CFP last date
20 May 2024
Reseach Article

Novel Security Model for Pervasive Systems

by S. Geetha, G. Zayaraz, J. Madhusudanan, V. Prasanna Venkatesan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 63 - Number 2
Year of Publication: 2013
Authors: S. Geetha, G. Zayaraz, J. Madhusudanan, V. Prasanna Venkatesan
10.5120/10441-5127

S. Geetha, G. Zayaraz, J. Madhusudanan, V. Prasanna Venkatesan . Novel Security Model for Pervasive Systems. International Journal of Computer Applications. 63, 2 ( February 2013), 37-43. DOI=10.5120/10441-5127

@article{ 10.5120/10441-5127,
author = { S. Geetha, G. Zayaraz, J. Madhusudanan, V. Prasanna Venkatesan },
title = { Novel Security Model for Pervasive Systems },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 63 },
number = { 2 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 37-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume63/number2/10441-5127/ },
doi = { 10.5120/10441-5127 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:13:08.946436+05:30
%A S. Geetha
%A G. Zayaraz
%A J. Madhusudanan
%A V. Prasanna Venkatesan
%T Novel Security Model for Pervasive Systems
%J International Journal of Computer Applications
%@ 0975-8887
%V 63
%N 2
%P 37-43
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

As portable devices have become a part of our everyday life, more people are unknowingly participating in a pervasive computing environment. People might engage in many computational devices simultaneously without even the awareness of their existence. The idea of pervasive computing is that almost every device we see today will be capable of communication and function in collaboration with one another in the near future. Due to lack of a fixed infrastructure for authentication and authorization, devices in pervasive computing are more susceptible to malicious snoopers. In this paper, we cover different pervasive computing-based projects that have adopted pervasive middleware as an integral part of the security enforcement in their projects. We then move on to identify security requirements especially inherent to pervasive computing which makes it a smart security system. Finally, a security model for pervasive system is proposed that compose the required pervasive security functions to be smart.

References
  1. Al-Jaroodi, J. , N. Mohamed, and J. Aziz, "Service Oriented Middleware: Trends and Challenges," in proc. 7th International Conference on Information Technology: New Generations (ITNG), IEEE CPS, Las Vegas, USA, April 2010.
  2. Sheng-Tzong Cheng, Chi-Hsuan Wang : "An Adaptive Scenario-Based Reasoning System Across Smart Houses", Journal Wireless Personal Communications, Volume 64, December 2010.
  3. Jiehan Zhou, et al. " Context-aware pervasive service composition and its implementation", Journal Personal and Ubiquitous Computing, Volume 15, 2011.
  4. Toma´s Sa´nchez Lo´pez, Damith C. Ranasinghe, Mark Harrison, Duncan McFarlane: "Adding sense to the Internet of Things-An architecture framework for Smart Object systems", Journal Personal and Ubiquitous Computing, Volume 16, 2012.
  5. Montanari. R, Tibaldi. D, Toninelli. A : "A Context-Centric Security Middleware for Service Provisioning in Pervasive Computing", Applications and the Internet, 2005 Proceedings, IEEE Conference, pages 421-429.
  6. Achilleas Achilleos, Kun Yang, Nektarios Georgalas: "Context Modelling and a Context-aware Framework for Pervasive Service Creation: A model-driven approach", Journal on Pervasive and Mobile Computing, Volume 6, April 2010, pages 281-296,ScienceDirect.
  7. Daniele Miorandi, et al. "Internet of Things: Vision, applications and research challenges", Journal on Ad Hoc Networks, Volume 10, Issue 7, September 2012, pages 1497-1516.
  8. Patroklos G. argyroudis, Donal O' Mahony: "Towards a context-aware framework for pervasive computing authorization management", Proceedings of 3rd UK-UbiNet Workshop: Designing, Evaluating and Using Ubiquitous Computing Systems, Bath, UK, February 2005.
  9. Petteri Alahuhta, et al. "SWAMI- Dark scenarios in ambient intelligence: Highlighting risks and vulnerabilities ", Information Society Technologies, Sixth frame work Programme, January 2010.
  10. Lalana Kagal,et al. : " Vigil : Providing Trust for Enhanced Security in Pervasive Systems ", IBM EECOMS program, the DARPA DAML program under contract F30602-97-1-0215,and by NSF through awards CCR0070802, IIS9875433.
  11. Yuxin Chen, Bo Luo: " S2A: Secure Smart Household Appliances ", CODASPY'12, San Antonio, Texas, USA, ACM 978-1-4503-1091-02/2012.
  12. Anand Ranganathan, et al. "A Middleware for Context-Aware agents in Ubiquitous Computing Environments". GAIA Project 2003. http://choices. cs. uiuc. edu/gaia/ papers/
  13. Susana Alcalde Bagues, Andreas Zeidler: "Sentry@Home-Leveraging the smart home for privacy in pervasive computing", International Journal of smart home, Volume 1, July 2007.
  14. Karl Krukow, Mogens Nielsen and Vladimiro Sassone: "Trust Models in Ubiquitous Computing", Philosophical transactions of the Royal Society A, Volume 366, pages 3781-3793, August 2008.
  15. Anas El Husseini, et al. "Trust-based authentication scheme with user rating for low-resource devices in smart environments": Journal of Personal ubiquitous Computing, Volume 8, Springer Publications.
  16. Max Landman: "Managing Smart Phone Security Risks ", InfoSecCD'10, 2010, Kennesaw, GA, USA, ACM 978-1-60558-661-8/10/2010.
  17. Wei-Wei Ni er, Jin-Wang Zheng, and Zhi-Hong Chong: "HilAnchor: Location Privacy Protection in the Presence of Users' Preferences", JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, volume 27, pages 413-427, March 2012.
  18. Akihiro Eguchi, et al. "Everything is alive: Towards the future wisdom web of things",Journal of World wide web, Volume 4 , 2012.
  19. E Toch "Personalization and privacy: A survey of pervasive risks and remedies in personalization based systems", Journal of User Model User - Adaptive Internet, volume 22, pages 203-220, 2012
  20. Lalana Kagal, Jeffrey Undercoffer, Filip Perich, Anupam Joshi, Tim Finin:"A security architecture based on trust management for pervasive computing systems", project supported by NSF Awards IIS and the Defense Advanced Research Projects Agency.
  21. Intae Kim, Daesung Lee, Kuinam J. Kim , Junghyun Lee: "Flexible authorization in home network environments", Journal Cluster Computing, Volume 15 Issue 1, March 2012.
  22. Petros Belimpasakis, Vlad Stirbu: "A survey of techniques for remote access to home networks and resources ", Journal on Multimedia Tools and Applications, Springer, September 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Pervasive computing Pervasive security Smart security. Security issues Pervasive security architecture