Security for Ubiquitous Computing

Security for Ubiquitous Computing

Tobias Straub (Fraunhofer Institute for Secure Information Technology, Germany) and Andreas Heinemann (Technical University of Darmstadt, Germany)
DOI: 10.4018/978-1-59904-832-1.ch015
OnDemand PDF Download:


Taking typical ubiquitous computing settings as a starting point, this chapter motivates the need for security. The reader will learn what makes security challenging and what the risks predominant in ubiquitous computing are. The major part of this chapter is dedicated to the description of sample solutions in order to illustrate the wealth of protection mechanisms. A background in IT security is not required as this chapter is self-contained. A brief introduction to the subject is given as well as an overview of cryptographic tools.

Complete Chapter List

Search this Book:
Editorial Advisory Board
Table of Contents
Emile Aarts
Joachim Schaper
Chapter 1
Max Mühlhäuser, Iryna Gurevych
The present chapter is intended as a lightweight introduction to ubiquitous computing as a whole, in preparation for the more specific book parts... Sample PDF
Introduction to Ubiquitous Computing
Chapter 2
Tobias Limberger
In this chapter we will focus on distributed approaches to answer the scalability challenges in ubiquitous computing (UC) with so-called bio-analog... Sample PDF
Bionics: Learning fro "The Born"
Chapter 3
Alistair Barros
In the commercial world, the value of ubiquitous computing applications is proportional to the range of business services that can be accessed in... Sample PDF
Ubiquitous Services and Business Processes
Chapter 4
Daniel Oberle, Christof Bornhovd, Michael Altenhofen
This chapter discusses scalability problems and solutions to services-based ubiquitous computing applications in real time enterprises. The... Sample PDF
Ontologies for Scalable Services-Based Ubiquitous Computing
Chapter 5
Service Discovery  (pages 107-127)
Gerhard Austaller
The chapter “Ubiquitous Services and Business Processes” discussed the benefits for real time enterprises of service oriented architectures (SOA) in... Sample PDF
Service Discovery
Chapter 6
Jochen H. Schiller
This chapter introduces different wireless and mobile communication systems that represent an important technological basis for ubiquitous computing... Sample PDF
Wireless and Mobile Communications
Chapter 7
Erwin Aitenbichler
Ubiquitous Computing assumes that users and their computing devices are highly mobile. Because it is unlikely that mobile networks will be equally... Sample PDF
Event-Based and Publish/Subscribe Communication
Chapter 8
Peer-to-Peer Systems  (pages 172-189)
Jussi Kangasharju
Peer-to-peer systems have become extremely popular on the Internet in recent years. However, peerto- peer systems are not limited to Internet... Sample PDF
Peer-to-Peer Systems
Chapter 9
Opportunistic Networks  (pages 190-210)
Andreas Heinemann
This chapter introduces opportunistic networks. Such networks support spontaneous interaction between mobile users carrying mobile devices with... Sample PDF
Opportunistic Networks
Chapter 10
Zoltán Nochta
This chapter deals with the idea of how—as we call them—“smart items” can contribute to the overall vision of the real time enterprise by utilizing... Sample PDF
Smart Items in Real Time Enterprises
Chapter 11
Melanie Hartmann, Gerhard Austaller
To support users in performing their tasks, applications need a better understanding of the current situation they are being used in. This chapter... Sample PDF
Context Models and Context Awareness
Chapter 12
Erwin Aitenbichler
This chapter adds an in-depth description of location context, because location is the most prominent context property and the associated tracking... Sample PDF
A Focus on Location Context
Chapter 13
Adapting to the User  (pages 282-296)
Matthias Jöst
Adaptation is one of the key requirements to handle the increasing complexity in today’s computing environments. This chapter focuses on the aspect... Sample PDF
Adapting to the User
Chapter 14
Burkhard Stiller, David Hausheer, Jan Gerke, Peter Racz, Cristian Morariu, Martin Waldburger
Charging for IP-based communications determines the overall term for metering or monitoring, accounting, pricing, charge calculation, and billing.... Sample PDF
Accounting and Charging: Guarantees and Contracts
Chapter 15
Tobias Straub, Andreas Heinemann
Taking typical ubiquitous computing settings as a starting point, this chapter motivates the need for security. The reader will learn what makes... Sample PDF
Security for Ubiquitous Computing
Chapter 16
Trust and Accountability  (pages 363-389)
Sebastian Ries
Ubiquitous computing implies that literally any activity in everyday life can be assisted or accompanied by networked computers. Therefore, the... Sample PDF
Trust and Accountability
Chapter 17
Mobile Speech Recognition  (pages 397-420)
Dirk Schnelle
This chapter gives an overview of the main architectures for enabling speech recognition on embedded devices. Starting with a short overview of... Sample PDF
Mobile Speech Recognition
Chapter 18
Mouth and Ear Interaction  (pages 421-444)
Dirk Schnelle
This chapter gives an overview of the challenges that have to be mastered while working with audio. The vision of ubiquitous computing involves... Sample PDF
Mouth and Ear Interaction
Chapter 19
Michael Weber, Marc Hermann
This chapter gives an overview of the broad range of interaction techniques for use in ubiquitous computing. It gives a short introduction to the... Sample PDF
Advanced Hands and Eyes Interaction
Chapter 20
Rainer Malaka
Designing user interfaces for ubiquitous computing applications is a challenging task. In this chapter we discuss how to build intelligent... Sample PDF
Intelligent User Interfaces for Ubiquitous Computing
Chapter 21
Frankie James, Rama Gurram
This chapter introduces the concepts of multimodal and federated interaction. Because multimodality means, simply, the combination of multiple... Sample PDF
Multimodal and Federated Interaction
Chapter 22
Andreas Hartl
Ubiquitous computing with its multitude of devices certainly makes it necessary to supplant the desktop metaphor of graphical user interfaces by... Sample PDF
Multimodal Software Engineering
Chapter 23
Ambient Learning  (pages 530-549)
Fernando Lyardet
The vision where living and working spaces adapt to people is becoming a reality thanks to the increased embedding of computing power into everyday... Sample PDF
Ambient Learning
Chapter 24
Patrik Spieß, Jens Müller
This chapter describes example use cases for ubiquitous computing technology in a corporate environment that have been evaluated as prototypes under... Sample PDF
CoBIs: Collaborative Business Items
Chapter 25
Jürgen Anke, Bernhard Wolf, Gregor Hackenbroich, Hong-Hai Do, Mario Neugebauer, Anja Klein
Product lifecycle management (PLM) processes can be greatly improved and extended if more information on the product and its use is available during... Sample PDF
PROMISE: Product Lifecycle Management and Information Tracking Using Smart Embedded Systems
Chapter 26
Louenas Hamdi, Rama Gurram, Samir Raiyani
Real-time location applications are mainly desktop based and costly for development and maintenance. In this project we worked on a Web service... Sample PDF
Real-Time Location Tracking Mashup for Enterprise
Chapter 27
Volkmar Lotz, Luca Compagna, Konrad Wrona
The flexibility and dynamism of ubiquitous computing systems have a strong impact on the way their security can be achieved, reaching beyond... Sample PDF
Towards Adaptive Security for Ubiquitous Computing Systems: MOSQUITO and Serenity
Chapter 28
Samir Raiyani, Matthias Winkler
In this chapter, we present the Multimodal Warehouse Project, which aimed at applying multimodal interaction to a warehouse picking process. We... Sample PDF
Multimodal Warehouse Project
Chapter 29
Wolfgang Gerteis
The following short chapter discusses upcoming opportunities for using research results and developments provided by the grid computing community in... Sample PDF
Business Grids: Grid Computing for Business Applications
About the Contributors