Survey of Ubiquitous Computing Security

被引:0
|
作者
Li Y. [1 ,2 ,6 ]
Chen Y. [3 ,6 ]
Zhao J. [4 ,6 ]
Yue X. [4 ,6 ]
Zheng C. [2 ]
Wu Y. [2 ]
Wu G. [5 ,6 ]
机构
[1] School of Cyberspace Security(School of Cryptology), Hainan University, Haikou
[2] Intelligent Software Research Center, Institute of Software, Chinese Academy of Sciences, Beijing
[3] School of Cyber Engineering, Xidian University, Xi'an
[4] School of Information Science and Engineering, Yanshan University, Qinhuangdao
[5] Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin
[6] National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing
基金
中国国家自然科学基金;
关键词
AI; Cloud computing; IoT security; Privacy; Ubiquitous computing; Ubiquitous operating system (UOS);
D O I
10.7544/issn1000-1239.20211248
中图分类号
学科分类号
摘要
With the development of ubiquitous computing technology and ubiquitous operating system (UOS), ubiquitous computing has become a hot research topic both in industry and academy. As classic ubiquitous computing scenarios, smart home, industrial Internet of things, self-driving, and cloud computing, have become increasingly prosperous, and their security issues have attracted the attention of researchers. Currently, as the related research on ubiquitous computing security is in its initial stage, there is still no general security methods that can solve the emerging security issues of ubiquitous computing. In this paper, we firstly review the current status of ubiquitous computing, UOS, and summarize its architecture. Then, we analyze and summarize the state-of-the-art research effort on ubiquitous computing security, and divide security issues into three major aspects: system security, device security and communication security. We discuss the security issues and related research effort in four classic ubiquitous computing scenarios. Through in-depth analysis of the shortcomings of existing research and the causes of security problem, we summarize eight key technical challenges and opportunities in ubiquitous computing security. Finally, we discuss every challenge, and point out the potential security research directions of ubiquitous computing in future. © 2022, Science Press. All right reserved.
引用
收藏
页码:1054 / 1081
页数:27
相关论文
共 192 条
  • [21] Randazzo A, Tinnirello I., Kata containers: An emerging architecture for enabling MEC services in fast and secure way, Proc of the 6th Int Conf on Internet of Things: Systems, Management and Security, pp. 209-214, (2019)
  • [22] Heiser G, Elphinstone K., L4 microkernels: The lessons from 20 years of research and deployment, ACM Transactions on Computer Systems, 34, 1, pp. 1-29, (2016)
  • [23] Nunes P, Medeiros I, Fonseca J, Et al., An empirical study on combining diverse static analysis tools for web security vulnerabilities based on development scenarios, Computing, 101, 2, pp. 161-185, (2019)
  • [24] Wang Yingjie, Xu Guangquan, Liu Xing, Et al., Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis, Journal of Systems and Software, 167, (2020)
  • [25] Li Zhen, Zou Deqing, Xu Shoushuai, Et al., Vuldeepecker: A deep learning-based system for vulnerability detection, (2018)
  • [26] Zong Peiyuan, Lv Tao, Wang Dawei, Et al., Fuzzguard: Filtering out unreachable inputs in directed grey-box fuzzing through deep learning, Proc of the 29th USENIX Security Symp, pp. 2255-2269, (2020)
  • [27] Chen Hongxu, Guo Shengjian, Xue Yinxing, Et al., MUZZ: Thread-aware grey-box fuzzing for effective bug hunting in multithreaded programs, Proc of the 29th USENIX Security Symp, pp. 2325-2342, (2020)
  • [28] Osterlund S, Razavi K, Bos H, Et al., Parmesan: Sanitizer-guided greybox fuzzing, Proc of the 29th USENIX Security Symp, pp. 2289-2306, (2020)
  • [29] Niu Weina, Zhang Xiaosong, Du Xiaojiang, Et al., A deep learning based static taint analysis approach for IoT software vulnerability location, Measurement, 152, (2020)
  • [30] Yan Han, Luo Senlin, Pan Limin, Et al., HAN-BSVD: A hierarchical attention network for binary software vulnerability detection, Computers & Security, 108, 9, (2021)