Skip to main content

Security for Whom? The Shifting Security Assumptions of Pervasive Computing

  • Conference paper
  • First Online:
Book cover Software Security — Theories and Systems (ISSS 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2609))

Included in the following conference series:

Abstract

Pervasive computing will introduce hundreds of computing devices per user. This change is of such magnitude that it is qualitative as well as quantitative. Old solutions may not scale when the size of the problem grows by such a factor—passwords, for example, will no longer be a suitable user authentication method.

In this paper we examine new security issues for pervasive computing including authentication, biometrics and digital rights management. But the potential impact of pervasive computing on society is such that we have a responsibility to look further than just the technical issues.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mark Weiser. “The Computer for the Twenty-First Century”. Scientific American, 265(3):94–104, Sep 1991. http://www.ubiq.com/hypertext/weiser/SciAmDraft3.html.

    Article  Google Scholar 

  2. Frank Stajano. Security for Ubiquitous Computing. John Wiley and Sons, Feb 2002. ISBN 0-470-84493-0. http://www-lce.eng.cam.ac.uk/~fms27/secubicomp/.

  3. Ross Anderson, Frank Stajano and Jong-Hyeon Lee. “Security Policies”. In Marvin V. Zelkowitz (ed.), “(untitled)”, vol. 55 of Advances in Computers, pp. 185–235. Academic Press, 2001. ISBN 0-12-012155-7.

    Google Scholar 

  4. Ross Anderson and Markus Kuhn. “Tamper Resistance-A Cautionary Note”. In “Proc. 2nd USENIX Workshop on Electronic Commerce”, 1996. ISBN 1-880446-83-9. http://www.cl.cam.ac.uk/~mgk25/tamper.pdf.

  5. Oliver Kömmerling and Markus G. Kuhn. “Design Principles for Tamper-Resistant Smartcard Processors”. In “Proceedings of the USENIX Workshop on Smartcard Technology (Smartcard’ 99)”, pp. 9–20. USENIX Association, Chicago, IL, 10–11 May 1999. ISBN 1-880446-34-0. http://www.cl.cam.ac.uk/~mgk25/sc99-tamper.pdf.

  6. Michael Roe. Cryptography and Evidence. Ph.D. thesis, University of Cambridge, 1997. http://www.research.microsoft.com/users/mroe/THESIS.PDF.

  7. Ross Anderson. Security Engineering-A Guide to Building Dependable Distributed Systems. John Wiley & Sons, 2001. ISBN 0-471-38922-6.

    Google Scholar 

  8. Lisa Thalheim, Jan Krissler and Peter-Michael Ziegler. “Body Check: Biometric Access Protection Devices and their Programs Put to the Test”. c’t, 11:114.., 22 May 2002. http://www.heise.de/ct/english/02/11/114/. Originally in German, but translated into English at the URL provided.

  9. John Gilmore. “What’s Wrong With Copy Protection”, 16 Feb 2001. http://www.toad.com/gnu/whatswrong.html. Originally posted to the mailing list cryptography@c2.net on 2001-01-18 in response to an invitation by Ron Rivest.

  10. Ross Anderson. “dTCPA / Palladium Frequently Asked Questions, Version 1.0”, Jul 2002. http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html.

  11. Richard Stallman. “Can you trust your computer?”, 21 Oct 2002. http://newsforge.com/newsforge/02/10/21/1449250.shtml?tid=19. Also archived at http://www.gnu.org/philosophy/can-you-trust.html.

  12. Philip R. Zimmermann. “Testimony of Philip R. Zimmermann to the Subcommittee on Science, Technology, and Space of the US Senate Committee on Commerce, Science, and Transportation”, 26 Jun 1996. http://www.cdt.org/crypto/current legis/960626 Zimm test.html.

  13. Roy Want, Andy Hopper, Veronica Falcão and Jonathan Gibbons. “The Active Badge Location System”. ACM Transactions on Information Systems, 10(1):91–102, Jan 1992. ftp://ftp.uk.research.att.com/pub/docs/att/tr.92.1.pdf. Also available as AT&T Laboratories Cambridge Technical Report 92.1.

    Article  Google Scholar 

  14. Andy Ward, Alan Jones and Andy Hopper. “A New Location Technique for the Active Office”. IEEE Personal Communications, 4(5):42–47, Oct 1997. ftp://ftp.uk.research.att.com/pub/docs/att/tr.97.10.pdf. Also available as AT&T Laboratories Cambridge Technical Report 97.10.

  15. Alastair Beresford and Frank Stajano. “Location Privacy in Pervasive Computing”, 2003. Accepted by IEEE Pervasive Computing. To appear.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Stajano, F. (2003). Security for Whom? The Shifting Security Assumptions of Pervasive Computing. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds) Software Security — Theories and Systems. ISSS 2002. Lecture Notes in Computer Science, vol 2609. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36532-X_2

Download citation

  • DOI: https://doi.org/10.1007/3-540-36532-X_2

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00708-1

  • Online ISBN: 978-3-540-36532-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics