Tailored Security and Safety for Pervasive Computing

  • Erik-Oliver Blass
  • Martina Zitterbart
Conference paper
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 309)


Pervasive computing makes high demands on security: devices are seriously resource-restricted, communication takes place spontaneously, and adversaries might control some of the devices. We claim that 1.) today’s research, studying traditional security properties for pervasive computing, leads to inefficient, expensive, and unnecessary strong and unwanted security solutions. Instead, security solutions tailored to the demands of a user, the scenario, or the expected adversary are more promising. 2.) Today’s research for security in pervasive computing makes naive, inefficient, and unrealistic assumptions regarding safety properties, in particular the quality of basic communication. Therefore, future security research has to consider safety characteristics and has to jointly investigate security and safety for efficient, tailored solutions.


Wireless Sensor Network Network Lifetime Security Level Security Property Pervasive Computing 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Benenson, Z., Cholewinski, P.M., Freiling, F.C.: Vulnerabilities and Attacks in Wireless Sensor Networks. In: Wireless Sensor Network Security, vol. 1, pp. 22–43. IOS Press, Amsterdam (2008)Google Scholar
  2. 2.
    Blass, E.O., Tiede, L., Zitterbart, M.: An energy-efficient and reliable mechanism for data transport in wireless sensor networks. In: Proceedings of Third International Conference on Networked Sensing Systems, Chiacgo, USA, pp. 211–216 (2006) ISBN 0974361135Google Scholar
  3. 3.
    Blass, E.O., Wilke, J., Zitterbart, M.: Relaxed authenticity for data aggregation in wireless sensor networks. In: Proceedings of Fourth International Conference on Security and Privacy in Communication Networks, Istanbul, Turkey, pp. 1–10 (2008) ISBN 9781605582412Google Scholar
  4. 4.
    Chandramouli, R., Bapatla, S., Subbalakshmi, K., Uma, R.: Battery power-aware encryption. ACM Transactions on Information and System Security 9(2), 162–180 (2006)CrossRefGoogle Scholar
  5. 5.
    Dolev, D., Yao, A.: On the security of public key protocols. IEEE Transactions on Information Theory 29(2), 198–208 (1983)MathSciNetCrossRefGoogle Scholar
  6. 6.
    Irvine, C., Levin, T.: Toward a taxonomy and costing method for security services. In: Proceedings of Annual Computer Security Applications Conference, pp. 183–188 (1999) ISBN 0-7695-0346-2Google Scholar
  7. 7.
    Irvine, C., Levin, T.: Quality of security service. In: Proceedings of New Security Paradigms Workshop, Ballycotton, Ireland, pp. 91–99 (2001) ISBN 1-58113-260-3Google Scholar
  8. 8.
    Juels, A., Weis, S.: Defining strong privacy for rfid. In: Proceedings of PerCom Workshops, White Plains, USA, pp. 342–347 (2007) ISBN 9-780-769-527-888Google Scholar
  9. 9.
    Lindskog, S., Brunstrom, A.: Design and implementation of a tunable encryption service for networked applications. In: Proceedings of 1st workshop on Security and Privacy for Emerging Areas in Communication Networks, pp. 258–266 (2005) ISBN 0-7803-9468-2Google Scholar
  10. 10.
    Lindskog, S., Faigl, Z., Brunstrom, A.: A conceptual model for analysis and design of tunable security services. Journal of Networks 3(5), 1–12 (2008)CrossRefGoogle Scholar
  11. 11.
    Turau, V., Renner, C., Venzke, M., Waschik, S., Weyer, C., Witt, M.: The heathland experiment: Results and experiences. In: REALWSN: Real World Wireless Sensor Networks (2005)Google Scholar
  12. 12.
    Wilke, J., Blass, E.O., Freiling, F.C., Zitterbart, M.: A framework for probabilistic, authentic aggregation in wireless sensor networks. PIK – Praxis der Informationsverarbeitung und Kommunikation 32(2) (to appear, 2009) ISSN 0930-5157Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2009

Authors and Affiliations

  • Erik-Oliver Blass
    • 1
  • Martina Zitterbart
    • 2
  1. 1.EURECOMSophia AntipolisFrance
  2. 2.Institut für TelematikUniversität Karlsruhe (TH)Germany

Personalised recommendations