  30. Accorsi R and Hohl A Delegating secure logging in pervasive computing systems Proceedings of the Third international conference on Security in Pervasive Computing, (58-72)
  31. ACM
    Blaß E and Zitterbart M An efficient key establishment scheme for secure aggregating sensor networks Proceedings of the 2006 ACM Symposium on Information, computer and communications security, (303-310)
  32. Park J, Choi J, Lee S, Park H and Lee D User-oriented multimedia service using smart sensor agent module in the intelligent home Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part I, (313-320)
  33. Dragovic B and Policroniades C Information seesaw Proceedings of the Second VDLB international conference on Secure Data Management, (200-216)
  34. ACM
    Stajano F (2005). RFID is x-ray vision, Communications of the ACM, 48:9, (31-33), Online publication date: 1-Sep-2005.
  35. Ko H, Sohn B, Park H and Shin Y Safe authentication method for security communication in ubiquitous Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II, (442-448)
  36. Wong F and Stajano F Multi-channel protocols Proceedings of the 13th international conference on Security protocols, (112-127)
  37. Jacobsson M and Niemegeers I Privacy and Anonymity in Personal Networks Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops, (130-135)
  38. Floerkemeier C, Schneider R and Langheinrich M Scanning with a purpose Proceedings of the Second international conference on Ubiquitous Computing Systems, (214-231)
  39. ACM
    Dragovic B and Crowcroft J Information exposure control through data manipulation for ubiquitous computing Proceedings of the 2004 workshop on New security paradigms, (57-64)
  40. Hof H, Blaß E and Zitterbart M Secure overlay for service centric wireless sensor networks Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks, (125-138)
  41. Stajano F One user, many hats; and, sometimes, no hat Proceedings of the 12th international conference on Security Protocols, (51-64)
  42. ACM
    Čapkun S, Buttyán L and Hubaux J SECTOR Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, (21-32)
  43. ACM
    Čapkun S and Hubaux J BISS Proceedings of the 2nd ACM workshop on Wireless security, (21-29)
  44. ACM
    Čapkun S, Hubaux J and Buttyán L Mobility helps security in ad hoc networks Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing, (46-56)
  45. Gray E, Seigneur J, Chen Y and Jensen C Trust propagation in small worlds Proceedings of the 1st international conference on Trust management, (239-254)
  46. ACM
    Corner M and Noble B Protecting applications with transient authentication Proceedings of the 1st international conference on Mobile systems, applications and services, (57-70)
  47. ACM
    Ayatsuka Y, Kohno M and Rekimoto J ShownPass CHI '03 Extended Abstracts on Human Factors in Computing Systems, (984-985)
  48. Al-Muhtadi J, Ranganathan A, Campbell R and Mickunas M Cerberus Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
  49. Stajano F and Crowcroft J The butt of the iceberg Ambient intelligence, (91-101)
  50. Beresford A and Stajano F (2003). Location Privacy in Pervasive Computing, IEEE Pervasive Computing, 2:1, (46-55), Online publication date: 1-Jan-2003.
  51. Stajano F Security for whom? the shifting security assumptions of pervasive computing Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems, (16-27)
  52. Campbell R, Al-Muhtadi J, Naldurg P, Sampemane G and Mickunas M Towards security and privacy for pervasive computing Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems, (1-15)

Reviews

Martin William Sachs

Ubiquitous computing is a vision of a world filled with millions, or billions, of intercommunicating small processors, powering everything conceivable, from kitchen appliances, to automotive engine computers, to smart cards, to cellular phones. Today, many of these processors are so small and underpowered (the author calls them peanut processors) that normal computer security techniques, such as public-key encryption, cannot be used with them. Stajano’s book is an introduction to computer security for technical people. It focuses on the unique challenges imposed by the world of ubiquitous computing. The book begins with an overview of ubiquitous computing. Security is a major issue for ubiquitous computing, because just about any device that contains a processor may hold or convey information that is of interest to an adversary. The security topics covered in the book are confidentiality (including a discussion of various digital encryption approaches), integrity, availability, authentication, and anonymity. The emphasis is on the cryptology mechanisms used to achieve security. Privacy issues are discussed extensively, although in the introduction the author points out that there is little difference between privacy and confidentiality. While this is true from a technology viewpoint, the author has missed the point that an important component of privacy is privacy policy: what a service provider promises about guarding the confidentiality of private information. This does not have a technological solution, since the service provider is in control of its technology. The author warns that ubiquitous computing has the potential to turn into ubiquitous surveillance. This has a direct bearing on privacy policy issues. An appendix discusses existing security solutions. The book would have benefited from inclusion of a survey of the current work on security in standards bodies such as the World Wide Web Consortium and OASIS. This ongoing work includes XML encryption, XML digital signatures, access control, key management, and privacy policies. Much of this work will be relevant to ubiquitous computing. The author has an interesting way of drawing on totally unrelated domains of knowledge to make his points clear. For example, he uses the analogy of a newly hatched duckling bonding to its mother to help explain how a device can be associated with its owner. Overall, the book conveys a large amount of information in a light, highly readable, style, which requires minimal prior knowledge of security matters. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Recommendations