Indeed, security is becoming increasingly a major issue in ubiquitous computing environments. This is because the big difference between traditional wired networks; and wireless, sensor and mobile ad hoc networks that are used in UbiCom environments. Therefore, ensuring that these networks, sensitive information and users are secure is a great obstacle , due to the unique features of these networks, such as: complexity, mobility, openness, scalability and dynamism (Boukerche and Ren, 2008). In addition, preserving data integrity, availability and confidentiality is also a mutual concern in UbiCom systems (Wang, McNair and Xie,2006) . Thus, a large number of respective mechanisms, policies and models are suggested in order to address such raised challenges or at least mitigate them.
Authentication is the main approach of guaranteeing security in any system. It enables systems to make sure that only authorized users can access networks and share resources. Buhan, Lenzini, and Radomirovic (2010) suggested that a strong relation between the users and their mobile device is required to authenticate themselves to ubiquitous services. Accordingly, Contextual Pseudo Identity was proposed, which is an authentication key uses user’s biometric samples and contextual information to verify his identity. Contextual data can be collected from the user as his situation or what activity is doing, or automatically from his device as his location. In each session the user r...
... middle of paper ...
...ture Notes in Computer Science, 2201 ,273–291, Springer , 2001.
9. Wang, W., McNair,J., Xie, J., Authentication and Security Protocols for Ubiquitous Wireless Networks, In Vasilakos,A., Pedrycz,W. Eds.,Ambient Intelligence, Wireless Networking, and Ubiquitous Computing, 329-344, 2006.
10. Vaidya,B., et al, Investigating Authentication Mechanisms for Wireless Mobile Network, Ubiquitous Intelligence and Computing, Lecture Notes in Computer Science , 6159, 902-911, Springer , 2006.
11. Yang,W., Tao Zhu,W., Protecting Source Location Privacy in Wireless
Sensor Networks with Data Aggregation, Ubiquitous Intelligence and Computing, Lecture Notes in Computer Science, 6406,252-266 , Springer,2010.
12. Zhang,P. , Fan,J., Zheng, W., Privacy Protection in Ubiquitous Computing, First International Conference on Pervasive Computing, Signal Processing and Applications, 2010.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Home Networks Home networks are common but may be difficult to setup and maintain. The difficulty users experience in setting up and maintaining their home network is challenging because of the numerous security threats that can exploit poorly configured and maintained network security (Ho et al, 2010). Users generally do not understand the normal encryption mechanism within wireless routers and access points. Additionally, users utilize weak security configuration within their wireless networks from lack cyber security knowledge.... [tags: Wireless access point, Wi-Fi, Wireless networking]
876 words (2.5 pages)
- For Airports, There is No Silver Bullet for Cybersecurity Cyber security has become the most pressing, yet most misunderstood, segments in IT. While advances in technology have allowed organizations to reduce the number of threats that get through, the damage caused by cyber attacks continues to increase. Further, complicating this, the amount of devices and systems that connect to networks is expected to increase by 200% by 2020 (Moor Insights & Strategy). Within an airport’s infrastructure “Cyber” typically covers various solutions from IT networks, computers, servers, industrial control systems (ICS), HVAC metering & monitoring, lighting, access control, passenger screening, closed circ... [tags: Security, Computer security, National security]
787 words (2.2 pages)
- In this day of hacker, where personal online information of any regular citizen is unsafe, your company 's online presence is of maximum consideration regarding security. May it be an online start-up, an opening of a company website or an online database, the safety of your venture demands uttermost urgency. If the simple idea of online security isn 't enough to convince you in securing your company 's online existence, reckon the financial and reputational disasters that major companies have faced from security hacks in recent years.... [tags: Computer security, Information security, Internet]
1167 words (3.3 pages)
- There is a false sense of security experienced when someone is blissfully ignorant of certain details or lead to believe that they are indeed safe. For something that is practically essential to human life in an industrial nation, this false sense of security is a hidden danger. With so many people accessing a necessity and not realizing that this technology is insecure, there is an obvious problem. Unfortunately, a lot of people are nice and cozy with their ignorance of the issue. These people rely on the internet for various activities on a daily basis.... [tags: Internet Security]
1963 words (5.6 pages)
- Cyber Security as an International Security Threat National and International Security is a sum of the actions taken by countries and other organizations that can guarantee the safety and well being of their population. It is vital for a nation to pre-emptively discover what issues could affect their security, and take action to prevent any detrimental or harmful events from happening. With the development of technology and the transition into a more technologically savvy society, cyber security has become one of the most prevalent and important economic and national security issues that the United States will come to face.... [tags: cyber terrorists, cyberspace]
2186 words (6.2 pages)
- Wireless Technologies Wireless technology is widely used throughout different countries and governments, and is one of the most fast-growing and needed technologies on the market today. While in the past it has been looked at as something that is not needed, now is necessary. Most companies have main business functions that occur outside the main office, and taking a laptop computer into the field helps the need to complete services particular to that business. Globally, the wireless field is expanding and both people and business are beginning to heavily depend on its services all over the world.... [tags: Technology Communication Essays]
1312 words (3.7 pages)
- Wireless sensor networks are a rapidly growing area for research and commercial development in the field of science and technology. We practically live in a world filled with sensors. These networks have great long term economic potential, and an ability to transform our lives but they also pose many new system-building challenges. Most common example of WSN around us is the buildings that we work in. They have sensors monitoring the temperature, occupancy, smoke and fire, and security. Another example is present in our cars which contain dozens if not hundreds of sensors, monitoring the performance of the engine ,passenger safety equipment, and braking to name a few.... [tags: wireless, network aggragate]
1449 words (4.1 pages)
- Allen University was founded in 1870 in Columbia, SC. It is a private, Christian, liberal arts college. Allen University is accredited by the Southern Association of Colleges and Schools Commission and award baccalaureate degrees to completing students. Historically, Allen was the first university to be named after an African American and was founded with the purpose of educating newly freed slaves (Allen University). Named after the founder and first Bishop of the African Methodist Episcopal (AME) Church, the Richard Allen, the University's focus was mainly the education of ministers and teachers (Allen University).... [tags: Allen University, computer network, IT]
1301 words (3.7 pages)
- Ensuring Safety of Hotel Guests Hotels rely on their IT assets to assist them in performing their daily business activities. Networks connect hotels with centralized application services, corporate Intranets, e-mail systems, the Internet, business partners and other stakeholders. Wireless 802.11 b/g networks in hotel guestrooms are becoming ubiquitous. Data zips back and forth across the enterprise. How safe are these systems and networks. Are they secure from external threats. What about internal threats.... [tags: IT Management Hotelier]
1287 words (3.7 pages)
- Introduction Wireless networks have grown in popularity. This is largely due to the increase in the value of a network as more users are attached to it. The value added to a network by nature of connecting more devices to it, is summarized in 'Metcalf's law.' Metcalf's law states that if you 'connect any number, 'n,' of machines - whether computers, phones or even cars - and you get 'n' squared potential value.' The incredible growth of the Internet seems to validate Metcalf's law. It then seems reasonable that eliminating physical constraints to connecting to a network would provide value by allowing more devices to be connected to a network regardless of physical location.... [tags: Wireless Networks Technology Essays]
3584 words (10.2 pages)