Dissertation > Excellent graduate degree dissertation topics show

Research on Security Technology of Pervasive Computing

Author: LiQingYu
Tutor: HouZiFeng
School: Institute of Computing Technology
Course: Computer System Architecture
Keywords: Pervasive/Ubiquitous Computing Context-Awareness Entity Authentication Context-Aware Entity Authentication Multi-attribute Authentication Security Context Context-Aware Security Architecture Context Vector Model
CLC: TP309
Type: PhD thesis
Year: 2004
Downloads: 347
Quote: 3
Read: Download Dissertation


Pervasive computing environments with their interconnected devices and services promise seamless integration of digital infrastructure into our everyday lives and work. While the focus of current research is on how to connect new devices and build useful applications to improve functionality, the security and privacy issues in such environments have not been explored in any depth. Existing security policies and mechanisms may not provide adequate guarantees to deal with new exposures and vulnerabilities introduced by the pervasive computing paradigm. In this paper, we explore the technological challenges for building security and privacy into the pervasive computing environments, concentrate mainly on anatomizing the limitations of the traditional entity authentication mechanisms, put forward and describe the principle and prototype implementation of the entity authentication appropriate for the pervasive computing. The main contributions of this paper are as follows.(1) To anatomize deeply and thoroughly the limitations and deficiencies of the traditional entity authentications. The conventional entity authentications need some basic assumptions and features, but these assumptions and features are no longer suitable for the pervasive computing. And they depend on the trust of the entities and the support of the trusted third party to carry out the identity identification. Furthermore, entity authentication requires a binding between a principal, and more precisely the identity of a principal and some information and there must be assurance that this binding is correct. Finally, an obvious feature of entity authentication is the essentially static and binary nature of the assurance it delivers.(2) To put forward multi-attribute and context-aware entity authentications based on the aforementioned analysis. Multi-attribute authentication breaks through the limitation of the traditional entity authentication in which only the identity is authenticated, and allows various attributes of the entity such as identity, roles, location, current social relationships to partake in the process of the authentication, different attributes with diverse confidence values. More attributes can be authenticated together; so much higher confidence value is achieved. Context-aware entity authentication makes extensive use of the context information sensed by the pervasive computing environments, like user context, time context or computing context to identify the entity.(3) To summarize the type of the context in the pervasive computing environments and propose the concept of the“security context”. Security context has the general and special notions, and its special notion means a set of information collected from the pervasive computing environments and that is relevant to the security infrastructure of pervasive computing, determining and affecting the security level, authentication mechanisms, access

Related Dissertations

  1. Research on a Lightweight Context-Aware Software Architecture,TP311.52
  2. Research on Service Context Awareness and Adaptation in Virtual Home Environment,TN929.5
  3. Research on the Wireless Sensor Network Based Activity Recognition and Object Localization,TN929.5
  4. Research on Adaptive User Interface Design for Mobile Device Based on Context-Awareness,TN929.53
  5. Research on Some Key Issues in Context-Aware Computing,TP391.1
  6. Context and Middle School Chinese Language Teaching,G633.3
  7. L2 Acquisition of Pragmatic Routine Formulae by Chinese Efl Students,H319
  8. Study of Green Construction Context-Awareness System Based on Ontology,TP391.1
  9. Exploring Mobile Social Network Services for Tourists Based on Context-awareness,TN929.53
  10. Research on Context Modeling and Reasoning in Ubiquitous Learning Environment,N945.12
  11. Special items based on environment -aware storage management system design and implementation,TP311.52
  12. Design and implementation of electronic document access control model,TP393.08
  13. Research on Personalized Rule Generation and Application of Multi-Agent Technology in Smart Home,TP18
  14. Research on Context Reasoning and Inconsistency Detection in Pervasive Computing,TP391.1
  15. Research and Design of Single Sign-On in Multi-domain System,TP393.08
  16. Research of Authentication Protocols and Their Formalized Analysis,TP393.04
  17. Improvement and Implementation of Web Services Session Entity Authentication Protocol,TP393.09
  18. Study on the Spatial-temporal Changes of Eco-security Assessment Based on GIS and RS,X826
  19. Active Access Control Model for Pervasive Computing,TP309
  20. Design and Implementation of Windows Kernel-mode Cryptographic Service Interface,TP309.7
  21. The Design and Implementation of Security Mechanism of Embedded Dependable Computer,TP309

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > General issues > Security and confidentiality
© 2012 www.DissertationTopic.Net  Mobile