Skip to main content

Security Issues for Pervasive Personalized Communication Systems

  • Conference paper
Security in Pervasive Computing (SPC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3450))

Included in the following conference series:

Abstract

Technological progress allows us to equip any mobile phone with new functionalities, such as storing personalized information about its owner and using the corresponding personal profile for enabling communication to persons whose mobile phones represent similar profiles. However, this raises very specific security issues, in particular relating to the use of Bluetooth technology. Herein we consider such scenarios and related problems in privacy and security matters. We analyze in which respect certain design approaches may fail or succeed at solving these problems. We concentrate on methods for designing the user-related part of the communication service appropriately in order to enhance confidentiality.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Brown, P., Burleson, W., Lamming, M., Rahlff, O.-W., Romano, G., Scholtz, J., Snowdon, D.: Context-awareness: some compelling applications. In: Proceedings of the 2nd International Symposium on Handheld and Ubiquitous Computing (2000)

    Google Scholar 

  2. Cybenko, G., Giani, A., Thompson, P.: Cognitive hacking: A battle for the mind. IEEE Computer 35(8), 50–56 (2002)

    Google Scholar 

  3. Ferscha, A., Hechinger, M., Mayrhofer, R., Rocha, M.d.S., Franz, M., Oberhauser, R.: Digital aura. In: Ferscha, A., Mattern, F. (eds.) PERVASIVE 2004. LNCS, vol. 3001. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  4. Ferscha, A., Hechinger, M., Mayrhofer, R., Oberhauser, R.: A light-weight component model for peer-to-peer applications. In: Proceedings of the 24th International Conference on Distributed Computing Systems Workshops, pp. 520–527. IEEE Computer Society, Los Alamitos (2004)

    Chapter  Google Scholar 

  5. Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.): Security in Pervasive Computing (revised papers). LNCS, vol. 2802. Springer, Heidelberg (2004)

    MATH  Google Scholar 

  6. Klein, B., Agne, S., Ebert, A., Bender, M.: Enabling flow: A paradigm for document-centered personal information spaces. In: Proceedings of the 8th IASTED International Conference on Artificial Intelligence and Soft Computing (2004)

    Google Scholar 

  7. Kvarnström, H., Hedbom, H., Jonsson, E.: Protecting security policies in ubiquitous environments using one-way functions. In: Hutter et al.[5], pp. 71–85

    Google Scholar 

  8. PAMPAS consortium and constituency. Deliverable D04: Final roadmap (extended version). Technical Report IST-201-37763, PAMPAS consortium (2004)

    Google Scholar 

  9. Robinson, P., Beigl, M.: Trust context spaces: An infrastructure for pervasive security in context-aware environments. In: Hutter et al.[5],pp. 157–172

    Google Scholar 

  10. Smith, I., LaMarca, A., Consolvo, S., Dourish, P.: A social approach to privacy in location-enhanced computing. In: Proceedings of the Workshop on Security and Privacy in Pervasive Computing (2004)

    Google Scholar 

  11. Weiser, M., Gold, R., Brown, J.S.: The origins of ubiquitous computing research at PARC in the late 1980s. IBM Systems Journal 38(4), 693–696 (1999)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Klein, B., Miller, T., Zilles, S. (2005). Security Issues for Pervasive Personalized Communication Systems. In: Hutter, D., Ullmann, M. (eds) Security in Pervasive Computing. SPC 2005. Lecture Notes in Computer Science, vol 3450. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-32004-3_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-32004-3_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25521-5

  • Online ISBN: 978-3-540-32004-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics