Abstract
In Kurt Vonnegut’s eponymous novel, there is a moment when an adult demonstrates Cat’s Cradle, the art of making patterns with a loop of string held between two hands, to a small child. On dropping the string, the adult says “Look: no cat, no cradle”. The child is naturally dismayed.
In a sense, ubiquitous systems are as ephemeral as the Cat’s Cradle. The infrastructure to support them is as subtle, and complex, and the trust we have in them as fragile. This paper reveals the hidden problems in store for security in ubiquitous systems. A crucial aspect we wish to stress is that there is a phase change as one moves from classical distributed computing into this new environment: the mere shift in quantity of components is enough to lead to qualitative changes in aspects of security. Moreover, there are inherent qualitative shifts.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
BBC News. Evidence ‘proves Hamiltons innocent’, 2001. http://news.bbc.co.uk/l/hi/uk/1488859.stm.
BBC News. At a glance: Damilola CPS report’, 2002. http://news.bbc.co.uk/1/hi/uk/2558777.stm.
Jon Crowcroft, editor. Scalable Ubiquitous Computing Systems or just Ubiquitous Systems. http://www.nesc.ac.uk/esi/events/Grand_Challenges/proposals/US.pdf.
Dorothy Denning. Cryptography and Data Security. Addison-Wesley, 1982.
Simson Garfinkel. Database Nation. O’Reilly, 2000.
Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Ariadne: a secure on-demand routing protocol for ad hoc networks. In Proc. MOBICOM-02, pages 12–23, September 2002.
Adrian Perrig and J. D. Tygar. Secure Broadcast Communication In Wired and Wireless Networks. Kluwer, 2002.
Kasim Rehman, Frank Stajano, and George Coulouris. Interfacing with the Invisible Computer. In Proc. NordiCHI 2002, October 2002.
Karen Spärck Jones. Privacy: What’s Different now?, October 2002. British Academy Conversazione, http://www.cl.cam.ac.uk/users/ksj/privksjtext1.pdf.
Frank Stajano. Security for Ubiquitous Computing. John Wiley and Sons, February 2002.
Pablo Vidales and Frank Stajano. The Sentient Car: Context-Aware Automotive Telematics. In Proc. LBS-2002, September 2002.
Mark Weiser. The Computer for the Twenty-First Century. Scientific American, 265(3):94–104, September 1991.
Philip R. Zimmermann. Testimony of Philip R. Zimmermann to the Subcommittee on Science, Technology, and Space of the US Senate Committee on Commerce, Science, and Transportation, 26 June 1996.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Kluwer Academic Publishers
About this chapter
Cite this chapter
Stajano, F., Crowcroft, J. (2003). The Butt of the Iceberg: Hidden Security Problems of Ubiquitous Systems. In: Basten, T., Geilen, M., de Groot, H. (eds) Ambient Intelligence: Impact on Embedded Sytem Design. Springer, Boston, MA. https://doi.org/10.1007/0-306-48706-3_6
Download citation
DOI: https://doi.org/10.1007/0-306-48706-3_6
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4020-7668-8
Online ISBN: 978-0-306-48706-4
eBook Packages: Springer Book Archive