IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Security in Pervasive Computing

Security in Pervasive Computing
View Sample PDF
Author(s): Sajal K. Das (University of Texas at Arlington, USA), Afrand Agah (University of Texas at Arlington, USA)and Mohan Kumar (University of Texas at Arlington, USA)
Copyright: 2005
Pages: 20
Source title: Wireless Information Highways
Source Author(s)/Editor(s): Dimitrios Katsaros (Aristotle University of Thessaloniki, Greece), Alexandros Nanopoulos (Aristotle University of Thessaloniki, Greece)and Yannis Manalopoulos (Aristotle University of Thessaloniki, Greece)
DOI: 10.4018/978-1-59140-568-9.ch015

Purchase

View Security in Pervasive Computing on the publisher's website for pricing and purchasing information.

Abstract

Security requirements for pervasive computing environments are different from those in fixed networks. This is due to the intensity and complexity of the communication between the user and the infrastructure, the mobility of the user, and dynamic sharing of limited resources. As pervasive computing makes information access and processing easily available for everyone from anywhere at anytime, the close relationship between distributed systems and mobile computing with a pervasive infrastructure leads us to take a closer look at different types of vulnerabilities and attacks in such environments. Pervasive computing includes numerous, often transparent, computing devices that are frequently mobile or embedded in the environment, and are connected to an increasingly ubiquitous network structure. For example, when an organization employs pervasive computing, the environment becomes more knowledgeable about the users’ behavior and, hence, becomes more proactive with each individual user as time passes. Therefore, the user must be able to trust the environment and the environment must be confident of the user’s identity. This implies security is an important concern in the success of pervasive computing environments. In this chapter we evaluate the suitability of existing security methods for pervasive environments.

Related Content

J. Mangaiyarkkarasi, J. Shanthalakshmi Revathy. © 2024. 34 pages.
Gummadi Surya Prakash, W. Chandra, Shilpa Mehta, Rupesh Kumar. © 2024. 22 pages.
Duygu Nazan Gençoğlan. © 2024. 35 pages.
Smrity Dwivedi. © 2024. 20 pages.
Pallavi Sapkale, Shilpa Mehta. © 2024. 21 pages.
Pardhu Thottempudi, Vijay Kumar. © 2024. 43 pages.
Sathish Kumar Danasegaran, Elizabeth Caroline Britto, S. Dhanasekaran, G. Rajalakshmi, S. Lalithakumari, A. Sivasangari, G. Sathish Kumar. © 2024. 18 pages.
Body Bottom