BOOK-CHAPTER

Security in Pervasive Computing

Abstract

Security requirements for pervasive computing environments are different from those in fixed networks. This is due to the intensity and complexity of the communication between the user and the infrastructure, the mobility of the user, and dynamic sharing of limited resources. As pervasive computing makes information access and processing easily available for everyone from anywhere at anytime, the close relationship between distributed systems and mobile computing with a pervasive infrastructure leads us to take a closer look at different types of vulnerabilities and attacks in such environments. Pervasive computing includes numerous, often transparent, computing devices that are frequently mobile or embedded in the environment, and are connected to an increasingly ubiquitous network structure. For example, when an organization employs pervasive computing, the environment becomes more knowledgeable about the users’ behavior and, hence, becomes more proactive with each individual user as time passes. Therefore, the user must be able to trust the environment and the environment must be confident of the user’s identity. This implies security is an important concern in the success of pervasive computing environments. In this chapter we evaluate the suitability of existing security methods for pervasive environments.

Keywords:
Ubiquitous computing Context-aware pervasive systems Computer science End-user computing Computer security Ubiquitous commerce Mobile computing Autonomic computing Utility computing Cloud computing security Cloud computing Human–computer interaction Computer network

Metrics

2
Cited By
0.27
FWCI (Field Weighted Citation Impact)
0
Refs
0.60
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Security and Verification in Computing
Physical Sciences →  Computer Science →  Artificial Intelligence
Distributed systems and fault tolerance
Physical Sciences →  Computer Science →  Computer Networks and Communications
Peer-to-Peer Network Technologies
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

BOOK-CHAPTER

Pervasive Computing Security

Giorgos KostopoulosParis KitsosOdysseas Koufopavlou

Wireless networks and mobile communications Year: 2008 Pages: 257-286
BOOK-CHAPTER

Pervasive Computing Security

Year: 2020 Pages: 1071-1071
BOOK

Security in Pervasive Computing

Lecture notes in computer science Year: 2004
BOOK-CHAPTER

Security in Pervasive Computing

Sajal K. DasAfrand AgahMohan Kumar

IGI Global eBooks Year: 2011 Pages: 421-440
BOOK-CHAPTER

Security in Pervasive Computing

Sunita PrasadRakesh Chouhan

IGI Global eBooks Year: 2011
© 2026 ScienceGate Book Chapters — All rights reserved.