Skip to main content

The Butt of the Iceberg: Hidden Security Problems of Ubiquitous Systems

  • Chapter
Ambient Intelligence: Impact on Embedded Sytem Design

Abstract

In Kurt Vonnegut’s eponymous novel, there is a moment when an adult demonstrates Cat’s Cradle, the art of making patterns with a loop of string held between two hands, to a small child. On dropping the string, the adult says “Look: no cat, no cradle”. The child is naturally dismayed.

In a sense, ubiquitous systems are as ephemeral as the Cat’s Cradle. The infrastructure to support them is as subtle, and complex, and the trust we have in them as fragile. This paper reveals the hidden problems in store for security in ubiquitous systems. A crucial aspect we wish to stress is that there is a phase change as one moves from classical distributed computing into this new environment: the mere shift in quantity of components is enough to lead to qualitative changes in aspects of security. Moreover, there are inherent qualitative shifts.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. BBC News. Evidence ‘proves Hamiltons innocent’, 2001. http://news.bbc.co.uk/l/hi/uk/1488859.stm.

  2. BBC News. At a glance: Damilola CPS report’, 2002. http://news.bbc.co.uk/1/hi/uk/2558777.stm.

  3. Jon Crowcroft, editor. Scalable Ubiquitous Computing Systems or just Ubiquitous Systems. http://www.nesc.ac.uk/esi/events/Grand_Challenges/proposals/US.pdf.

  4. Dorothy Denning. Cryptography and Data Security. Addison-Wesley, 1982.

    Google Scholar 

  5. Simson Garfinkel. Database Nation. O’Reilly, 2000.

    Google Scholar 

  6. Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Ariadne: a secure on-demand routing protocol for ad hoc networks. In Proc. MOBICOM-02, pages 12–23, September 2002.

    Google Scholar 

  7. Adrian Perrig and J. D. Tygar. Secure Broadcast Communication In Wired and Wireless Networks. Kluwer, 2002.

    Google Scholar 

  8. Kasim Rehman, Frank Stajano, and George Coulouris. Interfacing with the Invisible Computer. In Proc. NordiCHI 2002, October 2002.

    Google Scholar 

  9. Karen Spärck Jones. Privacy: What’s Different now?, October 2002. British Academy Conversazione, http://www.cl.cam.ac.uk/users/ksj/privksjtext1.pdf.

  10. Frank Stajano. Security for Ubiquitous Computing. John Wiley and Sons, February 2002.

    Google Scholar 

  11. Pablo Vidales and Frank Stajano. The Sentient Car: Context-Aware Automotive Telematics. In Proc. LBS-2002, September 2002.

    Google Scholar 

  12. Mark Weiser. The Computer for the Twenty-First Century. Scientific American, 265(3):94–104, September 1991.

    Google Scholar 

  13. Philip R. Zimmermann. Testimony of Philip R. Zimmermann to the Subcommittee on Science, Technology, and Space of the US Senate Committee on Commerce, Science, and Transportation, 26 June 1996.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Kluwer Academic Publishers

About this chapter

Cite this chapter

Stajano, F., Crowcroft, J. (2003). The Butt of the Iceberg: Hidden Security Problems of Ubiquitous Systems. In: Basten, T., Geilen, M., de Groot, H. (eds) Ambient Intelligence: Impact on Embedded Sytem Design. Springer, Boston, MA. https://doi.org/10.1007/0-306-48706-3_6

Download citation

  • DOI: https://doi.org/10.1007/0-306-48706-3_6

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4020-7668-8

  • Online ISBN: 978-0-306-48706-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics