Document Type
Article
Language
eng
Format of Original
12 p.
Publication Date
11-2006
Publisher
Femto Technique Inc.
Source Publication
International Journal of Network Security
Source ISSN
1816-353X
Abstract
Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing, new and unique capabilities are available to aid mobile societies. The wireless nature of these devices has fostered a new era of mobility. Thousands of pervasive devices are able to arbitrarily join and leave a network, creating a nomadic environment known as a pervasive ad hoc network. However, mobile devices have vulnerabilities, and some are proving to be challenging. Security in pervasive computing is the most critical challenge. Security is needed to ensure exact and accurate confidentiality, integrity, authentication, and access control, to name a few. Security for mobile devices, though still in its infancy, has drawn the attention of various researchers. As pervasive devices become incorporated in our day-to-day lives, security will increasingly becoming a common concern for all users - - though for most it will be an afterthought, like many other computing functions. The usability and expansion of pervasive computing applications depends greatly on the security and reliability provided by the applications. At this critical juncture, security research is growing. This paper examines the recent trends and forward thinking investigation in several fields of security, along with a brief history of previous accomplishments in the corresponding areas. Some open issues have been discussed for further investigation.
Recommended Citation
Haque, Munirul and Ahamed, Sheikh Iqbal, "Security in Pervasive Computing: Current Status and Open Issues" (2006). Mathematics, Statistics and Computer Science Faculty Research and Publications. 390.
https://epublications.marquette.edu/mscs_fac/390
Comments
Published version. International Journal of Network Security, Vol. 3, No. 3 (November 2006): 203-214. Publisher link. © 2006 Femto Technique Inc. Used with permission.