Abstract
For the emerging ambient environments, in which interconnected intelligent devices will surround us to increase the comfort of our lives, fault tolerance and security are of paramount importance. In contrast to the computers in a normal distributed system, ambient devices are generally small (meaning they have little computing power or memory space), often battery operated and interconnected much more dynamically. In this paper we discuss the fundamental research issues that emerge while designing the distributed algorithms for such ambient systems that must be both fault tolerant and secure.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35691-4_52
Chapter PDF
Similar content being viewed by others
Keywords
References
Albitz, P., and Lw, C. DNS and BIND. O’Reilly & Assoc., Inc., 2001.
AH93] Anagnostou, E., and Hadzlacos, V. Tolerating transient and permanent failures. In 7rh WDAG (Lausanne, Switzerland, 1993), A. Schiper (Ed.), LNCS 725, Springer-Verlag, pp. 174–188.
Anonymous. Embedded systems. Crypto-gram, December 15, 2002.
Bellare, M. Practice-oriented provable-security. In Proceedings of First International Workshop on Information Security (1SW 971998), E. Okamoto, G. Davida, and M. Mambo (Eds.), LNCS 1396, Springer, Berlin.
Dijkstra, E. W. Self-stabilizing systems in spite of distributed control. Comm. ACM 17, 1 I (1974), 643 – 644.
Dolev, D., and Strong, H. R. Authenticated algorithms for byzantine agreement. SIAM J. Comput. 12, 4 (1983), 656 – 666.
Eastlake, D. Domain name system security extensions. Tech. Rep. RFC 2535, IETF, 1999.
Elder, M. Fault Tolerance in Critical Information Systems. PhD thesis, Department of Computer Science, University of Virginia, 2001.
Etalle, S., Hoepman, J.-H., Lubber, J. C. A. VAN DER, Verschuren, J. H. S., and Huizenga, J. PAW: Privacy in an Ambient World. GENCOM project proposal, 2002.
Gieren, R. Chain of trust: The parent-child and keyholder-keysigner relations and their communication in dnssec. Tech. Rep. CSI-ROI 11, University of Nijmegen, The Netherlands, 2001.
Goldreich, O. On the foundations of modern cryptography. In CRYPTO ‘97 (Santa Barbara, CA, USA, 1997), B. S. K. Jr. (Ed.), LNCS 1294, Springer.
Hoepman, J.-H., Papatriantafilou, M., AND Tsigas, P. Selfstabilization of wait-free shared memory objects. J. Parallel & Distt: Comput. 62, 5 (2002), 766 – 791.
Horn, P. Autonomic Computing. IBM Corp., 2001.
Lamport, L., Shostak, R., and Pease, M. The byzantine generals problem. ACM Trans. Prog. Lang. & Syst. 4, 3 (1982), 382 – 401.
Li, M., And Vitanyi, P. M. B. Theory of thermodynamics of computation. In PROC. IEEE Phys. of Comput. Workshop ( Dallas, TX, USA, 1992 ), pp. 42 – 46.
Meadows, C., And Mclean, J. Security and dependability: then and now. In Computer Security, Dependability, and Assurance: From Needs to Solutions, 79 July 1998 & 11–13 November 1998, York, UK & Williamsburg, VA, USA (1999), Los Alamitos, CA, USA: IEEE Comput. Soc, 1999, pp. 166 – 70.
Critical foundations: Protecting America’s infrastructure. Report of the President’s Commission on Critical Infrastructure Protection, 1997.
Rabin, M. O. Randomized byzantine generals. In 24rd FOCS (Tucson, AZ, USA, 1983 ), IEEE Comp. Soc. Press, pp. 403 – 409.
The priorities of the sixth framework programme 2002-2006. RTD Info, DG Research, European Commission, 2002.
SMF+02] S’faddon, J., Miner, S., Franklin, M., Balfanz, D., Malkin, M., and Dean, D. Self-healing key distribution with revocation. In IEEE Security & Privacy (Berkeley, CA, USA, 2002), IEEE, pp. 241–257.
Wood, A. D., and Stankovic, J. A. Denial of service in sensor networks. IEEE Comput. (2002), 54 – 62.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 IFIP International Federation for Information Processing
About this paper
Cite this paper
Hoepman, JH. (2003). Security, Fault-Tolerance and Their Verification for Ambient Systems. In: Gritzalis, D., De Capitani di Vimercati, S., Samarati, P., Katsikas, S. (eds) Security and Privacy in the Age of Uncertainty. SEC 2003. IFIP — The International Federation for Information Processing, vol 122. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35691-4_43
Download citation
DOI: https://doi.org/10.1007/978-0-387-35691-4_43
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-6489-5
Online ISBN: 978-0-387-35691-4
eBook Packages: Springer Book Archive