Security in Pervasive Computing 421
Copyright © 2005, Idea Group Inc. Copying or distributing in print or electronic forms without written
permission of Idea Group Inc. is prohibited.
Chapter XV
Security in
Pervasive Computing
Sajal K. Das, University of Texas at Arlington, USA
Afrand Agah, University of Texas at Arlington, USA
Mohan Kumar, University of Texas at Arlington, USA
Abstract
Security requirements for pervasive computing environments are different from those
in fixed networks. This is due to the intensity and complexity of the communication
between the user and the infrastructure, the mobility of the user, and dynamic sharing
of limited resources. As pervasive computing makes information access and processing
easily available for everyone from anywhere at anytime, the close relationship between
distributed systems and mobile computing with a pervasive infrastructure leads us to
take a closer look at different types of vulnerabilities and attacks in such environments.
Pervasive computing includes numerous, often transparent, computing devices that
are frequently mobile or embedded in the environment, and are connected to an
increasingly ubiquitous network structure. For example, when an organization employs
pervasive computing, the environment becomes more knowledgeable about the users’
behavior and, hence, becomes more proactive with each individual user as time passes.
Therefore, the user must be able to trust the environment and the environment must be
confident of the user’s identity. This implies security is an important concern in the
success of pervasive computing environments. In this chapter we evaluate the suitability
of existing security methods for pervasive environments.
701 E. Chocolate Avenue, Suite 200, Hershey PA 17033-1240, USA
Tel: 717/533-8845; Fax 717/533-8661; URL-http://www.irm-press.com
16*%
IRM PRESS
This chapter appears in the book, Wireless Information Highways, edited by Dimitrios Katsaros, Alexandros
Nanopoulos and Yannis Manalopoulos. Copyright © 2005, IRM Press, an imprint of Idea Group Inc. Copying
or distributing in print or electronic forms without written permission of Idea Group Inc. is prohibited.