SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
ISSN: 2277-3754
ISO 9001:2008 Certified
International Journal of Engineering and Innovative Technology (IJEIT)
Volume 3, Issue 4, October 2013
40
Abstract— Ubiquitous computing evolved tremendously and
became an integral part of many fields and application domains.
It not only causes maximized availability for users with wired or
wireless networks but also supports any information technology
equipment such as cell phones, PDAs, car navigation terminals
and consumer information appliances as well as desktop
computers and mobile PCs. This new computing paradigm also
brings along modern and unique security challenges regarding
vulnerabilities and appropriate solutions. Possible solutions for
threats of ubiquitous environment to address these security issues
are highlighted.
Index Terms— Ubiquitous, Network, Security, Mobile,
Solution
I. INTRODUCTION
In conventional computing environments, users actively
prefer to interact with computers. Ubiquitous computing
applications are feasible to be different, they will be
embedded in the users physical environment and integrate
smoothly with their everyday tasks. This new technology,
involving elimination of time and position barriers are
extremely inexpensive products that provide availability for
users anytime and anywhere. The users are encircled with an
easy and reliable information vicinity merging physical and
computational basis into an integrated manner. Various
human abilities in daily tasks, medicine, business,
entertainment and education are enhanced to perform by this
scenario using cellular phones, Personal Digital Assistants
(PDAs) and other built in intelligent appliances related to
different tools. Ubiquitous environment guarantees the
accessibility of users to the Internet in multiple places with a
variety of connection media and aware adoptability of service
to the user status [1,9]. This facility is due to context implying
computing context, user context, physical context, temporal
context and context history. In other hands, this type of
computing is broader than mobile computing considering that
it interests not just mobility of computers but, more
significant, mobility of the people. Context-aware computing
instruments and implementations acknowledge to alterations
in the environment in an intelligent manner to improve the
computing environment for the user noticing the mobility of
user and its context and requirement of context-aware
behavior in mobile environment. The context includes:
 Who (social): Identification of people near the user
 What (functional): Tasks the user is running
 Where (location): The geographical position of user
 When (temporal): Temporal context defined
 Why (motivating): The reason of running task
The realization of ubiquitous computing desires obtaining
seamless service provisioning for users and devices
everywhere. Users in ubiquitous computing environment can
access to variety of networks with high probability, reliability
and availability whereas the security risk will increase as well.
Some of ubiquitous applications are:
 Smart tool box: They are instruments with RFID tags;
they have built-in antenna integrated with the box. Time
usage and frequencies are used to inform suitable
reconfiguration or status.
 Smart supply chain: With applying ubiquitous
computing error level on companies can be reduced and
tasks can be performed quickly.
 Context-aware application: They support to mobility,
physiology of users. Data is gathered by sensors then it
will be analyzed as well as a suitable decision will be
made to satisfy the purpose.
 Ubiquitous healthcare: Management of chronic
diseases via technology based ubiquitous patient
monitoring services has been widely proposed as a viable
option for economizing healthcare resources, and
providing efficient, quality healthcare. They can monitor
health status and perform appropriate designs.
 Smart home: Bringing ubiquitous computing
applications to home environments is a great challenge. It
enables occupants to remotely control or program an
array of automated home electronic devices. They
provide for owners comfort, security, energy efficiency
(low operating costs) and convenience at all times,
regardless of whether anyone is home.
II. SECURITY CHALLENGES AND NECESSITIES
A. Security
Security design must consider principles of time and
location whereas ubiquitous computing is increased in
multiple- environment openly [6]. Eavesdropping of
communication media, Denial Of Service (DOS) and
modification of information are patterns of attacks performed
by a hacker due to obtaining control of user instruments.
Moving across various networks smoothly without
user-aware of what network is passing forms main objective
to carry out reliable services without more insist on
infrastructure. Protection from unauthorized user (security),
prevention of access by an attacker through unauthorized
techniques (integrity), providing accessibility for user entirely
(availability) and avoiding an entity from refusing former
actions (non-repudiation) are important factors in the security
model. Noticing type of transferring data, possible distortion
or misuse, weaknesses and features, the security issues in
Security Attacks and Solutions On Ubiquitous
Computing Networks
Ahmad Sharifi, Mohsen Khosravi, Dr. Asadullah Shah
ISSN: 2277-3754
ISO 9001:2008 Certified
International Journal of Engineering and Innovative Technology (IJEIT)
Volume 3, Issue 4, October 2013
41
wireless network infrastructure for ubiquitous environments
can be illustrated.
 Lack of authentication
 Recent flaws due to former attacks
 Unplanned growth to improve
 Lack of suitable security solution
 Weak control
 Elements interaction issues regarding upgrades
 Weak application
Although technical capability in the side of users maybe relies
on distributed security mechanism, some circumstances
require more security to address and ubiquitous computing
enlist security in different approaches.
Fig 1- Ubiquitous environment and issues
Particular security requirements and solutions [1,3,4] can be
determined as below:
 Interoperability: Every domain in ubiquitous
environment is addressed by its proper security solution
so it needs to be matching with existing local security
solution.
 Availability: Whereas the environment is dynamic,
incoming and outgoing entries affect networks entirely,
so proper operation named Ubiquitous Device
Management (UDM) act against alteration of
environment to maintain availability.
 Protection: Credential in environment can be existed at
different layers using IP Security (IPSec) and Secure
Socket Layer (SSL). Different security protocols exist in
different network infrastructure and unified protocols are
required at the ubiquitous network level.
 Delegation: A running service regarding different
networks and their mobile parts can change the network
so it is necessary for users to authorize alterations and
delegate their right to a management function running on
their behalf.
 Platform safety: Ubiquitous networks are enhanced
with capability to download application securely that
allow proportional update or reconfigure. If there is no
limitation on downloadable source for application so
malicious applications may penetrate and reconfigure an
instrument. For this reason, it is urgent to protect the
platform from this kind of attacks.
 Single sign on (SSO): Whereas, users often need to
access multiple service providers getting involved with
multiple authentications and various devices, services
and networks, so it is required to implement a single
sign-on solution which reforms the initiation for entries
to authenticate once in all network domains to include
reliable leaving and joining of ubiquitous networks
without disturbances.
 Content safety: While significant capability of
delivering multiple services by ubiquitous computing to
users is noticed, assurance of being secure for providers
in digital environment is guaranteed using a Digital Right
Management (DRM) system to implement in ubiquitous
instruments.
A. Challenges
The further aspects and the extended functionality that
ubiquitous computing offers make it inclined to more
vulnerabilities and disclosures concluding an extra
responsibility to the security subsystem.
 The extended computing boundary: The new
computing environment indicates the intangible
conventional computing with related constraints of user
locations. On this environment traditional methods
concentrating solely on digital security are insufficient.
 Privacy issues: Because of physical outreach of
ubiquitous computing, privacy of users is become as a
perverse task. More intelligent spaces and computing
capabilities that are openly extensive supplied by natural
construction. These spaces can be captured and utilize
context information. So the system forms a distributed
observation system that can capture too much
information about users and donates confidence of track
prevention for users.
 Trust security: Trust is an association between two
entities such that one entity credits other trusted entity
and also is a representation of being reliable, secure and
trustworthy in any interaction with the node. A trust
security task will supply implements qualifying to utilize
and doing performance of security related decisions
autonomously.
 Social issues: Social cues can be extremely important
for building models of security, privacy, and trust in a
system. Knowing what other people think, talking with
other people affected by the system (or responsible of it),
and the general social pressures of belonging to a group
can all affect people’s perceptions of technology.
Individual, group and behaviours are categorized as
social issues. New ways of communicate, technologies,
interaction and also human behaviour is considered.
 User interaction issues: Because of the nature of group
interactions between users in the space, it is not easily
possible to deny seeing or hearing of user information,
thus consideration to overcome due to this issue must be
taken into security plan by jointing physical and virtual
aspects of access control with each other.
ISSN: 2277-3754
ISO 9001:2008 Certified
International Journal of Engineering and Innovative Technology (IJEIT)
Volume 3, Issue 4, October 2013
42
 Information operation: It is a serious concern in the
network in the networks that is over new types of threats.
It can be defined as actions taken that affect adversary
information and information systems while defecting
one's own information and information systems. In this
way cyber terrorists and other techno-villains can exploit
computer networks, inject misleading information, steal
electronic assets or disrupt critical services monitor to
prevent.
 Security policies: Implying a flexible and convenient
approach to define and manage security policies in a
dynamic context-aware form is dominant for ubiquitous
computing. Policy Management tools provide
administrators the capability to specify, implements, and
imposes rules to exercise greater control over the
behaviour of entities in their systems. The policy
management software maintains an exhaustive database
of corresponding device and resource interfaces. With
the increase of heterogeneous device-specific and
vendor-specific interfaces, these tools may need to be
updated frequently to accommodate new hardware or
software, and the system normally becomes difficult to
manage. As a result, general purpose low-level
management tools are limited in their functionality, and
are forced to implement only generic or coarse-grained
policies.
III. SECURITY ATTACK AND SOLUTIONS
A. Security attacks
Some famous security attacks on ubiquitous environments
can be illustrated as below [7,10]:
Fig 2- Attacks on different nodes
 Man-in-the-middle attack: Authentication of
appliances in delivering services is very important.
A user must authenticate the artefact mandatorily,
while using a secret, i.e., password or PIN code. The
Man-in-the-middle attack happens when artifacts or
users forward challenges and responses to simulate
the existence of other actors. When a client uses his
credit card through terminal, even though proper
security protocols are tangent, a masquerade attack
is a probability. In other words, an attacker has the
ability to modify the transaction without tampering
with terminal and needless to steal the card. So this
kind of attack cannot be verified to plug in the right
terminal in any way due to not occurring in a virtual
context. This kind of attack allows the impersonation
of artifacts and users.
 Access network attack: Home gateway and outside
service provider connect together through the access
network. Obviously, if the attacker gathers the
sensitive data form network packet at the household
network connection point, critical information such
as: financial data, user ID and other information can
be exposed.
 Illegal connection attack: Whereas household
appliances are connected to multiple networks
through the home gateway which is normally
controlled by web based management, the problem
arises when the attacker can obtain this
administration. Then it can attack against the rest of
network easily. In addition may be an attacker
pretends own as one internal legitimate user and
control the home appliances. Leakage of information
can lead to misuse of it that is not interested by users.
 Capturing sensitive data: Electronic sensors are
commonly used in the ubiquitous systems and
because of their poor computational opportunity in
the monitoring procedure, while an attacker can use
this reality with putting a receiver close to the sensor
to achieve sensitive information from the
implemented sensor directly. In these sensors,
usually focus is about sensing tasks instead of
cryptographic affairs.
 Stealing Intermediary device: An intermediary
device gathers sensor data. If it goes in hand of an
attacker, the device cannot be reused where it is
counted as a breached source for network
information to an attack purpose. In other words, this
forms a potential vulnerability. In many cases, a
device contains a maintenance interface.
 Data manipulation: Because of computational
restrictions on sensors, they cannot authenticate the
passing data directly. Record logs of traversing
sensor data is kept on an intermediary device.
Encryption and decryption techniques can be used to
increase the authentication, although the how to use
with poor intrinsic infrastructure on a computational
manner is a challenge as well.
 Impersonating and insiders: A monitoring
instrument can be deceived by an attacker
pretending to be a technician. In this way, devices
can be replaced with fake ones by the attacker. So an
impersonating attacker is able to use free services
form the network.
 Denial Of Service (DOS): This kind of attack
occurs in high chances on the poor protected
monitoring system while, batteries through
intermediary devices could be drained or jamming
appears on transmission links. This attack can cause
to overload on the communication interfaces of the
ISSN: 2277-3754
ISO 9001:2008 Certified
International Journal of Engineering and Innovative Technology (IJEIT)
Volume 3, Issue 4, October 2013
43
medical objectives and intensive computational
process on centers processing plants. So identifying
these situations in advance is important to take the
appropriate steps.
B. Security solution
Security has a significant role for ubiquitous computing. In
fact, it arises for many people as a primarily practical concern.
In these kinds of environments and networks, some solutions
to face with probable issues are proposed.[5]
IV. REAL TIME INTRUSION DETECTION
Available intrusion detection system (IDS), have varying
weaknesses leading to tough deployment due to lack of
considerations about heterogeneity, flexibility and resource
limitation of ubiquitous networks. To figure out this problem
a service-oriented and user-centric intrusion detection system
(SUIDS) is suggested which record events and logs to imply
protection mechanisms on different network appliances
against intrusions. A user-centric approach is proposed to
spontaneously compose a protection against malicious users.
In SUDIS behaviour of users in long time by potential
distributions are represented, which displays the expected
result and relationship to any kind of actions for a user. In
brief, the stages can be indicated as:
 Long term behaviors of users are accumulated.
 Possible distributions for services are developed.
 Normal and current behaviour of users are achieved.
 Statistical deviation between established behaviors
and current ones are counted.
 If it is intrusion or not is recognized
V. ROLE BASED ACCESS CONTROL
Role based access control system (RBAC), is based on
different roles on an individual occurring as part of an
organization. In this method, each role is assigned to a set of
permission to hold a place as a hierarchy among other entities.
It includes two kinds of mappings, which are user role
assignment (URA) and role permission assignment (RPA).
These are updated separately. Users can be supplemented to
the URA without changing RPA, providing new users a
predefined role. And also RPA assigns users to acceptable
behaviors that are restricted. The purpose of RBAC is that
URA and PRA change less frequency than the permission of
individual users. It has been adapted for use in ubiquitous
computing environments. These steps are:
The user role is achieved.
The privileges related their role, are listed.
Normal action of user is obtained.
Privileges under role are controlled for allowance.
In acceptable situation, a user is authenticated.
VI. TRUST BASED SECURITY SOLUTION
This proposal improves a security policy and assigning
credentials to entities. Delegation of trust to third parties is
focused in this mechanism. The solution has idea on
extending of SPKI and RBAC for accessibility of smart
devices connected together i.e., using Bluetooth. These steps
are:
 Assigning credentials for a given entity is
performed.
 Security policies are defined.
 Trusted entities are listed, then giving assigns to
entities are initiated.
 Trust over user from trusted entities is achieved.
 A trust on a new user based on the feedback taken
from trusted entities is established.
 Trust based authentication or access control is
performed.
VII. LOCAL PROOF OF SECRET
It is a procedure [2] which can verify that a secret is locally
known in order to prohibit man-in-the middle attacks in
ubiquitous computing. It indicates how a user A can
authenticates a virtual entity B. The trusted third party can
certify some properties involving verification of an attribute.
VIII. RFID BASED AUTHENTICATION PROTOCOL
A radio frequency Identification (RFID) [8] is a microchip
that is able of transmitting a unique serial number and other
additional data through RF (radio frequency) signals.
Ubiquitous computing involves computers and technology
that blend seamlessly into day to day living. The purpose of
RFID is to identify objects remotely by embedding tags into
the objects. RFID tags are useful tools in manufacturing,
supply chain management, inventory control, etc. In
ubiquitous computing environment, components or RFID
systems can exist anywhere. In tag’s ID state, dynamic value
means the tag only communicates with a fixed back-end
database and the tag holding static ID indicates it can
communicate with any reader in ubiquitous computing
environment. RFID system must be formed to be secure
against attacks such as eavesdropping, traffic analysis,
message interception and impersonation, i.e., spoofing and
replay. Even though RFID technology is known to be
well-suited to linking the physical and virtual world, but
before it could become a truly ubiquitous technology, there is
still many researches challenges to be faced. Such challenges
include security, privacy, deployment challenges such as
health and safety and aesthetics, as well as technical
challenges such as system failures and input data errors.
IX. INFORMATION LEAKAGE
Whereas there are sensitive information especially in
expensive products, and concerning of users due to their
information security, this matter is critical to solve. In other
hand, RFID systems only response with distinguished
emitting signals to a query which is related to neighborhood
domain. Leakage of information can be occurred without
awareness of users. Information leakage by insiders is more
problematic while the asset value of information is higher. In
situations of information sharing and information
accessibility the problem is more serious. Therefore, it is most
ISSN: 2277-3754
ISO 9001:2008 Certified
International Journal of Engineering and Innovative Technology (IJEIT)
Volume 3, Issue 4, October 2013
44
important to develop security technology that applies more
strict control to inside information leakage while enabling
staff inside the company to access inside information at any
time in any place supporting high work efficiency.
X. TRACEABILITY
An opponent can record the transmitted message from a
response of a target tag and establish a link between them. By
this link, the location information of user can be detected to an
opponent. In the authentication situations stages include:
 Reading RFID-tag from a product
 Transform of RFID-tag to the database server
 Check for validity of RFID-tag
 Match RFID-tag with an entity indicates
authentication.
XI. BIOMETRICS
It implicates good properties to provide seamless and
automated mechanisms for determining and confirming
identity while, being less prominent. Finger print recognition,
or face recognition techniques are faster than entering secure
passwords and no need to carry special devices like PDA.
Accuracy and seamless of biometric authentication
techniques are very dependent on hardware. The principal
concern focuses around the biometric template and sample. In
whichever biometric technique that is used, these elements
represent unique personal information. Unfortunately, unlike
other forms of authentication (such as secret knowledge or
tokens, which can be simply changed if lost or stolen), it is not
possible (or necessarily easy) to change or replace biometric
characteristics – they are an inherent part of the person.
Therefore, once lost or stolen, they remain compromised and
can no longer be reliably used. Also, biometric authentication
techniques still lack a good and secure method of storing
biometric features in a way that prevents compromise of
sensitive data and preserves anonymity while providing
enough flexibility to accommodate partial matches and reduce
a suitable confidence level.
XII. CONCLUSION
Security and privacy are one of the most important issues
on ubiquitous computing. The nature of the ubiquitous
environment allows communications and devices traverse
openly, anytime and anywhere, so modern computing
networks have become increasingly ubiquitous. When
services are provided easily for all various networks and their
users, obviously the major concern of users due their critical
information become a dominant point. In this paper the
security challenges and attacks over the applications
developed on ubiquitous computing environment and some
security schemes have presented.
REFERENCES
[1] Adelstein. F., Gupta. S.K.S., Richard G.G., Schwiebert. L.,
“Fundamentals of mobile and pervasive computing”, TATA
McGRAW-HILL (Fourth reprint 2008)
[2] BUSSARD. L., ROUDIER. Y., “Authentication in Ubiquitous
Computing”, Workshop on Security in Ubiquitous Computing
UBICOMP 2002, Göteborg Sweden.
[3] Campbell. R., Al-Muhtadi. J., Naldurg .P, Sampemane. G.,
Mickunas.M.D.,“ Towards Security and Privacy for Pervasive
Computing”.
[4] Forne. J., Hinarejos. F., Marin .A., Almena rez. F., Lopez. J.,
Montenegro.J.A, Lacoste, M., Diaz.D., “Pervasive
authentication and authorization infrastructures for mobile
users”, ELSEVIER, information security technical report 12.
162-171, (2007).
[5] Kulkarni. D., Tripathi.,“Context-Aware Role-based Access
Control in Pervasive Computing Systems”, Dept. of Computer
Science, University of Minnesota Twin Cities, MN 55455,
USA (dkulk,tripathi)@cs.umn.edu.
[6] Leung. A., Sheng. Y., Cruickshank.H., “The security
challenges for mobile ubiquitous services”, ELSEVIER,
information security technical report 12. 162-171, (2007).
[7] Hayat. Z., Reeve. J., Boutle. C., “Ubiquitous security for
ubiquitous computing”, ELSEVIER, information security
technical report 12. 172-178, (2007).
[8] O'Driscoll. C., Cormac. D.M, Deegan. M., Mtenzi. F., O’Shea.
B, “RFID: an Ideal Technology for Ubiquitous”, Dublin
Institute of Technology ARROW@DIT School of Electronic
and Communications Engineering. Conference papers (2008)
[9] Pierre. S., “Mobile computing and ubiquitous networking:
concepts, technologies and challenges”, ELSEVIER,
Telematics and informatics 18 (2001) 109-131
[10] Shinozuka. K., “Ubiquitous Security - Towards Realization of
a Safe and Secure Digital World ”, Oki Technical Review April
2007/Issue 210 Vol.74 No.2
AUTHOR’S PROFILE
Ahmad Sharifi. He has received M.Tech in Computer Networks and
Information Security from Jawaharlal Nehru Technological University
(JNTU), Hyderabad, India. In addition, he has received his bachelor in
Electronic engineering from industrial university of Shahroud, Iran. Ahmad
has professional experiences on technical engineering on ISP and network
designs for many years. In addition, he is involving with teaching in
universities. He interests in Cryptography, WSN, ADHOC, MATLAB,
OPNET and other related issues. His personal website is
www.ahmadsharifi.com. Furthermore, he cooperates with RIPE NCC
www.ripe.net via www.sharifisp.com that is Internet Service Provider.
Mohsen Khosravi. He is PhD student in the Information Technology
department of Information and Communication Technology (KICT) of
International Islamic University Malaysia (IIUM). He has received his
ISSN: 2277-3754
ISO 9001:2008 Certified
International Journal of Engineering and Innovative Technology (IJEIT)
Volume 3, Issue 4, October 2013
45
master of Information Technology from Jawaharlal Nehru Technological
University (JNTU), Hyderabad, India. His bachelor is software engineering
from Azad university of Lahijan, Iran. His fields of interests are ADHOC,
WSN and RFID that he works on it specially.
PROF. DR. ASADULAH SHAH.
He is Professor at Department of Information System, Kulliyyah of
Information and Communication Technology, IIU Malaysia. Dr. Shah has a
total of 28 years teaching and research experience. He has 105 research
publications and 12 books published by International press. Dr. Shah has
done his undergraduate degree in Electronics, Master’s degree in Computer
Technology from the University of Sindh, and PhD in Multimedia
Communication, from the University of Surrey, England, UK. His areas of
interest are multimedia compression techniques, research methodologies,
speech packetization and statistical multiplexing. He has been teaching
courses in the fields of electronics, computers, telecommunications and
management sciences.

Mais conteúdo relacionado

Mais procurados

Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
 
76 s201913
76 s20191376 s201913
76 s201913IJRAT
 
Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementMicrosoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementIntergen
 
Paper id 25201417
Paper id 25201417Paper id 25201417
Paper id 25201417IJRAT
 
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...IJORCS
 
76 s201918
76 s20191876 s201918
76 s201918IJRAT
 
InfoSec Technology Management of User Space and Services Through Security Thr...
InfoSec Technology Management of User Space and Services Through Security Thr...InfoSec Technology Management of User Space and Services Through Security Thr...
InfoSec Technology Management of User Space and Services Through Security Thr...ecarrow
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSHREYASSRINATH94
 
Genesys-2-Brochure-Web
Genesys-2-Brochure-WebGenesys-2-Brochure-Web
Genesys-2-Brochure-WebGiovanni Maree
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSGeorge Wainblat
 
An IOT Based Low Power Health Monitoring with Active Personal Assistance
An IOT Based Low Power Health Monitoring with Active Personal AssistanceAn IOT Based Low Power Health Monitoring with Active Personal Assistance
An IOT Based Low Power Health Monitoring with Active Personal Assistanceijtsrd
 
Security Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureSecurity Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureIJAEMSJORNAL
 
Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...eSAT Publishing House
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIJIR JOURNALS IJIRUSA
 
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsMubashir Ali
 
Biometric System Penetration in Resource Constrained Mobile Device
Biometric System Penetration in Resource Constrained Mobile DeviceBiometric System Penetration in Resource Constrained Mobile Device
Biometric System Penetration in Resource Constrained Mobile Deviceijbbjournal
 
Pervasive Computing Applications And Its Security Issues & Challenges
Pervasive Computing Applications And Its Security Issues & ChallengesPervasive Computing Applications And Its Security Issues & Challenges
Pervasive Computing Applications And Its Security Issues & Challengesiosrjce
 

Mais procurados (19)

Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
 
76 s201913
76 s20191376 s201913
76 s201913
 
Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementMicrosoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT Management
 
Paper id 25201417
Paper id 25201417Paper id 25201417
Paper id 25201417
 
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
 
76 s201918
76 s20191876 s201918
76 s201918
 
InfoSec Technology Management of User Space and Services Through Security Thr...
InfoSec Technology Management of User Space and Services Through Security Thr...InfoSec Technology Management of User Space and Services Through Security Thr...
InfoSec Technology Management of User Space and Services Through Security Thr...
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 
Genesys-2-Brochure-Web
Genesys-2-Brochure-WebGenesys-2-Brochure-Web
Genesys-2-Brochure-Web
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
 
An IOT Based Low Power Health Monitoring with Active Personal Assistance
An IOT Based Low Power Health Monitoring with Active Personal AssistanceAn IOT Based Low Power Health Monitoring with Active Personal Assistance
An IOT Based Low Power Health Monitoring with Active Personal Assistance
 
Security Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureSecurity Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT Infrastructure
 
Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
 
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure Components
 
Biometric System Penetration in Resource Constrained Mobile Device
Biometric System Penetration in Resource Constrained Mobile DeviceBiometric System Penetration in Resource Constrained Mobile Device
Biometric System Penetration in Resource Constrained Mobile Device
 
Pervasive Computing Applications And Its Security Issues & Challenges
Pervasive Computing Applications And Its Security Issues & ChallengesPervasive Computing Applications And Its Security Issues & Challenges
Pervasive Computing Applications And Its Security Issues & Challenges
 
Modern Metrics on Computer Networking
Modern Metrics on Computer NetworkingModern Metrics on Computer Networking
Modern Metrics on Computer Networking
 

Destaque

I ferocissimi pirati del fiume tordino
I ferocissimi pirati del fiume tordinoI ferocissimi pirati del fiume tordino
I ferocissimi pirati del fiume tordinoProvincia Di Teramo
 
Radio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsRadio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsAhmad Sharifi
 
Il Patto che illumina l'Abruzzo - Marco Santarelli - Polo analisi delle reti
Il Patto che illumina l'Abruzzo - Marco Santarelli - Polo analisi delle retiIl Patto che illumina l'Abruzzo - Marco Santarelli - Polo analisi delle reti
Il Patto che illumina l'Abruzzo - Marco Santarelli - Polo analisi delle retiProvincia Di Teramo
 
Le procedura elettorale per le elezioni di secondo livello nelle Province abr...
Le procedura elettorale per le elezioni di secondo livello nelle Province abr...Le procedura elettorale per le elezioni di secondo livello nelle Province abr...
Le procedura elettorale per le elezioni di secondo livello nelle Province abr...Provincia Di Teramo
 
Survey of universal authentication protocol for mobile communication
Survey of universal authentication protocol for mobile communicationSurvey of universal authentication protocol for mobile communication
Survey of universal authentication protocol for mobile communicationAhmad Sharifi
 
Deal with attacks over cognitive radio networks authenticationognitive radio
Deal with attacks over cognitive radio networks authenticationognitive radioDeal with attacks over cognitive radio networks authenticationognitive radio
Deal with attacks over cognitive radio networks authenticationognitive radioAhmad Sharifi
 
Il Patto che illumina l'Abruzzo - Comune di Manfredonia - Cofely GDF Suez
Il Patto che illumina l'Abruzzo - Comune di Manfredonia - Cofely GDF SuezIl Patto che illumina l'Abruzzo - Comune di Manfredonia - Cofely GDF Suez
Il Patto che illumina l'Abruzzo - Comune di Manfredonia - Cofely GDF SuezProvincia Di Teramo
 
Il Patto che illumina l'Abruzzo - Luciana Mastrolonardo - Dal dire al fare: s...
Il Patto che illumina l'Abruzzo - Luciana Mastrolonardo - Dal dire al fare: s...Il Patto che illumina l'Abruzzo - Luciana Mastrolonardo - Dal dire al fare: s...
Il Patto che illumina l'Abruzzo - Luciana Mastrolonardo - Dal dire al fare: s...Provincia Di Teramo
 
Secured-Bandwidth Reservation Distance Vector routing Protocol
Secured-Bandwidth Reservation Distance Vector routing ProtocolSecured-Bandwidth Reservation Distance Vector routing Protocol
Secured-Bandwidth Reservation Distance Vector routing ProtocolAhmad Sharifi
 
Di flavio presentazione status-ercip
Di flavio  presentazione status-ercipDi flavio  presentazione status-ercip
Di flavio presentazione status-ercipProvincia Di Teramo
 
Survey of the end to end secure communication in ADHOC networks
Survey of the end to end secure communication in ADHOC networksSurvey of the end to end secure communication in ADHOC networks
Survey of the end to end secure communication in ADHOC networksAhmad Sharifi
 
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...Ahmad Sharifi
 
202020+ La crescita sostenibile in Comune con TE
202020+ La crescita sostenibile in Comune con TE202020+ La crescita sostenibile in Comune con TE
202020+ La crescita sostenibile in Comune con TEProvincia Di Teramo
 
GSM Technology and security impact
GSM Technology and security impactGSM Technology and security impact
GSM Technology and security impactAhmad Sharifi
 
Il Patto che illumina l'Abruzzo - Chiara Tonelli - La Casa che verrà
Il Patto che illumina l'Abruzzo - Chiara Tonelli - La Casa che verràIl Patto che illumina l'Abruzzo - Chiara Tonelli - La Casa che verrà
Il Patto che illumina l'Abruzzo - Chiara Tonelli - La Casa che verràProvincia Di Teramo
 
Progetto di ricerca rischio idrogeologico e sismico
Progetto di ricerca rischio idrogeologico e sismicoProgetto di ricerca rischio idrogeologico e sismico
Progetto di ricerca rischio idrogeologico e sismicoProvincia Di Teramo
 
Reto de La Conectividad
Reto de La ConectividadReto de La Conectividad
Reto de La ConectividadNatyLiza
 

Destaque (19)

I ferocissimi pirati del fiume tordino
I ferocissimi pirati del fiume tordinoI ferocissimi pirati del fiume tordino
I ferocissimi pirati del fiume tordino
 
Radio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsRadio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutions
 
Il Patto che illumina l'Abruzzo - Marco Santarelli - Polo analisi delle reti
Il Patto che illumina l'Abruzzo - Marco Santarelli - Polo analisi delle retiIl Patto che illumina l'Abruzzo - Marco Santarelli - Polo analisi delle reti
Il Patto che illumina l'Abruzzo - Marco Santarelli - Polo analisi delle reti
 
Le procedura elettorale per le elezioni di secondo livello nelle Province abr...
Le procedura elettorale per le elezioni di secondo livello nelle Province abr...Le procedura elettorale per le elezioni di secondo livello nelle Province abr...
Le procedura elettorale per le elezioni di secondo livello nelle Province abr...
 
Survey of universal authentication protocol for mobile communication
Survey of universal authentication protocol for mobile communicationSurvey of universal authentication protocol for mobile communication
Survey of universal authentication protocol for mobile communication
 
Deal with attacks over cognitive radio networks authenticationognitive radio
Deal with attacks over cognitive radio networks authenticationognitive radioDeal with attacks over cognitive radio networks authenticationognitive radio
Deal with attacks over cognitive radio networks authenticationognitive radio
 
Il Patto che illumina l'Abruzzo - Comune di Manfredonia - Cofely GDF Suez
Il Patto che illumina l'Abruzzo - Comune di Manfredonia - Cofely GDF SuezIl Patto che illumina l'Abruzzo - Comune di Manfredonia - Cofely GDF Suez
Il Patto che illumina l'Abruzzo - Comune di Manfredonia - Cofely GDF Suez
 
Il Patto che illumina l'Abruzzo - Luciana Mastrolonardo - Dal dire al fare: s...
Il Patto che illumina l'Abruzzo - Luciana Mastrolonardo - Dal dire al fare: s...Il Patto che illumina l'Abruzzo - Luciana Mastrolonardo - Dal dire al fare: s...
Il Patto che illumina l'Abruzzo - Luciana Mastrolonardo - Dal dire al fare: s...
 
Secured-Bandwidth Reservation Distance Vector routing Protocol
Secured-Bandwidth Reservation Distance Vector routing ProtocolSecured-Bandwidth Reservation Distance Vector routing Protocol
Secured-Bandwidth Reservation Distance Vector routing Protocol
 
Di flavio presentazione status-ercip
Di flavio  presentazione status-ercipDi flavio  presentazione status-ercip
Di flavio presentazione status-ercip
 
Survey of the end to end secure communication in ADHOC networks
Survey of the end to end secure communication in ADHOC networksSurvey of the end to end secure communication in ADHOC networks
Survey of the end to end secure communication in ADHOC networks
 
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
 
Il progetto ercip
Il progetto ercipIl progetto ercip
Il progetto ercip
 
202020+ La crescita sostenibile in Comune con TE
202020+ La crescita sostenibile in Comune con TE202020+ La crescita sostenibile in Comune con TE
202020+ La crescita sostenibile in Comune con TE
 
GSM Technology and security impact
GSM Technology and security impactGSM Technology and security impact
GSM Technology and security impact
 
Fiume Tordino - Flora e fauna
Fiume Tordino - Flora e faunaFiume Tordino - Flora e fauna
Fiume Tordino - Flora e fauna
 
Il Patto che illumina l'Abruzzo - Chiara Tonelli - La Casa che verrà
Il Patto che illumina l'Abruzzo - Chiara Tonelli - La Casa che verràIl Patto che illumina l'Abruzzo - Chiara Tonelli - La Casa che verrà
Il Patto che illumina l'Abruzzo - Chiara Tonelli - La Casa che verrà
 
Progetto di ricerca rischio idrogeologico e sismico
Progetto di ricerca rischio idrogeologico e sismicoProgetto di ricerca rischio idrogeologico e sismico
Progetto di ricerca rischio idrogeologico e sismico
 
Reto de La Conectividad
Reto de La ConectividadReto de La Conectividad
Reto de La Conectividad
 

Semelhante a Ubiquitous Computing Security Challenges and Solutions

Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computingRam kumar
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...IAEME Publication
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd Iaetsd
 
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...ijcncs
 
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Unisys Corporation
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingRutvik Pensionwar
 
Dashboard of intelligent transportation system (ITS) using mobile agents stra...
Dashboard of intelligent transportation system (ITS) using mobile agents stra...Dashboard of intelligent transportation system (ITS) using mobile agents stra...
Dashboard of intelligent transportation system (ITS) using mobile agents stra...IJECEIAES
 
A Dashboard of ITS - Tableau de bord du STI
A Dashboard of ITS - Tableau de bord du STIA Dashboard of ITS - Tableau de bord du STI
A Dashboard of ITS - Tableau de bord du STIn allali
 
International journal of computer science and innovation vol 2015-n2-paper4
International journal of computer science and innovation  vol 2015-n2-paper4International journal of computer science and innovation  vol 2015-n2-paper4
International journal of computer science and innovation vol 2015-n2-paper4sophiabelthome
 
Global IoT Technology and Digital transformation
Global IoT Technology and Digital transformationGlobal IoT Technology and Digital transformation
Global IoT Technology and Digital transformationSANDEEP MITTAPALLY
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networkingAashish Jain
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSIJNSA Journal
 
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing  A Case StudyAuthentication And Authorization Issues In Mobile Cloud Computing  A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing A Case StudyAngie Miller
 
Unique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative SolutionsUnique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative SolutionsJuniper Networks
 
R ramya devi cloud computing
R ramya devi cloud computingR ramya devi cloud computing
R ramya devi cloud computingPriyadharshiniVS
 
Cloud centric multi-level authentication as a service for secure public safet...
Cloud centric multi-level authentication as a service for secure public safet...Cloud centric multi-level authentication as a service for secure public safet...
Cloud centric multi-level authentication as a service for secure public safet...ieeepondy
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...SubmissionResearchpa
 

Semelhante a Ubiquitous Computing Security Challenges and Solutions (20)

Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computing
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
 
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
 
Dashboard of intelligent transportation system (ITS) using mobile agents stra...
Dashboard of intelligent transportation system (ITS) using mobile agents stra...Dashboard of intelligent transportation system (ITS) using mobile agents stra...
Dashboard of intelligent transportation system (ITS) using mobile agents stra...
 
A Dashboard of ITS - Tableau de bord du STI
A Dashboard of ITS - Tableau de bord du STIA Dashboard of ITS - Tableau de bord du STI
A Dashboard of ITS - Tableau de bord du STI
 
International journal of computer science and innovation vol 2015-n2-paper4
International journal of computer science and innovation  vol 2015-n2-paper4International journal of computer science and innovation  vol 2015-n2-paper4
International journal of computer science and innovation vol 2015-n2-paper4
 
Global IoT Technology and Digital transformation
Global IoT Technology and Digital transformationGlobal IoT Technology and Digital transformation
Global IoT Technology and Digital transformation
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
 
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing  A Case StudyAuthentication And Authorization Issues In Mobile Cloud Computing  A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
 
Unique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative SolutionsUnique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative Solutions
 
CSEC630 individaul assign
CSEC630 individaul assignCSEC630 individaul assign
CSEC630 individaul assign
 
R ramya devi cloud computing
R ramya devi cloud computingR ramya devi cloud computing
R ramya devi cloud computing
 
Cloud centric multi-level authentication as a service for secure public safet...
Cloud centric multi-level authentication as a service for secure public safet...Cloud centric multi-level authentication as a service for secure public safet...
Cloud centric multi-level authentication as a service for secure public safet...
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...
 

Último

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Último (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Ubiquitous Computing Security Challenges and Solutions

  • 1. ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 4, October 2013 40 Abstract— Ubiquitous computing evolved tremendously and became an integral part of many fields and application domains. It not only causes maximized availability for users with wired or wireless networks but also supports any information technology equipment such as cell phones, PDAs, car navigation terminals and consumer information appliances as well as desktop computers and mobile PCs. This new computing paradigm also brings along modern and unique security challenges regarding vulnerabilities and appropriate solutions. Possible solutions for threats of ubiquitous environment to address these security issues are highlighted. Index Terms— Ubiquitous, Network, Security, Mobile, Solution I. INTRODUCTION In conventional computing environments, users actively prefer to interact with computers. Ubiquitous computing applications are feasible to be different, they will be embedded in the users physical environment and integrate smoothly with their everyday tasks. This new technology, involving elimination of time and position barriers are extremely inexpensive products that provide availability for users anytime and anywhere. The users are encircled with an easy and reliable information vicinity merging physical and computational basis into an integrated manner. Various human abilities in daily tasks, medicine, business, entertainment and education are enhanced to perform by this scenario using cellular phones, Personal Digital Assistants (PDAs) and other built in intelligent appliances related to different tools. Ubiquitous environment guarantees the accessibility of users to the Internet in multiple places with a variety of connection media and aware adoptability of service to the user status [1,9]. This facility is due to context implying computing context, user context, physical context, temporal context and context history. In other hands, this type of computing is broader than mobile computing considering that it interests not just mobility of computers but, more significant, mobility of the people. Context-aware computing instruments and implementations acknowledge to alterations in the environment in an intelligent manner to improve the computing environment for the user noticing the mobility of user and its context and requirement of context-aware behavior in mobile environment. The context includes:  Who (social): Identification of people near the user  What (functional): Tasks the user is running  Where (location): The geographical position of user  When (temporal): Temporal context defined  Why (motivating): The reason of running task The realization of ubiquitous computing desires obtaining seamless service provisioning for users and devices everywhere. Users in ubiquitous computing environment can access to variety of networks with high probability, reliability and availability whereas the security risk will increase as well. Some of ubiquitous applications are:  Smart tool box: They are instruments with RFID tags; they have built-in antenna integrated with the box. Time usage and frequencies are used to inform suitable reconfiguration or status.  Smart supply chain: With applying ubiquitous computing error level on companies can be reduced and tasks can be performed quickly.  Context-aware application: They support to mobility, physiology of users. Data is gathered by sensors then it will be analyzed as well as a suitable decision will be made to satisfy the purpose.  Ubiquitous healthcare: Management of chronic diseases via technology based ubiquitous patient monitoring services has been widely proposed as a viable option for economizing healthcare resources, and providing efficient, quality healthcare. They can monitor health status and perform appropriate designs.  Smart home: Bringing ubiquitous computing applications to home environments is a great challenge. It enables occupants to remotely control or program an array of automated home electronic devices. They provide for owners comfort, security, energy efficiency (low operating costs) and convenience at all times, regardless of whether anyone is home. II. SECURITY CHALLENGES AND NECESSITIES A. Security Security design must consider principles of time and location whereas ubiquitous computing is increased in multiple- environment openly [6]. Eavesdropping of communication media, Denial Of Service (DOS) and modification of information are patterns of attacks performed by a hacker due to obtaining control of user instruments. Moving across various networks smoothly without user-aware of what network is passing forms main objective to carry out reliable services without more insist on infrastructure. Protection from unauthorized user (security), prevention of access by an attacker through unauthorized techniques (integrity), providing accessibility for user entirely (availability) and avoiding an entity from refusing former actions (non-repudiation) are important factors in the security model. Noticing type of transferring data, possible distortion or misuse, weaknesses and features, the security issues in Security Attacks and Solutions On Ubiquitous Computing Networks Ahmad Sharifi, Mohsen Khosravi, Dr. Asadullah Shah
  • 2. ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 4, October 2013 41 wireless network infrastructure for ubiquitous environments can be illustrated.  Lack of authentication  Recent flaws due to former attacks  Unplanned growth to improve  Lack of suitable security solution  Weak control  Elements interaction issues regarding upgrades  Weak application Although technical capability in the side of users maybe relies on distributed security mechanism, some circumstances require more security to address and ubiquitous computing enlist security in different approaches. Fig 1- Ubiquitous environment and issues Particular security requirements and solutions [1,3,4] can be determined as below:  Interoperability: Every domain in ubiquitous environment is addressed by its proper security solution so it needs to be matching with existing local security solution.  Availability: Whereas the environment is dynamic, incoming and outgoing entries affect networks entirely, so proper operation named Ubiquitous Device Management (UDM) act against alteration of environment to maintain availability.  Protection: Credential in environment can be existed at different layers using IP Security (IPSec) and Secure Socket Layer (SSL). Different security protocols exist in different network infrastructure and unified protocols are required at the ubiquitous network level.  Delegation: A running service regarding different networks and their mobile parts can change the network so it is necessary for users to authorize alterations and delegate their right to a management function running on their behalf.  Platform safety: Ubiquitous networks are enhanced with capability to download application securely that allow proportional update or reconfigure. If there is no limitation on downloadable source for application so malicious applications may penetrate and reconfigure an instrument. For this reason, it is urgent to protect the platform from this kind of attacks.  Single sign on (SSO): Whereas, users often need to access multiple service providers getting involved with multiple authentications and various devices, services and networks, so it is required to implement a single sign-on solution which reforms the initiation for entries to authenticate once in all network domains to include reliable leaving and joining of ubiquitous networks without disturbances.  Content safety: While significant capability of delivering multiple services by ubiquitous computing to users is noticed, assurance of being secure for providers in digital environment is guaranteed using a Digital Right Management (DRM) system to implement in ubiquitous instruments. A. Challenges The further aspects and the extended functionality that ubiquitous computing offers make it inclined to more vulnerabilities and disclosures concluding an extra responsibility to the security subsystem.  The extended computing boundary: The new computing environment indicates the intangible conventional computing with related constraints of user locations. On this environment traditional methods concentrating solely on digital security are insufficient.  Privacy issues: Because of physical outreach of ubiquitous computing, privacy of users is become as a perverse task. More intelligent spaces and computing capabilities that are openly extensive supplied by natural construction. These spaces can be captured and utilize context information. So the system forms a distributed observation system that can capture too much information about users and donates confidence of track prevention for users.  Trust security: Trust is an association between two entities such that one entity credits other trusted entity and also is a representation of being reliable, secure and trustworthy in any interaction with the node. A trust security task will supply implements qualifying to utilize and doing performance of security related decisions autonomously.  Social issues: Social cues can be extremely important for building models of security, privacy, and trust in a system. Knowing what other people think, talking with other people affected by the system (or responsible of it), and the general social pressures of belonging to a group can all affect people’s perceptions of technology. Individual, group and behaviours are categorized as social issues. New ways of communicate, technologies, interaction and also human behaviour is considered.  User interaction issues: Because of the nature of group interactions between users in the space, it is not easily possible to deny seeing or hearing of user information, thus consideration to overcome due to this issue must be taken into security plan by jointing physical and virtual aspects of access control with each other.
  • 3. ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 4, October 2013 42  Information operation: It is a serious concern in the network in the networks that is over new types of threats. It can be defined as actions taken that affect adversary information and information systems while defecting one's own information and information systems. In this way cyber terrorists and other techno-villains can exploit computer networks, inject misleading information, steal electronic assets or disrupt critical services monitor to prevent.  Security policies: Implying a flexible and convenient approach to define and manage security policies in a dynamic context-aware form is dominant for ubiquitous computing. Policy Management tools provide administrators the capability to specify, implements, and imposes rules to exercise greater control over the behaviour of entities in their systems. The policy management software maintains an exhaustive database of corresponding device and resource interfaces. With the increase of heterogeneous device-specific and vendor-specific interfaces, these tools may need to be updated frequently to accommodate new hardware or software, and the system normally becomes difficult to manage. As a result, general purpose low-level management tools are limited in their functionality, and are forced to implement only generic or coarse-grained policies. III. SECURITY ATTACK AND SOLUTIONS A. Security attacks Some famous security attacks on ubiquitous environments can be illustrated as below [7,10]: Fig 2- Attacks on different nodes  Man-in-the-middle attack: Authentication of appliances in delivering services is very important. A user must authenticate the artefact mandatorily, while using a secret, i.e., password or PIN code. The Man-in-the-middle attack happens when artifacts or users forward challenges and responses to simulate the existence of other actors. When a client uses his credit card through terminal, even though proper security protocols are tangent, a masquerade attack is a probability. In other words, an attacker has the ability to modify the transaction without tampering with terminal and needless to steal the card. So this kind of attack cannot be verified to plug in the right terminal in any way due to not occurring in a virtual context. This kind of attack allows the impersonation of artifacts and users.  Access network attack: Home gateway and outside service provider connect together through the access network. Obviously, if the attacker gathers the sensitive data form network packet at the household network connection point, critical information such as: financial data, user ID and other information can be exposed.  Illegal connection attack: Whereas household appliances are connected to multiple networks through the home gateway which is normally controlled by web based management, the problem arises when the attacker can obtain this administration. Then it can attack against the rest of network easily. In addition may be an attacker pretends own as one internal legitimate user and control the home appliances. Leakage of information can lead to misuse of it that is not interested by users.  Capturing sensitive data: Electronic sensors are commonly used in the ubiquitous systems and because of their poor computational opportunity in the monitoring procedure, while an attacker can use this reality with putting a receiver close to the sensor to achieve sensitive information from the implemented sensor directly. In these sensors, usually focus is about sensing tasks instead of cryptographic affairs.  Stealing Intermediary device: An intermediary device gathers sensor data. If it goes in hand of an attacker, the device cannot be reused where it is counted as a breached source for network information to an attack purpose. In other words, this forms a potential vulnerability. In many cases, a device contains a maintenance interface.  Data manipulation: Because of computational restrictions on sensors, they cannot authenticate the passing data directly. Record logs of traversing sensor data is kept on an intermediary device. Encryption and decryption techniques can be used to increase the authentication, although the how to use with poor intrinsic infrastructure on a computational manner is a challenge as well.  Impersonating and insiders: A monitoring instrument can be deceived by an attacker pretending to be a technician. In this way, devices can be replaced with fake ones by the attacker. So an impersonating attacker is able to use free services form the network.  Denial Of Service (DOS): This kind of attack occurs in high chances on the poor protected monitoring system while, batteries through intermediary devices could be drained or jamming appears on transmission links. This attack can cause to overload on the communication interfaces of the
  • 4. ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 4, October 2013 43 medical objectives and intensive computational process on centers processing plants. So identifying these situations in advance is important to take the appropriate steps. B. Security solution Security has a significant role for ubiquitous computing. In fact, it arises for many people as a primarily practical concern. In these kinds of environments and networks, some solutions to face with probable issues are proposed.[5] IV. REAL TIME INTRUSION DETECTION Available intrusion detection system (IDS), have varying weaknesses leading to tough deployment due to lack of considerations about heterogeneity, flexibility and resource limitation of ubiquitous networks. To figure out this problem a service-oriented and user-centric intrusion detection system (SUIDS) is suggested which record events and logs to imply protection mechanisms on different network appliances against intrusions. A user-centric approach is proposed to spontaneously compose a protection against malicious users. In SUDIS behaviour of users in long time by potential distributions are represented, which displays the expected result and relationship to any kind of actions for a user. In brief, the stages can be indicated as:  Long term behaviors of users are accumulated.  Possible distributions for services are developed.  Normal and current behaviour of users are achieved.  Statistical deviation between established behaviors and current ones are counted.  If it is intrusion or not is recognized V. ROLE BASED ACCESS CONTROL Role based access control system (RBAC), is based on different roles on an individual occurring as part of an organization. In this method, each role is assigned to a set of permission to hold a place as a hierarchy among other entities. It includes two kinds of mappings, which are user role assignment (URA) and role permission assignment (RPA). These are updated separately. Users can be supplemented to the URA without changing RPA, providing new users a predefined role. And also RPA assigns users to acceptable behaviors that are restricted. The purpose of RBAC is that URA and PRA change less frequency than the permission of individual users. It has been adapted for use in ubiquitous computing environments. These steps are: The user role is achieved. The privileges related their role, are listed. Normal action of user is obtained. Privileges under role are controlled for allowance. In acceptable situation, a user is authenticated. VI. TRUST BASED SECURITY SOLUTION This proposal improves a security policy and assigning credentials to entities. Delegation of trust to third parties is focused in this mechanism. The solution has idea on extending of SPKI and RBAC for accessibility of smart devices connected together i.e., using Bluetooth. These steps are:  Assigning credentials for a given entity is performed.  Security policies are defined.  Trusted entities are listed, then giving assigns to entities are initiated.  Trust over user from trusted entities is achieved.  A trust on a new user based on the feedback taken from trusted entities is established.  Trust based authentication or access control is performed. VII. LOCAL PROOF OF SECRET It is a procedure [2] which can verify that a secret is locally known in order to prohibit man-in-the middle attacks in ubiquitous computing. It indicates how a user A can authenticates a virtual entity B. The trusted third party can certify some properties involving verification of an attribute. VIII. RFID BASED AUTHENTICATION PROTOCOL A radio frequency Identification (RFID) [8] is a microchip that is able of transmitting a unique serial number and other additional data through RF (radio frequency) signals. Ubiquitous computing involves computers and technology that blend seamlessly into day to day living. The purpose of RFID is to identify objects remotely by embedding tags into the objects. RFID tags are useful tools in manufacturing, supply chain management, inventory control, etc. In ubiquitous computing environment, components or RFID systems can exist anywhere. In tag’s ID state, dynamic value means the tag only communicates with a fixed back-end database and the tag holding static ID indicates it can communicate with any reader in ubiquitous computing environment. RFID system must be formed to be secure against attacks such as eavesdropping, traffic analysis, message interception and impersonation, i.e., spoofing and replay. Even though RFID technology is known to be well-suited to linking the physical and virtual world, but before it could become a truly ubiquitous technology, there is still many researches challenges to be faced. Such challenges include security, privacy, deployment challenges such as health and safety and aesthetics, as well as technical challenges such as system failures and input data errors. IX. INFORMATION LEAKAGE Whereas there are sensitive information especially in expensive products, and concerning of users due to their information security, this matter is critical to solve. In other hand, RFID systems only response with distinguished emitting signals to a query which is related to neighborhood domain. Leakage of information can be occurred without awareness of users. Information leakage by insiders is more problematic while the asset value of information is higher. In situations of information sharing and information accessibility the problem is more serious. Therefore, it is most
  • 5. ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 4, October 2013 44 important to develop security technology that applies more strict control to inside information leakage while enabling staff inside the company to access inside information at any time in any place supporting high work efficiency. X. TRACEABILITY An opponent can record the transmitted message from a response of a target tag and establish a link between them. By this link, the location information of user can be detected to an opponent. In the authentication situations stages include:  Reading RFID-tag from a product  Transform of RFID-tag to the database server  Check for validity of RFID-tag  Match RFID-tag with an entity indicates authentication. XI. BIOMETRICS It implicates good properties to provide seamless and automated mechanisms for determining and confirming identity while, being less prominent. Finger print recognition, or face recognition techniques are faster than entering secure passwords and no need to carry special devices like PDA. Accuracy and seamless of biometric authentication techniques are very dependent on hardware. The principal concern focuses around the biometric template and sample. In whichever biometric technique that is used, these elements represent unique personal information. Unfortunately, unlike other forms of authentication (such as secret knowledge or tokens, which can be simply changed if lost or stolen), it is not possible (or necessarily easy) to change or replace biometric characteristics – they are an inherent part of the person. Therefore, once lost or stolen, they remain compromised and can no longer be reliably used. Also, biometric authentication techniques still lack a good and secure method of storing biometric features in a way that prevents compromise of sensitive data and preserves anonymity while providing enough flexibility to accommodate partial matches and reduce a suitable confidence level. XII. CONCLUSION Security and privacy are one of the most important issues on ubiquitous computing. The nature of the ubiquitous environment allows communications and devices traverse openly, anytime and anywhere, so modern computing networks have become increasingly ubiquitous. When services are provided easily for all various networks and their users, obviously the major concern of users due their critical information become a dominant point. In this paper the security challenges and attacks over the applications developed on ubiquitous computing environment and some security schemes have presented. REFERENCES [1] Adelstein. F., Gupta. S.K.S., Richard G.G., Schwiebert. L., “Fundamentals of mobile and pervasive computing”, TATA McGRAW-HILL (Fourth reprint 2008) [2] BUSSARD. L., ROUDIER. Y., “Authentication in Ubiquitous Computing”, Workshop on Security in Ubiquitous Computing UBICOMP 2002, Göteborg Sweden. [3] Campbell. R., Al-Muhtadi. J., Naldurg .P, Sampemane. G., Mickunas.M.D.,“ Towards Security and Privacy for Pervasive Computing”. [4] Forne. J., Hinarejos. F., Marin .A., Almena rez. F., Lopez. J., Montenegro.J.A, Lacoste, M., Diaz.D., “Pervasive authentication and authorization infrastructures for mobile users”, ELSEVIER, information security technical report 12. 162-171, (2007). [5] Kulkarni. D., Tripathi.,“Context-Aware Role-based Access Control in Pervasive Computing Systems”, Dept. of Computer Science, University of Minnesota Twin Cities, MN 55455, USA (dkulk,tripathi)@cs.umn.edu. [6] Leung. A., Sheng. Y., Cruickshank.H., “The security challenges for mobile ubiquitous services”, ELSEVIER, information security technical report 12. 162-171, (2007). [7] Hayat. Z., Reeve. J., Boutle. C., “Ubiquitous security for ubiquitous computing”, ELSEVIER, information security technical report 12. 172-178, (2007). [8] O'Driscoll. C., Cormac. D.M, Deegan. M., Mtenzi. F., O’Shea. B, “RFID: an Ideal Technology for Ubiquitous”, Dublin Institute of Technology ARROW@DIT School of Electronic and Communications Engineering. Conference papers (2008) [9] Pierre. S., “Mobile computing and ubiquitous networking: concepts, technologies and challenges”, ELSEVIER, Telematics and informatics 18 (2001) 109-131 [10] Shinozuka. K., “Ubiquitous Security - Towards Realization of a Safe and Secure Digital World ”, Oki Technical Review April 2007/Issue 210 Vol.74 No.2 AUTHOR’S PROFILE Ahmad Sharifi. He has received M.Tech in Computer Networks and Information Security from Jawaharlal Nehru Technological University (JNTU), Hyderabad, India. In addition, he has received his bachelor in Electronic engineering from industrial university of Shahroud, Iran. Ahmad has professional experiences on technical engineering on ISP and network designs for many years. In addition, he is involving with teaching in universities. He interests in Cryptography, WSN, ADHOC, MATLAB, OPNET and other related issues. His personal website is www.ahmadsharifi.com. Furthermore, he cooperates with RIPE NCC www.ripe.net via www.sharifisp.com that is Internet Service Provider. Mohsen Khosravi. He is PhD student in the Information Technology department of Information and Communication Technology (KICT) of International Islamic University Malaysia (IIUM). He has received his
  • 6. ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 4, October 2013 45 master of Information Technology from Jawaharlal Nehru Technological University (JNTU), Hyderabad, India. His bachelor is software engineering from Azad university of Lahijan, Iran. His fields of interests are ADHOC, WSN and RFID that he works on it specially. PROF. DR. ASADULAH SHAH. He is Professor at Department of Information System, Kulliyyah of Information and Communication Technology, IIU Malaysia. Dr. Shah has a total of 28 years teaching and research experience. He has 105 research publications and 12 books published by International press. Dr. Shah has done his undergraduate degree in Electronics, Master’s degree in Computer Technology from the University of Sindh, and PhD in Multimedia Communication, from the University of Surrey, England, UK. His areas of interest are multimedia compression techniques, research methodologies, speech packetization and statistical multiplexing. He has been teaching courses in the fields of electronics, computers, telecommunications and management sciences.