An Analysis Upon Various Security and Privacy In Wireless Sensor Networks: a Case Study of Pervasive Computing
Exploring Security and Privacy Challenges in Pervasive Computing Environments
Keywords:
security, privacy, wireless sensor networks, pervasive computing, mobility, networked processors, privacy management, trust, identity, mobile devices, confidentiality, integrity, authentication, access controlAbstract
Wirelesscommunication continues to make in-roads into many facets of our society andgradually becomes more and more ubiquitous. While, in the past, wirelesscommunication (as well as mobility) was largely limited to first and lasttransmission hops, today’s wireless networks are starting to offer purelywireless, often mobile, and even opportunistically connected operation. Thepurpose of this paper is to examine security and privacy issues in some new andemerging types of wireless networks and identify directions for futureresearch. Developments in pervasive computing introduced a new worldof computing where networked processors embedded and distributed in everydayobjects communicating with each other over wireless links. Computers in suchenvironments work in the background while establishing connections among themdynamically and hence will be less visible and intrusive. Such a vision raisesquestions about how to manage issues like privacy, trust and identity in thoseenvironments. In this paper, we review the technical challenges that face pervasivecomputing environments in relation to each of these issues. We then present anumber of security related considerations and use them as a basis forcomparison between pervasive and traditional computing. We will argue thatthese considerations pose particular concerns and challenges to the design andimplementation of pervasive environments which are different to those usuallyfound in traditional computing environments. To address these concerns andchallenges, further research is needed. We will present a number of directionsand topics for possible future research with respect to each of the threeissues. Million ofwireless device users are ever on the move, becoming more dependent on theirPDAs, smart phones, and other handheld devices. With the advancement ofpervasive computing, new and unique capabilities are available to aid mobilesocieties. The wireless nature of these devices has fostered a new era ofmobility. Thousands of pervasive devices are able to arbitrarily join and leavea network, creating a nomadic environment known as a pervasive ad hoc network.However, mobile devices have vulnerabilities, and some are proving to bechallenging. Security inpervasive computing is the most critical challenge. Security is needed toensure exact and accurate confidentiality, integrity, authentication, andaccess control, to name a few. Security for mobile devices, though still in itsinfancy, has drawn the attention of various researchers. As pervasivedevices become incorporated in our day-to-day lives, security will increasinglybecoming a common concern for all users - - though for most it will be anafterthought, like many other computing functions. The usability and expansionof pervasive computing applications depends greatly on the security and reliabilityprovided by the applications. At this critical juncture, security research isgrowing.Downloads
Download data is not yet available.
Published
2012-05-01
Issue
Section
Articles