scholarly journals The Resurrecting Duckling: security issues for ubiquitous computing

Computer ◽  
2002 ◽  
Vol 35 (4) ◽  
pp. supl22-supl26 ◽  
Author(s):  
F. Stajano ◽  
R. Anderson
2018 ◽  
Vol 7 (1.7) ◽  
pp. 15
Author(s):  
R H Aswathy ◽  
N Malarvizhi

A dramatic change by the growth of new ubiquitous computing, our globe is moving towards the fully connected paradigm called Internet of Things (IoT). The world is being connected and interlinked with the exponential growth of this pervasive technology. It plays a significant role in many fields such as healthcare, manufacturing industry, agriculture, transportation, smart homes etc and reinforces our everyday life. It acts as an aegis for covering all the factors such as protocols, key elements, technologies etc. IoT includes many capabilities and numerous mechanisms but protection hassle that slow down the era. In this paper we discussed about essential protocols and security issues of IoT.


2014 ◽  
Vol 2014 ◽  
pp. 1-9 ◽  
Author(s):  
Jae Dong Lee ◽  
Young-Sik Jeong ◽  
Jong Hyuk Park

In recent years, ubiquitous computing has been rapidly emerged in our lives and extensive studies have been conducted in a variety of areas related to smart devices, such as tablets, smartphones, smart TVs, smart refrigerators, and smart media devices, as a measure for realizing the ubiquitous computing. In particular, smartphones have significantly evolved from the traditional feature phones. Increasingly higher-end smartphone models that can perform a range of functions are now available. Smart devices have become widely popular since they provide high efficiency and great convenience for not only private daily activities but also business endeavors. Rapid advancements have been achieved in smart device technologies to improve the end users’ convenience. Consequently, many people increasingly rely on smart devices to store their valuable and important data. With this increasing dependence, an important aspect that must be addressed is security issues. Leaking of private information or sensitive business data due to loss or theft of smart devices could result in exorbitant damage. To mitigate these security threats, basic embedded locking features are provided in smart devices. However, these locking features are vulnerable. In this paper, an original security-locking scheme using a rhythm-based locking system (RLS) is proposed to overcome the existing security problems of smart devices. RLS is a user-authenticated system that addresses vulnerability issues in the existing locking features and provides secure confidentiality in addition to convenience.


Author(s):  
Priti Sharma ◽  
Nidhi Goel

Ubiquitous computing is a concept where computing is made to appear everywhere using any device, in an in any location and in any format. In this paper we have discussed the properties and applications of Ubiquitous Computing. We have also discussed some of the security challenges for Ubiquitous Computing and various security attacks on Ubiquitous Computing Networks.


Sign in / Sign up

Export Citation Format

Share Document