towards security and privacy for pervasive computing n.
Skip this Video
Loading SlideShow in 5 Seconds..
Towards Security and Privacy for Pervasive Computing PowerPoint Presentation
Download Presentation
Towards Security and Privacy for Pervasive Computing

Loading in 2 Seconds...

  share
play fullscreen
1 / 10
Download Presentation

Towards Security and Privacy for Pervasive Computing - PowerPoint PPT Presentation

jacob
276 Views
Download Presentation

Towards Security and Privacy for Pervasive Computing

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Towards Security and Privacy for Pervasive Computing Author: Roy Campbell,Jalal Al-Muhtadi, Prasad Naldurg,Geetanjali Sampemane M. Dennis Mickunas.(2002) Presented by Shih Yu Chen

  2. Pervasive Computing Sensors Processors Computers

  3. Features of pervasive computing • Extending Computing Boundaries *Hardware and software → physical and virtual *Dull → interactive, dynamic, programmable • Invisibility *Computers → blend in the background *Computerize → boost productivity • Creating smart and sentient spaces *Embedded devices and sensors → sense

  4. Features of pervasive computing • Context awareness *Capture the different context and situation information *Tailoring itself to meet their preferences • Mobility and adaptability *As mobile as its users *Be able to adapt itself to environments

  5. Security Challenges • The Extended Computing Boundary *Information and physical security become interdependent *Traditional mechanisms become inadequate • Privacy Issues *Active sensors and computing capabilities↑→ threat↑ • User Interaction Issues *Richer user-interface *Cannot easily be prevented from seeing and hearing

  6. Security Challenges • Security Policies *Flexible and convenient method for defining and managing security policies *Heterogeneous interfaces↑ → difficult to manage • Info Ops ( Information Operations ) *Actions taken that affect adversary information and information systems while defending one’s own information and information systems *Electronic information, digital communication

  7. Suggest solutions • Authentication *Strike a balance between authentication strength and non-intrusiveness *Context decide how strong the authentication needs to be *Confidence values:0~1 *Employ multiple authentication → confidence value↑ *Access control decisions can now become more flexible by utilizing confidence information

  8. Suggest solutions • Mist-Privacy Communication *Route packets using a hop-by-hop, handle-based routing protocol *Employ public key cryptography *Incoming handle ; outgoing handle Mist router Bob 789 4 2 910 910 192 192 515 3 789 1

  9. Security Requirements • Transparency and unobtrusiveness • Multilevel • Context-Awareness • Flexibility and customizability • Interoperability • Extended boundaries

  10. Conclusion • Pervasive computing brings new challenges to security and privacy , which cannot be addressed by mere adaptation of existing security and privacy mechanisms. • Unless security concerns are accommodated early in the design phase, pervasive computing environments will be rife with vulnerabilities.