Abstract
Purpose
Ever since Mark Weiser coined the term “ubiquitous computing” (ubicomp) in 1988, there has been a general interest in proposing various solutions that would support his vision. However, attacks targeting devices and services of a ubicomp environment have demonstrated not only different privacy issues, but also a risk of endangering user’s life (e.g. by modifying medical sensor readings). Thus, the aim of this paper is to provide a comprehensive overview of security challenges of ubicomp environments and the corresponding countermeasures proposed over the past decade.
Design/methodology/approach
The results of this paper are based on a literature review method originally used in evidence-based medicine called systematic literature review (SLR), which identifies, filters, classifies and summarizes the findings.
Findings
Starting from the bibliometric results that clearly show an increasing interest in the topic of ubicomp security worldwide, the findings reveal specific types of attacks and vulnerabilities that have motivated the research over the past decade. This review describes most commonly proposed countermeasures – context-aware access control and authentication mechanisms, cryptographic protocols that account for device’s resource constraints, privacy-preserving mechanisms, and trust mechanisms for wireless ad hoc and sensor networks.
Originality/value
To the best of our knowledge, this is the first SLR on security challenges in ubicomp. The findings should serve as a reference to an extensive list of scientific contributions, as well as a guiding point for the researchers’ novel to the security research in ubicomp.
Subject
General Computer Science,Theoretical Computer Science
Reference253 articles.
1. A new multiple service key management scheme for secure wireless mobile multicast;IEEE Transactions on Mobile Computing,2014
2. IMAPS: Imbricated authentication protocol suite for mobile users and groups,2009
3. A systematic review of search-based testing for non-functional system properties;Information and Software Technology,2009
4. A privacy-aware continuous authentication scheme for proximity-based access control,2013
5. Privacy challenges in context-sensitive access control for pervasive computing environment,2007
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. An optimized deep learning-based trust mechanism In VANET for selfish node detection;International Journal of Pervasive Computing and Communications;2021-12-31
2. Privacy and Security in Cognitive Cities: A Systematic Review;Applied Sciences;2021-05-14
3. A Systematic Review of Fairness in Artificial Intelligence Algorithms;Responsible AI and Analytics for an Ethical and Inclusive Digitized Society;2021
4. Cloud Computing With Kubernetes Cluster Elastic Scaling;Proceedings of the 3rd International Conference on Future Networks and Distributed Systems;2019-07