1 Secure Smart Environments: egis Requirements, Challenges and Experiences in permeative Computing Jun Wangâ , Yaling Yangâ¡ and William Yurcikâ â NCSA, University of Illinois at Urbana-Champaign, {wangj, byurcik}@ncsa.uiuc.edu â¡ Computer Science Department, University of Illinois at Urbana-Champaign, yyang8@uiuc.edu I. I NTRODUCTION In an ensample permeative reckoning environment, a wide-ranging number of machine-accessible adroit devices are deployed to collaboratively provision broadloom services to users. Pervasive figure is enabled by various forward-loo consanguineousg technologies, particularly radiocommunication technologies and the Internet. It has turn a trend for our rising lives. A permeative compute environment give the chop be extremely heterogeneous. We burn down imagine how many diametrical devices are involved in a tonic kin: TVs, phones, cameras, coffee makers, or jog books and bookshelves. Since these devices are smart and reveal with each other to begin with via wireless links, security mustiness be ensured. Otherwise, the smart devices deployed near us would come O.K. to hunt us and the growth would be catastrophic. In this squeeze we brie?y discuss a couple of(prenominal) important security issues in permeant computation. II.
S ECURITY C HALLENGES AND R EQUIREMENTS IN P ERVASIVE C OMPUTING : T HE B IG P ICTURE Due to the very lofty heterogeneity and complexity of pervasive computing, there are unparalleled challenges and requirements for security insurance in a pervasive computing environment. Figure 1 shows a brief connection of these challenges and requirements. Fig. 1. security measure issues in pervasive computing Firstly, the scalability is a big challenge. Since a pervasive computing environment, such as a smart base of operations or a smart of?ce, may consist of rough-cut bantam smart devices that buy the farm with each other via wireless or wired links, to win information security surety (e.g., authentication, data encryption, access control, etc.) is non a trivial task, in particular when the resources of such tiny devices are...If you want to get a amply essay, order it on our website: Ordercustompaper.com
If you want to get a full essay, wisit our page: write my paper
No comments:
Post a Comment