Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Security in Ubiquitous Computing Environment: Vulnerabilities, Attacks and Defenses

  • Chapter
  • First Online:
Ubiquitous Computing and Computing Security of IoT

Part of the book series: Studies in Big Data ((SBD,volume 47))

Abstract

Ubiquitous computing is a computing paradigm, which enables computing to be appear everywhere using any device, in any location and any format. It includes resource constrained mobile and wearable devices, where computations are embedded in the environment (everyday artefacts). Those devices are connected to each other using infrastructure-based as well as mobile ad hoc networks. Due to the, resource constraints and limited internet connectivity the traditional security mechanisms such as Public Key Infrastructure (PKI) and Server centric authentication, are not used in ubiquitous computing. However, to enjoy the numerous benefits offered by this computing paradigm, we must address the security issues related to this computing. In this chapter, we discuss security issue such as location privacy, Authentication and device pairing and RFID. The major part of this chapter is intended to discuss the security challenges: Vulnerabilities, attacks and possible solutions in the Ubiquitous Computing environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Dragoni N, Massacci F, Walter T, Schaefer C (2009) What the heck is this application doing?—a security-by-contract architecture for pervasive services. Comput Secur 28(7):566–577

    Article  Google Scholar 

  2. Pietro RD, Mancini LV (2003) \Security and privacy issues of handheld and wearable wireless devices. ACM Commun 46(9):74–79

    Article  Google Scholar 

  3. Yau SS, Huang D, Gong H, Yao Y (2006) Support for situation awareness in trustworthy ubiquitous computing application software. J Softw Pract Eng 36(9):893–921

    Article  Google Scholar 

  4. Weiser Mark (1991) The Computer for the 21st century. Sci Am 265(3):66–75

    Article  Google Scholar 

  5. Weiser Mark (1994) The World is not a desktop. Interactions 1(1):7–8

    Article  Google Scholar 

  6. Kang YB, Pisan Y (2006) A survey of major challenges and future directions for next generation pervasive computing. In: Proceedings of the 21st international symposium on computer and information sciences, pp 755–764

    Chapter  Google Scholar 

  7. Poslad S (2009) Ubiquitous computing: smart devices, environments and interactions. Wiley-Blackwell

    Google Scholar 

  8. Varshney U, Vetter R (2002) Mobile commerce: framework, applications, and networking support. ACM/Kluwer Journal on Mobile Networks and Applications (MONET) 7(3):185–198

    Article  Google Scholar 

  9. Spreitzer M, Theimer M (1993) Providing location information in a ubiquitous computing environment. In: Proceedings of SIGOPS ’93, Dec 1993, pp 270–283

    Google Scholar 

  10. Garlan D, Siewiorek D, Smailagic A, Steenkiste P (2002) Project aura: towards distraction-free pervasive computing. IEEE Pervasive Comput 1:22–31

    Article  Google Scholar 

  11. Beresford A, Stajano F (2003) Location privacy in pervasive computing. IEEE Pervasive Comput 2(1):46–55

    Article  Google Scholar 

  12. Chaum DL (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM 24(2):84–88, http://doi.acm.org/10.1145/358549.358563

    Article  Google Scholar 

  13. Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal Cloaking. In: Proceedings of MobiSys 2003, the Usenix Association, San Francisco, CA, USA, pp 31–42

    Google Scholar 

  14. Jackson IW (1998) Who goes here? confidentiality of location through anonymity. PhD thesis, University of Cambridge

    Google Scholar 

  15. Danezis G, Lewis S, Anderson R (2005) How much is location privacy worth? In: Proceedings of Workshop on Economics of Information Security (WEIS), http://infosecon.net/workshop/pdf/locationprivacy.pdf

  16. Spreitzer M, Theimer M (1993) Providing location information in a ubiquitous computing environment. In: Proceedings of SIGOPS ’93, pp 270–283

    Google Scholar 

  17. Leonhardt U, Magee J (1998) Security considerations for a distributed location service. J Netw Syst Manage 6:51–70

    Article  Google Scholar 

  18. Rannenberg K, Pfitzmann A, Muller G (1999) Multilateral security in communications, chapter IT security and multilateral security, Addison-Wesley-Longman, pp 21–29

    Google Scholar 

  19. Finkenzeller K (2000) RFID handbook: radio-frequency identification fundamentals and applications. Wiley

    Google Scholar 

  20. Romer K, Domnitcheva S (2002) Smart playing cards: a ubiquitous computing game. Journal for Personal and Ubiquitous Computing (PUC) 6

    Google Scholar 

  21. Wieselthier JE, Ephremides A, Michaels LA (1989) An exact analysis and performance evaluation of framed aloha with capture. IEEE Trans Commun 37(2):125–137

    Article  Google Scholar 

  22. Sarma SE, Weis SA, Engels DW (2002) RFID systems and security and privacy implications. In: Workshop on Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, pp 454–470

    Chapter  Google Scholar 

  23. Roberti M (2005) Understanding the EPC Gen 2 Protocol. RFID journal special report, Mar 2005

    Google Scholar 

  24. EPCglobal Inc. (2005) EPCâ„¢ Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID, Jan 2005

    Google Scholar 

  25. Luo Z, Chan T, Li JS (2005) A lightweight mutual authentication protocol for RFID networks. In: IEEE international conference on e-business engineering, Oct 2005, pp 620–625

    Google Scholar 

  26. Garfinkel SL, Juels A, Pappu R (2005) RFID privacy: an overview of problems and proposed solutions. IEEE Secur Priv 3(3), pp 34–43, May–June 2005

    Article  Google Scholar 

  27. Needham RM, Schroeder MD (1978) Using encryption for authentication in large networks of computers. Commun ACM 21(12):993–999

    Article  Google Scholar 

  28. Norman DA (1998) The invisible computer: why good products can fail, the personal computer is so complex, and information appliances are the solution. MIT Press

    Google Scholar 

  29. Kohl J, Neuman C (1993) Thekerberos network authentication service (v5). RFC 1510, IETF, http://www.ietf.org/rfc/rfc1510.txt

  30. Stajano F, Anderson R (1999) The resurrecting duckling: Security issues in ad-hoc wireless networks. In: Christianson B, Crispo B, Malcolm JA, Roe M (eds) Proceedings of the 7th international workshop security protocols, Lecture Notes in Computer Science, vol 1796, Springer, pp 172–182

    Google Scholar 

  31. Stajano F (2002) Security for ubiquitous computing. Wiley, http://www.cl.cam.ac.uk/~fms27/secubicomp/

  32. Stajano F (2001) The resurrecting duckling—what next? In: Christianson B, Crispo B, Malcolm JA, Roe M (eds) Proceedings of the 7th international workshop security protocols, Lecture Notes in Computer Science, vol 2133, Springer-Verlag, pp 204–214

    Google Scholar 

  33. Anderson RJ, Kuhn MG (1996) Tamper resistance—a cautionary note. In: Proceedings of the second usenix workshop on electronic commerce, Usenix Association, Berkeley, pp 1–11

    Google Scholar 

  34. Sharif A, Khosravi M, Shah A (2013) Security attacks and solutions on ubiquitous computing networks. International Journal of Engineering and Innovative Technology (IJEIT) 3(4), Oct 2013, ISSN:2277–3754

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to C. Shoba Bindu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Shoba Bindu, C., Sasikala, C. (2019). Security in Ubiquitous Computing Environment: Vulnerabilities, Attacks and Defenses. In: Jeyanthi, N., Abraham, A., Mcheick, H. (eds) Ubiquitous Computing and Computing Security of IoT. Studies in Big Data, vol 47. Springer, Cham. https://doi.org/10.1007/978-3-030-01566-4_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-01566-4_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-01565-7

  • Online ISBN: 978-3-030-01566-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics