Loading...
Please wait, while we are loading the content...
Similar Documents
Secure Smart Environments : Security Requirements , Challenges and Experiences in Pervasive Computing
| Content Provider | Semantic Scholar |
|---|---|
| Author | Wang, Jun Yang, Yaling Yurcik, William |
| Copyright Year | 2005 |
| Abstract | In an ideal pervasive computing environment, a large number of connected smart devices are deployed to collaboratively provision seamless services to users. Pervasive computing is enabled by various advanced technologies, particularly wireless technologies and the Internet. It has become a trend for our future lives. A pervasive computing environment can be extremely heterogeneous. We can imagine how many different devices are involved in a smart home: TVs, phones, cameras, coffee makers, or even books and bookshelves. Since these devices are smart and communicate with each other mainly via wireless links, security must be ensured. Otherwise, the smart devices deployed around us would come back to hunt us and the result would be catastrophic. In this abstract we briefly discuss some important security issues in pervasive computing. |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | http://www.projects.ncassr.org/multicast/papers/nsfworkshop05-pervasive.pdf |
| Alternate Webpage(s) | https://www.faculty.ece.vt.edu/yyang8/papers/nsfworkshop05-pervasive.pdf |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |