Providing security in ambient networks is a huge challenge. The main reason is that the traditional security model is not valid anymore. Traditional security assumes that there is a vulnerable channel between communicating parties, where eavesdropping, modification of messages or denial of service attacks can occur. But it also assumes that the sender and receiver operate in some form of secure environment. Hence all models of attacks focus on the channel. Due to the distributed nature of ambient networks, the attack can be anywhere on the communication channels and on the devices. The attacker has the advantage that he can choose the easiest entry.
Ambient network is the future network which refers to environment where we can communicate with anyone anywhere anytime. The current most emerging area of Ambient network is Ambient Intelligence. Ambient Intelligence is a distributed network of intelligent devices that provides us with information, communication and entertainment.” “Ambient Intelligence is a network of hidden intelligent interfaces that recognize our presence and mould our environment to our immediate needs.” “Ambient Intelligence refers to an exciting new paradigm in information technology, in which people are empowered through a digital environment that is aware of their presence and context and is sensitive, adaptive and responsive to their needs, habits, gestures and emotions.” Ambient Intell...
... middle of paper ...
...ure”, 2009 IEEE.
 Gy¨orgy K´alm´an, Mohammad M. R. Chowdhury, Josef Noll “Security for Ambient Wireless Services” 2007 IEEE.
 Antonio Mu˜noz Antonio Ma˜na Daniel Serrano “AVISPA in the validation of Ambient Intelligence Scenarios”, 2009”
 Hasan Akram, Mario Hoffmann “Supports for Identity Management in Ambient Environments
The Hydra Approach -” 2008, IEEE.
 Nicolai Kuntze, Julian Schütte. “Securing Decentralized Workflows in Ambient Environments”, 2008 IEEE.
 Mario Schnabel “Privacy-enhanced Personalisation in Ambient Environments” 2008 IEEE.
 Hoffmann, Seppo Heikkinen, Gemt Hornung, Henrik Thuvesson, Christoph loannis Maghiros, Yves Punie, Sabine Delaitre” Safeguards in a World of Ambient Intelligence” April 15,2010
 Daniel Serrano1, Antonio Maña1, Athanasios-Dimitrios Sotirious2” Towards Precise Security Patterns” 2008.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- A huge number of mobile and embedded device interconnecting constantly by mobile and wireless networks with heterogeneous infrastructures , sharing serious and sensitive information, these ubiquitous computing environments ; however, may arise some security and privacy issues. Indeed, security is becoming increasingly a major issue in ubiquitous computing environments. This is because the big difference between traditional wired networks; and wireless, sensor and mobile ad hoc networks that are used in UbiCom environments.... [tags: mobility, openness, scalability ]
1402 words (4 pages)
- Cyber security is the protection of networks, computers, programs and data from attack, damage or unauthorized access. This is important because a great number of our confidential information is on computers and transmit that data across networks to other computers. As of now cyber-attack is one of the transnational issues that we are concern about in the United States. If these private networks were hack our national security infrastructure will be in distress. Cyber security is operating through the Department of homeland security (DHS) privacy office and the component privacy offices.... [tags: Security, National security]
737 words (2.1 pages)
- I have been interested in computer security for a while now. So that’s why I chose to research on some security and privacy issues that are challenging. For example using our cellular phones, playing games online, shopping online and even our private health data, can be invaded by unauthorized users. Therefore, in order to obtain personal data and information in which they can share to other unauthorized persons. These are threats and security issues that we face daily when using our devices and also using the internet.... [tags: Computer security, Security, Information security]
873 words (2.5 pages)
- SECURITY AND PRIVATE ISSUES IN ECOMMERCE INTRODUCTION: Privacy means that the control over data and security of one is the attempt to access the data by other unauthorized . These are two critical issues facing by both consumers and e-commerce sites alike. Since the invention of the World Wide Web , electronic commerce based on the Internet has grown from a simple idea into reality. Consumers browse through catalogs , finding the best deals, order goods and pay electronically .... [tags: Privacy, Data Control, Security, Consumer Sites]
1441 words (4.1 pages)
- Today’s corporate infrastructure is not the same as it was 10 years ago. In the past you were able to control the amount of attacks on a network because of the reasonable number, which is not the case today. At any given time an organizations network will be attacked or try to be attacked several hundred times in one day. For larger more well-known organizations this number could grow significantly. To ensure your organization is not one of the ones on the 10’oclock news you have to ensure you have proper security practices in place to secure your network.... [tags: Network Security]
799 words (2.3 pages)
- ABSTRACT : This paper describes the basic threats to the network security and the basic issues of interest for designing a secure network. it describes the important aspects of network security. A secure network is one which is free of unauthorized entries and hackers INTRODUCTION Over the past few years, Internet-enabled business, or e-business, has drastically improved efficiency and revenue growth. E-business applications such as e-commerce, supply-chain management, and remote access allow companies to streamline processes, lower operating costs, and increase customer satisfaction.... [tags: Networks Telecommunications]
1526 words (4.4 pages)
- 1. Introduction Developments in micro electro mechanical systems (MEMS) and wireless networks are opening a new domain in networking history. Sensors; often called "smart dust" are low cost small tiny devices with limited coverage, low power, smaller memory sizes and low bandwidth, will play a key role in collecting and disseminating data from the fields where ordinary networks are unreachable for various environmental and strategical reasons. There have been significant contributions to overcome many weaknesses in sensor networks like coverage problems, lack in power and making best use of limited network bandwidth, however; work in sensor network security is still in its infancy stage.... [tags: Computers]
1975 words (5.6 pages)
- Network Security When it comes to networking and the security of networks, there are several different methods of protecting networks. Of these differing methods, some of them sound similar, but provide differing levels of security. In the following paragraphs, I will try to explain the differences between some of the methods used. Explain the difference between historical and statistical logging. Logging is a simple way of keeping a record of activity on a network. There are several types of logs that can be kept, each providing different data that can be analyzed to provide information on potential ways of improving security over time.... [tags: Network Security Hacking ]
932 words (2.7 pages)
- Network Security Installing firewall or anti-virus software on enterprise workstations can help prevent some of the security problems the Internet can cause; but not everything. By understanding the different Open Systems Interconnect (OSI) levels and security threats involved with each one of them, it is easier to plan a strategy to combat security problems. Purpose and Scope To cover all areas I have listed the network security measures that are associated with each level of the Open Systems Interconnect (OSI).... [tags: Security Network Technology]
980 words (2.8 pages)
- Network Security 1. What is network security. Network security has changed significantly over the past years. There is more and more data to monitor and analyze in order to detect the activity of your data and systems. Securing a network has many variables. Password authentication, network access, patches, anti-virus protection, intrusion detection, firewall and network monitoring tools are just a few of the things you can do to protect yourself. Threats to your network is becoming more complex and it is requiring lots of money, time and sacrifices to keep up with the growing amount of potential attacks.... [tags: Technology Security Network]
1619 words (4.6 pages)