Tailored security and safety for pervasive computing

Blass, Erik-Oliver;Zitterbart, Martina
INETSEC 2009, Open Research Problems in Network Security,
23-24 April 2009, Zurich, Switzerland | Also published in "IFIP Advances in Information and Communication Technology", Vol 309, 2009, ISSN: 1868-4238

Pervasive computing makes high demands on security: devices are seriously resource-restricted, communication takes place spontaneously, and adversaries might control some of the devices. We claim that 1.) today's research, studying traditional security properties for pervasive computing, leads to inefficient, expensive, and unnecessary strong and unwanted security solutions. Instead, security solutions tailored to the demands of a user, the scenario, or the expected adversary are more promising. 2.) Today's research for security in pervasive computing makes naive, inefficient, and unrealistic assumptions regarding safety properties, in particular the quality of basic communication. Therefore, future security research has to consider safety characteristics and has to jointly investigate security and safety for efficient, tailored solutions.


DOI
Type:
Conférence
City:
Zurich
Date:
2009-04-23
Department:
Sécurité numérique
Eurecom Ref:
2846
Copyright:
© Springer. Personal use of this material is permitted. The definitive version of this paper was published in INETSEC 2009, Open Research Problems in Network Security,
23-24 April 2009, Zurich, Switzerland | Also published in "IFIP Advances in Information and Communication Technology", Vol 309, 2009, ISSN: 1868-4238
and is available at : http://dx.doi.org/10.1007/978-3-642-05437-2_8

PERMALINK : https://www.eurecom.fr/publication/2846