Advertisement

Security Issues for Pervasive Personalized Communication Systems

  • Bertin Klein
  • Tristan Miller
  • Sandra Zilles
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3450)

Abstract

Technological progress allows us to equip any mobile phone with new functionalities, such as storing personalized information about its owner and using the corresponding personal profile for enabling communication to persons whose mobile phones represent similar profiles. However, this raises very specific security issues, in particular relating to the use of Bluetooth technology. Herein we consider such scenarios and related problems in privacy and security matters. We analyze in which respect certain design approaches may fail or succeed at solving these problems. We concentrate on methods for designing the user-related part of the communication service appropriately in order to enhance confidentiality.

Keywords

Mobile Phone Security Issue Pervasive Computing Security Matter Privacy Attack 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Brown, P., Burleson, W., Lamming, M., Rahlff, O.-W., Romano, G., Scholtz, J., Snowdon, D.: Context-awareness: some compelling applications. In: Proceedings of the 2nd International Symposium on Handheld and Ubiquitous Computing (2000)Google Scholar
  2. 2.
    Cybenko, G., Giani, A., Thompson, P.: Cognitive hacking: A battle for the mind. IEEE Computer 35(8), 50–56 (2002)Google Scholar
  3. 3.
    Ferscha, A., Hechinger, M., Mayrhofer, R., Rocha, M.d.S., Franz, M., Oberhauser, R.: Digital aura. In: Ferscha, A., Mattern, F. (eds.) PERVASIVE 2004. LNCS, vol. 3001. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  4. 4.
    Ferscha, A., Hechinger, M., Mayrhofer, R., Oberhauser, R.: A light-weight component model for peer-to-peer applications. In: Proceedings of the 24th International Conference on Distributed Computing Systems Workshops, pp. 520–527. IEEE Computer Society, Los Alamitos (2004)CrossRefGoogle Scholar
  5. 5.
    Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.): Security in Pervasive Computing (revised papers). LNCS, vol. 2802. Springer, Heidelberg (2004)zbMATHGoogle Scholar
  6. 6.
    Klein, B., Agne, S., Ebert, A., Bender, M.: Enabling flow: A paradigm for document-centered personal information spaces. In: Proceedings of the 8th IASTED International Conference on Artificial Intelligence and Soft Computing (2004)Google Scholar
  7. 7.
    Kvarnström, H., Hedbom, H., Jonsson, E.: Protecting security policies in ubiquitous environments using one-way functions. In: Hutter et al.[5], pp. 71–85Google Scholar
  8. 8.
    PAMPAS consortium and constituency. Deliverable D04: Final roadmap (extended version). Technical Report IST-201-37763, PAMPAS consortium (2004)Google Scholar
  9. 9.
    Robinson, P., Beigl, M.: Trust context spaces: An infrastructure for pervasive security in context-aware environments. In: Hutter et al.[5],pp. 157–172Google Scholar
  10. 10.
    Smith, I., LaMarca, A., Consolvo, S., Dourish, P.: A social approach to privacy in location-enhanced computing. In: Proceedings of the Workshop on Security and Privacy in Pervasive Computing (2004)Google Scholar
  11. 11.
    Weiser, M., Gold, R., Brown, J.S.: The origins of ubiquitous computing research at PARC in the late 1980s. IBM Systems Journal 38(4), 693–696 (1999)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Bertin Klein
    • 1
  • Tristan Miller
    • 1
  • Sandra Zilles
    • 1
  1. 1.DFKI GmbHKaiserslauternGermany

Personalised recommendations