Tailored security and safety for pervasive computing

2Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Pervasive computing makes high demands on security: devices are seriously resource-restricted, communication takes place spontaneously, and adversaries might control some of the devices. We claim that 1.) today's research, studying traditional security properties for pervasive computing, leads to inefficient, expensive, and unnecessary strong and unwanted security solutions. Instead, security solutions tailored to the demands of a user, the scenario, or the expected adversary are more promising. 2.) Today's research for security in pervasive computing makes naive, inefficient, and unrealistic assumptions regarding safety properties, in particular the quality of basic communication. Therefore, future security research has to consider safety characteristics and has to jointly investigate security and safety for efficient, tailored solutions. © IFIP International Federation for Information Processing 2009.

Cite

CITATION STYLE

APA

Blass, E. O., & Zitterbart, M. (2009). Tailored security and safety for pervasive computing. In IFIP Advances in Information and Communication Technology (Vol. 309, pp. 85–92). Springer New York LLC. https://doi.org/10.1007/978-3-642-05437-2_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free