Security Issues in Ubiquitous Computing

نویسنده

  • Frank Stajano
چکیده

The manifesto of ubiquitous computing is traditionally considered to be the justly famous 1991 visionary article written for Scientific American by the late Mark Weiser of Xerox PARC (Weiser, 1991). But the true birth date of this revolution, perhaps hard to pinpoint precisely, precedes that publication by at least a few years: Weiser himself first spoke of “ubiquitous computing” around 1988 and other researchers around the world had also been focusing their efforts in that direction during the late Eighties. Indeed, one of the images in Weiser’s article depicts an Active Badge, an infrared-emitting tag worn by research scientists to locate their colleagues when they were not in their office (in the days before mobile phones were commonplace) and to enable audio and video phone call rerouting and other follow-me applications. That device was initially developed by Roy Want and Andy Hopper (Want, Hopper, Falcao, and Gibbons, 1992) at Olivetti Research Limited (ORL) in 1989. Soon afterwards other research institutions, including Xerox PARC themselves who later hired Want, acquired Active Badge installations and started to explore the wide horizons opened by the novel idea of letting your spatial position be an input that implicitly told the computer system what to do. I was fortunate enough to work at ORL as a research scientist throughout the Nineties, thereby acquiring first hand experience of these and other pioneering developments in ubiquitous computing2. Looking back and putting things into historical perspective, ubiquitous computing really was a revolution, one of these major events in computing that take place once

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

Security Issues in Ubiquitous Computing: A Literature Review

Ubiquitous computing is a concept where computing is made to appear everywhere using any device, in an in any location and in any format. In this paper we have discussed the properties and applications of Ubiquitous Computing. We have also discussed some of the security challenges for Ubiquitous Computing and various security attacks on Ubiquitous Computing Networks. Keywords— Ubiquitous, Senso...

متن کامل

Network Access and Security Issues in Ubiquitous Computing

Here are several topics that we would like to discuss and explore at the workshop. These are wireless and mobile infrastructure, security, applications and services, and mobile payments. Due to our current expertise and interest, we would like to focus on infrastructure and security issues and how problems of access, coverage, roaming, end-to-end security, reliability, location management and m...

متن کامل

Secure zero configuration in a ubiquitous computing environment

In this paper, we discuss the need for secure zero configuration in a ubiquitous environment. Security issues in ubiquitous environment are identified, and future research directions are outlined.

متن کامل

German language title goes here Mobile security and trusted computing

Some of the most significant security issues arising in the context of ubiquitous mobile computing are reviewed. Emerging technologies which may be able to help overcome these security problems are also described; in particular we consider methods for secure 'imprinting' of mobile devices, techniques proposed for establishing trust between devices with no prior relationship, and finally the rel...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010