Abstract
Ubiquitous computing is a computing paradigm, which enables computing to be appear everywhere using any device, in any location and any format. It includes resource constrained mobile and wearable devices, where computations are embedded in the environment (everyday artefacts). Those devices are connected to each other using infrastructure-based as well as mobile ad hoc networks. Due to the, resource constraints and limited internet connectivity the traditional security mechanisms such as Public Key Infrastructure (PKI) and Server centric authentication, are not used in ubiquitous computing. However, to enjoy the numerous benefits offered by this computing paradigm, we must address the security issues related to this computing. In this chapter, we discuss security issue such as location privacy, Authentication and device pairing and RFID. The major part of this chapter is intended to discuss the security challenges: Vulnerabilities, attacks and possible solutions in the Ubiquitous Computing environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Dragoni N, Massacci F, Walter T, Schaefer C (2009) What the heck is this application doing?—a security-by-contract architecture for pervasive services. Comput Secur 28(7):566–577
Pietro RD, Mancini LV (2003) \Security and privacy issues of handheld and wearable wireless devices. ACM Commun 46(9):74–79
Yau SS, Huang D, Gong H, Yao Y (2006) Support for situation awareness in trustworthy ubiquitous computing application software. J Softw Pract Eng 36(9):893–921
Weiser Mark (1991) The Computer for the 21st century. Sci Am 265(3):66–75
Weiser Mark (1994) The World is not a desktop. Interactions 1(1):7–8
Kang YB, Pisan Y (2006) A survey of major challenges and future directions for next generation pervasive computing. In: Proceedings of the 21st international symposium on computer and information sciences, pp 755–764
Poslad S (2009) Ubiquitous computing: smart devices, environments and interactions. Wiley-Blackwell
Varshney U, Vetter R (2002) Mobile commerce: framework, applications, and networking support. ACM/Kluwer Journal on Mobile Networks and Applications (MONET) 7(3):185–198
Spreitzer M, Theimer M (1993) Providing location information in a ubiquitous computing environment. In: Proceedings of SIGOPS ’93, Dec 1993, pp 270–283
Garlan D, Siewiorek D, Smailagic A, Steenkiste P (2002) Project aura: towards distraction-free pervasive computing. IEEE Pervasive Comput 1:22–31
Beresford A, Stajano F (2003) Location privacy in pervasive computing. IEEE Pervasive Comput 2(1):46–55
Chaum DL (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM 24(2):84–88, http://doi.acm.org/10.1145/358549.358563
Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal Cloaking. In: Proceedings of MobiSys 2003, the Usenix Association, San Francisco, CA, USA, pp 31–42
Jackson IW (1998) Who goes here? confidentiality of location through anonymity. PhD thesis, University of Cambridge
Danezis G, Lewis S, Anderson R (2005) How much is location privacy worth? In: Proceedings of Workshop on Economics of Information Security (WEIS), http://infosecon.net/workshop/pdf/locationprivacy.pdf
Spreitzer M, Theimer M (1993) Providing location information in a ubiquitous computing environment. In: Proceedings of SIGOPS ’93, pp 270–283
Leonhardt U, Magee J (1998) Security considerations for a distributed location service. J Netw Syst Manage 6:51–70
Rannenberg K, Pfitzmann A, Muller G (1999) Multilateral security in communications, chapter IT security and multilateral security, Addison-Wesley-Longman, pp 21–29
Finkenzeller K (2000) RFID handbook: radio-frequency identification fundamentals and applications. Wiley
Romer K, Domnitcheva S (2002) Smart playing cards: a ubiquitous computing game. Journal for Personal and Ubiquitous Computing (PUC) 6
Wieselthier JE, Ephremides A, Michaels LA (1989) An exact analysis and performance evaluation of framed aloha with capture. IEEE Trans Commun 37(2):125–137
Sarma SE, Weis SA, Engels DW (2002) RFID systems and security and privacy implications. In: Workshop on Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, pp 454–470
Roberti M (2005) Understanding the EPC Gen 2 Protocol. RFID journal special report, Mar 2005
EPCglobal Inc. (2005) EPCâ„¢ Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID, Jan 2005
Luo Z, Chan T, Li JS (2005) A lightweight mutual authentication protocol for RFID networks. In: IEEE international conference on e-business engineering, Oct 2005, pp 620–625
Garfinkel SL, Juels A, Pappu R (2005) RFID privacy: an overview of problems and proposed solutions. IEEE Secur Priv 3(3), pp 34–43, May–June 2005
Needham RM, Schroeder MD (1978) Using encryption for authentication in large networks of computers. Commun ACM 21(12):993–999
Norman DA (1998) The invisible computer: why good products can fail, the personal computer is so complex, and information appliances are the solution. MIT Press
Kohl J, Neuman C (1993) Thekerberos network authentication service (v5). RFC 1510, IETF, http://www.ietf.org/rfc/rfc1510.txt
Stajano F, Anderson R (1999) The resurrecting duckling: Security issues in ad-hoc wireless networks. In: Christianson B, Crispo B, Malcolm JA, Roe M (eds) Proceedings of the 7th international workshop security protocols, Lecture Notes in Computer Science, vol 1796, Springer, pp 172–182
Stajano F (2002) Security for ubiquitous computing. Wiley, http://www.cl.cam.ac.uk/~fms27/secubicomp/
Stajano F (2001) The resurrecting duckling—what next? In: Christianson B, Crispo B, Malcolm JA, Roe M (eds) Proceedings of the 7th international workshop security protocols, Lecture Notes in Computer Science, vol 2133, Springer-Verlag, pp 204–214
Anderson RJ, Kuhn MG (1996) Tamper resistance—a cautionary note. In: Proceedings of the second usenix workshop on electronic commerce, Usenix Association, Berkeley, pp 1–11
Sharif A, Khosravi M, Shah A (2013) Security attacks and solutions on ubiquitous computing networks. International Journal of Engineering and Innovative Technology (IJEIT) 3(4), Oct 2013, ISSN:2277–3754
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Shoba Bindu, C., Sasikala, C. (2019). Security in Ubiquitous Computing Environment: Vulnerabilities, Attacks and Defenses. In: Jeyanthi, N., Abraham, A., Mcheick, H. (eds) Ubiquitous Computing and Computing Security of IoT. Studies in Big Data, vol 47. Springer, Cham. https://doi.org/10.1007/978-3-030-01566-4_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-01566-4_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-01565-7
Online ISBN: 978-3-030-01566-4
eBook Packages: EngineeringEngineering (R0)