140 likes | 528 Views
Towards Security and Privacy for Pervasive Computing. Author : Roy Campbell,Jalal Al-Muhtadi, Prasad Naldurg,Geetanjali Sampemane M. Dennis Mickunas.(2002) Presented by Shih Yu Chen. Pervasive Computing. Sensors. Processors. Computers.
E N D
Towards Security and Privacy for Pervasive Computing Author: Roy Campbell,Jalal Al-Muhtadi, Prasad Naldurg,Geetanjali Sampemane M. Dennis Mickunas.(2002) Presented by Shih Yu Chen
Pervasive Computing Sensors Processors Computers
Features of pervasive computing • Extending Computing Boundaries *Hardware and software → physical and virtual *Dull → interactive, dynamic, programmable • Invisibility *Computers → blend in the background *Computerize → boost productivity • Creating smart and sentient spaces *Embedded devices and sensors → sense
Features of pervasive computing • Context awareness *Capture the different context and situation information *Tailoring itself to meet their preferences • Mobility and adaptability *As mobile as its users *Be able to adapt itself to environments
Security Challenges • The Extended Computing Boundary *Information and physical security become interdependent *Traditional mechanisms become inadequate • Privacy Issues *Active sensors and computing capabilities↑→ threat↑ • User Interaction Issues *Richer user-interface *Cannot easily be prevented from seeing and hearing
Security Challenges • Security Policies *Flexible and convenient method for defining and managing security policies *Heterogeneous interfaces↑ → difficult to manage • Info Ops ( Information Operations ) *Actions taken that affect adversary information and information systems while defending one’s own information and information systems *Electronic information, digital communication
Suggest solutions • Authentication *Strike a balance between authentication strength and non-intrusiveness *Context decide how strong the authentication needs to be *Confidence values:0~1 *Employ multiple authentication → confidence value↑ *Access control decisions can now become more flexible by utilizing confidence information
Suggest solutions • Mist-Privacy Communication *Route packets using a hop-by-hop, handle-based routing protocol *Employ public key cryptography *Incoming handle ; outgoing handle Mist router Bob 789 4 2 910 910 192 192 515 3 789 1
Security Requirements • Transparency and unobtrusiveness • Multilevel • Context-Awareness • Flexibility and customizability • Interoperability • Extended boundaries
Conclusion • Pervasive computing brings new challenges to security and privacy , which cannot be addressed by mere adaptation of existing security and privacy mechanisms. • Unless security concerns are accommodated early in the design phase, pervasive computing environments will be rife with vulnerabilities.