A Research Upon Various Issues and Challenges of Securing Pervasive Computing Applications
Exploring Security Challenges in Pervasive Computing Applications
Keywords:
pervasive computing, characteristics, architecture, issues, challenges, middleware support, real-time applications, military, financial, health care, security, entities, organizational boundaries, contextual information, security breaches, access control policiesAbstract
Thispaper describes about the recent research topic pervasive computing which focuson the characteristics, architecture, issues and challenges. The pervasivearchitecture relates how the end-user interacts with the pervasive networkusing the middleware support. Finally it describes about the future focus forthe pervasive computing through the real time applications. Pervasive computing technology has the potential tobenefit applications in the military, financial, and health care domain.Although pervasive computing technology looks promising, one critical challengeneeds to be addressed before it can be widely deployed – security. The problemis serious because pervasive computing applications involve interactionsbetween a large number of entities that can span different organizationalboundaries. Unlike traditional applications, these applications do not usuallyhave well-defined security perimeters and are dynamic in nature. Moreover,these applications use knowledge of surrounding physical spaces. This requiressecurity policies to use contextual information that, in turn, must beadequately protected from security breaches. Uncontrolled disclosure ofinformation or unconstrained interactions among entities can lead to veryserious consequences. Traditional access control policies and mechanisms rarelyaddress these issues and are thus inadequate for securing pervasive computingapplications.Downloads
Download data is not yet available.
Published
2011-08-01
Issue
Section
Articles