Survey of Ubiquitous Computing Security

被引:0
|
作者
Li Y. [1 ,2 ,6 ]
Chen Y. [3 ,6 ]
Zhao J. [4 ,6 ]
Yue X. [4 ,6 ]
Zheng C. [2 ]
Wu Y. [2 ]
Wu G. [5 ,6 ]
机构
[1] School of Cyberspace Security(School of Cryptology), Hainan University, Haikou
[2] Intelligent Software Research Center, Institute of Software, Chinese Academy of Sciences, Beijing
[3] School of Cyber Engineering, Xidian University, Xi'an
[4] School of Information Science and Engineering, Yanshan University, Qinhuangdao
[5] Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin
[6] National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing
基金
中国国家自然科学基金;
关键词
AI; Cloud computing; IoT security; Privacy; Ubiquitous computing; Ubiquitous operating system (UOS);
D O I
10.7544/issn1000-1239.20211248
中图分类号
学科分类号
摘要
With the development of ubiquitous computing technology and ubiquitous operating system (UOS), ubiquitous computing has become a hot research topic both in industry and academy. As classic ubiquitous computing scenarios, smart home, industrial Internet of things, self-driving, and cloud computing, have become increasingly prosperous, and their security issues have attracted the attention of researchers. Currently, as the related research on ubiquitous computing security is in its initial stage, there is still no general security methods that can solve the emerging security issues of ubiquitous computing. In this paper, we firstly review the current status of ubiquitous computing, UOS, and summarize its architecture. Then, we analyze and summarize the state-of-the-art research effort on ubiquitous computing security, and divide security issues into three major aspects: system security, device security and communication security. We discuss the security issues and related research effort in four classic ubiquitous computing scenarios. Through in-depth analysis of the shortcomings of existing research and the causes of security problem, we summarize eight key technical challenges and opportunities in ubiquitous computing security. Finally, we discuss every challenge, and point out the potential security research directions of ubiquitous computing in future. © 2022, Science Press. All right reserved.
引用
收藏
页码:1054 / 1081
页数:27
相关论文
共 192 条
  • [61] Murdock K, Oswald D, Garcia F D, Et al., Plundervolt: Software-based dault injection attacks against Intel SGX, Proc of 2020 IEEE Symp on Security and Privacy, pp. 1466-1482, (2020)
  • [62] Kocher P, Horn J, Fogh A, Et al., Spectre attacks: Exploiting speculative execution, Proc of 2019 IEEE Symp on Security and Privacy, pp. 1-19, (2019)
  • [63] Szefer J., Survey of microarchitectural side and covert channels, attacks, and defenses, Journal of Hardware and Systems Security, 3, 3, pp. 219-234, (2018)
  • [64] Liu Lijun, Wang Tao, Wang Xiaohan, Method of implanting hardware Trojan based on EHW in part of circuit, Journal of Electronic Testing, 37, 2, pp. 279-284, (2021)
  • [65] Mutlu O, Kim J S., Rowhammer: A retrospective, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 39, 8, pp. 1555-1571, (2019)
  • [66] Pinto S, Santos N., Demystifying arm TrustZone: A comprehensive survey, ACM Computing Surveys, 51, 6, pp. 1-36, (2019)
  • [67] Qiu Pengfei, Wang Dongsheng, Lyu Yongqiang, Et al., VoltJockey: Breaching TrustZone by software-controlled voltage manipulation over multi-core frequencies, Proc of the 2019 ACM SIGSAC Conf, pp. 195-209, (2019)
  • [68] Hu Wei, Althoff A, Ardeshiricham A, Et al., Towards property driven hardware security, Proc of the 17th Int Workshop on Microprocessor & SOC Test & Verification, pp. 51-56, (2016)
  • [69] Halderman J A, Schoen S D, Heninger N, Et al., Lest we remember: Cold-Boot attacks on encryption keys, Communications of the ACM, 52, 5, pp. 91-98, (2009)
  • [70] Kim Y, Daly R, Kim J, Et al., Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors, ACM SIGARCH Computer Architecture News, 42, 3, pp. 361-372, (2014)