0% found this document useful (0 votes)
27 views

Lecture slides for Topic 6 and 7

Uploaded by

root23
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views

Lecture slides for Topic 6 and 7

Uploaded by

root23
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Pervasive & Ubiquitous Computing

(CoSc 6304)
6. Security and Privacy in
Pervasive Computing
Introduction
Ubiquitous Pervasive computing is the third
wave in computing.

First were mainframes, each shared by lots of


people.

The 2nd is the personal computing era, person and


machine staring uneasily at each other across the
desktop.

The 3rd is ubiquitous computing, or the age of calm


technology, where technology recedes into the
background of our lives.
Pervasive Computing is the integration technology
into people’s lives and environments, made possible
by the growing availability of microprocessors with
inbuilt communication facilities.

In such computing environments, these services will


increase both the complexity of information
infrastructures and the networks which support them.

Threats exploiting vulnerabilities of new kinds of user


interfaces, displays, operating systems, networks, and
wireless communications cause new risks of losing
confidentiality, integrity, and availability.
Security Challenges

The Extended Computing Boundary


Traditionalcomputing is confined to the virtual computing
world where data and programs reside.
Pervasive computing, however, extends its reach beyond the
computational infrastructure and attempts to encompass the
surrounding physical spaces as well.
User Interaction Issues
One of the main characteristics of pervasive
applications is a richer user-interface for interaction
between users and the space.
A variety of multimedia mechanisms are used for input
and output, and to control the physical aspects of the
space.
Security Challenges

Privacy Issues
The physical outreach of pervasive computing makes preserving
users’ privacy a much more difficult task. For instance, this
capability can be exploited by intruders, malicious insiders, or even
curious system administrators to track or electronically stalk
particular users.
Moreover, there are certain situations when people do not want to
be tracked.
Security Requirements

Transparency and Unobtrusiveness


The focal point of pervasive computing is to transform
users into first class entities, who no longer need to exert
much of their attention to computing machinery.

Multilevel
When it comes to security, one size does not fit all. Hence,
the security architecture deployed should be able to provide
different levels of security services based on system policy.

Flexibility and Customizability


 The security subsystem should be flexible, adaptable,
and customizable.
Security Requirements

Interoperability
 With many different security technologies surfacing and being deployed,
the assumption that a particular security mechanism will eventually
prevail is flawed.

Extended Boundaries
While traditional security was restricted to the virtual
world, security now should incorporate some aspects
of the physical world, e.g. preventing intruders from
accessing physical spaces.
Security Requirements

Scalability
 Pervasive computing environments can host hundreds or thousands of
diverse devices. the security services need to be able to support huge
numbers of users with different roles and privileges, under different
situational information.

Adaptation
 Adaptation is required in order to overcome the intrinsically dynamic
nature of pervasive computing. Mobility of users, devices and software
components can occur, leading to changes in the physical and virtual
environments of these entities.
Pervasive Computing Attacks

Compromise users’ data


Crash an entire system
Render services unavailable
Potentially lead to the loss of property
Harm users and even lives
Pervasive Computing Attacks

Common vulnerabilities existing in wireless technologies:


Physical jamming

 Passive eavesdropping and traffic analysis


 Message injection and active eavesdropping
 Message deletion and interception
 Insider attacks to breach data confidentiality
 Wi-Fi MAC Protocol Attacks
 Wi-Fi Security Protocol Attacks
7. Future Trends in
Pervasive Computing
Future Trends of Pervasive Computing
As stated by Gordon Moore microprocessor performance
doubles approximately after every eighteen months.

This trend indicates future computers would shrink further


and hence be easily available to the masses in much easier
forms and types.

Computers are integrated to everyday devices and hence


expanding their efficacy and executing capacities using
embedded technology in which a chip is being implanted
into the daily use object making it a “smart object”
Future Trends of Pervasive Computing
Goal of pervasive computing is to meet the assertion of
everything, always, everywhere for data processing and
transmission through the ubiquity of pervasive systems.

Basic Characteristics
 Miniaturization: reducing size of pervasive components for their
mobility with ease of access
 Embedding: pervasive components are embedded into everyday
objects, converting them into smart objectsith ease of access.
 Networking: pervasive components are linked to each other for
communication via radio, Infra or Micro Waves, and are designed
to work simultaneously.
 Ubiquity: since embedded pervasive components are ubiquitous,
they are oblivious or even invisible too, to user.
Limitations of Pervasive Computing

Environmental sustainability, resource consumption and


legal regulation are some of the minor limiting factors for
successful deployment of ubiquitous computing.
Power consumption: impossible to change batteries to
many Ubicomputing devices frequently.
Standardization, however, is of prime importance as the
functional interplay of individual components is a key
requirement of ubiquitous computing.
Balance of HW/SW feature: display, network, processing,
memory, storage capability, multitasking, etc.
The relevance of individual data protection and privacy
varies depending on the specific application.
Thank you

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy