Survey of Ubiquitous Computing Security

被引:0
|
作者
Li, Yin [1 ,2 ,6 ]
Chen, Yong [3 ,6 ]
Zhao, Jingxin [4 ,6 ]
Yue, Xinghui [4 ,6 ]
Zheng, Chen [2 ]
Wu, Yanjun [2 ]
Wu, Gaofei [5 ,6 ]
机构
[1] School of Cyberspace Security(School of Cryptology), Hainan University, Haikou,570228, China
[2] Intelligent Software Research Center, Institute of Software, Chinese Academy of Sciences, Beijing,100190, China
[3] School of Cyber Engineering, Xidian University, Xi'an,710071, China
[4] School of Information Science and Engineering, Yanshan University, Qinhuangdao,066004, China
[5] Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin,541004, China
[6] National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing,101408, China
基金
中国国家自然科学基金;
关键词
D O I
10.7544/issn1000-1239.20211248
中图分类号
学科分类号
摘要
With the development of ubiquitous computing technology and ubiquitous operating system (UOS), ubiquitous computing has become a hot research topic both in industry and academy. As classic ubiquitous computing scenarios, smart home, industrial Internet of things, self-driving, and cloud computing, have become increasingly prosperous, and their security issues have attracted the attention of researchers. Currently, as the related research on ubiquitous computing security is in its initial stage, there is still no general security methods that can solve the emerging security issues of ubiquitous computing. In this paper, we firstly review the current status of ubiquitous computing, UOS, and summarize its architecture. Then, we analyze and summarize the state-of-the-art research effort on ubiquitous computing security, and divide security issues into three major aspects: system security, device security and communication security. We discuss the security issues and related research effort in four classic ubiquitous computing scenarios. Through in-depth analysis of the shortcomings of existing research and the causes of security problem, we summarize eight key technical challenges and opportunities in ubiquitous computing security. Finally, we discuss every challenge, and point out the potential security research directions of ubiquitous computing in future. © 2022, Science Press. All right reserved.
引用
收藏
页码:1054 / 1081
相关论文
共 50 条
  • [1] Security and privacy in ubiquitous computing
    Miri, Ali
    Benslimane, Abderrahim
    Huang, Nen-Fu
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (12) : 1417 - 1419
  • [2] The security challenges of ubiquitous computing
    Stajano, F
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS CHES 2003, PROCEEDINGS, 2003, 2779 : 1 - 1
  • [3] Security policies and trust in ubiquitous computing
    Joshi, Anupam
    Finin, Tim
    Kagal, Lalana
    Parker, Jim
    Patwardhan, Anand
    [J]. PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2008, 366 (1881): : 3769 - 3780
  • [4] Special issue on security in ubiquitous computing
    Qu, Wenyu
    Xiang, Yang
    Zhang, Yong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (11) : 1221 - 1222
  • [5] Small worlds and the security of ubiquitous computing
    Vogt, H
    [J]. SIXTH IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS MOBILE AND MULTIMEDIA NETWORKS, PROCEEDINGS, 2005, : 593 - 597
  • [6] SPUC: Security protocol for ubiquitous computing
    Yang, Fan
    Lv, Qingcong
    Cao, Qiying
    [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 757 - 760
  • [7] Security aspects of ubiquitous computing in health careSicherheitsaspekte von Ubiquitous Computing im Gesundheitsbereich
    E. Weippl
    A. Holzinger
    A. M. Tjoa
    [J]. e & i Elektrotechnik und Informationstechnik, 2006, 123 (4) : 156 - 161
  • [8] A survey of application development in ubiquitous computing
    Tei, Kenji
    Nakagawa, Hiroyuki
    Kawamata, Yojiro
    Yoshioka, Nobukazu
    Fukazawa, Yoshiaki
    Honiden, Shinichi
    [J]. Computer Software, 2008, 25 (04) : 121 - 132
  • [9] Security for ubiquitous computing: Problems and proposed solution
    Hung, Le Xuan
    Phuong, Tran Van
    Giang, Pho Duc
    Zhung, Yonil
    Lee, Sungyoung
    Lee, Young-Koo
    [J]. 12TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND REAL-TIME COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2006, : 110 - 113
  • [10] The resurrecting duckling: Security issues for ubiquitous computing
    Stajano, Frank
    Anderson, Ross
    [J]. Computer, 2002, 35 (SUPPL.) : 22 - 26