The change in physical structures of computing facilities into small and portable devices, or even wearable computers, has enhanced ubiquitous information processing. The basic paradigm of such pervasive computing is the combination of strongly decentralized and distributed computing with the help of diversified devices allowing for spontaneous connectivity via the Internet. In general, pervasive computing strives to simplify day-to-day life by providing mobile users with the means to carry out personal and business tasks via mobile and portable devices. This chapter examines the security challenges that are barriers to mainstream pervasive computing and explains why traditional security mechanisms fail to meet the demands of these environments.
Security Challenges In Pervasive Computing Environment
Pervasive computing environment or PCE share most of the security issues of traditional networked applications. These include authentication of devices and users, privacy of data or information, defense against malicious code such as viruses, worms, Trojan horses etc, and access control mechanisms. However, the pervasive computing environment adds some unique issues to the already complex security arena. Physical security is important as the devices can be easily misplaced or stolen. Information that is usually confined behind a corporate firewall is now winging its way through the air, possibly spending some time on hosted servers or wireless gateways. The challenges of securing ubiquitous society environment are illustrated in Figure 1 (Chan et al., 2004)
Pervasive computing security challenges