Survey of Ubiquitous Computing Security

被引:0
|
作者
Li Y. [1 ,2 ,6 ]
Chen Y. [3 ,6 ]
Zhao J. [4 ,6 ]
Yue X. [4 ,6 ]
Zheng C. [2 ]
Wu Y. [2 ]
Wu G. [5 ,6 ]
机构
[1] School of Cyberspace Security(School of Cryptology), Hainan University, Haikou
[2] Intelligent Software Research Center, Institute of Software, Chinese Academy of Sciences, Beijing
[3] School of Cyber Engineering, Xidian University, Xi'an
[4] School of Information Science and Engineering, Yanshan University, Qinhuangdao
[5] Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin
[6] National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing
基金
中国国家自然科学基金;
关键词
AI; Cloud computing; IoT security; Privacy; Ubiquitous computing; Ubiquitous operating system (UOS);
D O I
10.7544/issn1000-1239.20211248
中图分类号
学科分类号
摘要
With the development of ubiquitous computing technology and ubiquitous operating system (UOS), ubiquitous computing has become a hot research topic both in industry and academy. As classic ubiquitous computing scenarios, smart home, industrial Internet of things, self-driving, and cloud computing, have become increasingly prosperous, and their security issues have attracted the attention of researchers. Currently, as the related research on ubiquitous computing security is in its initial stage, there is still no general security methods that can solve the emerging security issues of ubiquitous computing. In this paper, we firstly review the current status of ubiquitous computing, UOS, and summarize its architecture. Then, we analyze and summarize the state-of-the-art research effort on ubiquitous computing security, and divide security issues into three major aspects: system security, device security and communication security. We discuss the security issues and related research effort in four classic ubiquitous computing scenarios. Through in-depth analysis of the shortcomings of existing research and the causes of security problem, we summarize eight key technical challenges and opportunities in ubiquitous computing security. Finally, we discuss every challenge, and point out the potential security research directions of ubiquitous computing in future. © 2022, Science Press. All right reserved.
引用
收藏
页码:1054 / 1081
页数:27
相关论文
共 192 条
  • [1] Mei Hong, Yao Guo, Toward ubiquitous operating systems: A software-defined perspective, Computer, 51, 1, pp. 50-56, (2018)
  • [2] Mei Hong, Yao Guo, Operating systems for internetware: Challenges and future directions, Proc of IEEE 38th Int Conf on Distributed Computing Systems, pp. 1377-1384, (2018)
  • [3] Outline of the 14th five-year plan for national economic and social development of the People's Republic of China and the long-range objectives through the year 2035
  • [4] Antonakakis M, April T, Bailey M, Et al., Understanding the Mirai botnet, Proc of the 26th USENIX Security Symp, pp. 1093-1110, (2017)
  • [5] Larson S., A smart fish tank left a casino vulnerable to hackers
  • [6] Talos C., New VPNFilter malware targets at least 500k networking devices worldwide, (2018)
  • [7] Santamarta M., Last call for SATCOM security[EB/OL], (2018)
  • [8] FireEye, Highly evasive attacker leverages Solarwinds supply chain to compromise multiple global victims with Sunburst backdoor
  • [9] Cao Donggang, Xue Dongliang, Ma Zhiyi, Et al., XiUOS: An open-source ubiquitous operating system for industrial Internet of things, Science China Information Sciences, 65, 1, pp. 1-2, (2022)
  • [10] Shan Yizhou, Huang Yutong, Chen Yilun, Et al., LegoOS: A disseminated, distributed OS for hardware resource disaggregation, Proc of the 13th USENIX Symp on Operating Systems Design and Implementation, pp. 69-87, (2018)