Lecture slides for Topic 6 and 7
Lecture slides for Topic 6 and 7
(CoSc 6304)
6. Security and Privacy in
Pervasive Computing
Introduction
Ubiquitous Pervasive computing is the third
wave in computing.
Privacy Issues
The physical outreach of pervasive computing makes preserving
users’ privacy a much more difficult task. For instance, this
capability can be exploited by intruders, malicious insiders, or even
curious system administrators to track or electronically stalk
particular users.
Moreover, there are certain situations when people do not want to
be tracked.
Security Requirements
Multilevel
When it comes to security, one size does not fit all. Hence,
the security architecture deployed should be able to provide
different levels of security services based on system policy.
Interoperability
With many different security technologies surfacing and being deployed,
the assumption that a particular security mechanism will eventually
prevail is flawed.
Extended Boundaries
While traditional security was restricted to the virtual
world, security now should incorporate some aspects
of the physical world, e.g. preventing intruders from
accessing physical spaces.
Security Requirements
Scalability
Pervasive computing environments can host hundreds or thousands of
diverse devices. the security services need to be able to support huge
numbers of users with different roles and privileges, under different
situational information.
Adaptation
Adaptation is required in order to overcome the intrinsically dynamic
nature of pervasive computing. Mobility of users, devices and software
components can occur, leading to changes in the physical and virtual
environments of these entities.
Pervasive Computing Attacks
Basic Characteristics
Miniaturization: reducing size of pervasive components for their
mobility with ease of access
Embedding: pervasive components are embedded into everyday
objects, converting them into smart objectsith ease of access.
Networking: pervasive components are linked to each other for
communication via radio, Infra or Micro Waves, and are designed
to work simultaneously.
Ubiquity: since embedded pervasive components are ubiquitous,
they are oblivious or even invisible too, to user.
Limitations of Pervasive Computing