A decade of security research in ubiquitous computing: results of a systematic literature review

Author:

Kusen Ema,Strembeck Mark

Abstract

Purpose Ever since Mark Weiser coined the term “ubiquitous computing” (ubicomp) in 1988, there has been a general interest in proposing various solutions that would support his vision. However, attacks targeting devices and services of a ubicomp environment have demonstrated not only different privacy issues, but also a risk of endangering user’s life (e.g. by modifying medical sensor readings). Thus, the aim of this paper is to provide a comprehensive overview of security challenges of ubicomp environments and the corresponding countermeasures proposed over the past decade. Design/methodology/approach The results of this paper are based on a literature review method originally used in evidence-based medicine called systematic literature review (SLR), which identifies, filters, classifies and summarizes the findings. Findings Starting from the bibliometric results that clearly show an increasing interest in the topic of ubicomp security worldwide, the findings reveal specific types of attacks and vulnerabilities that have motivated the research over the past decade. This review describes most commonly proposed countermeasures – context-aware access control and authentication mechanisms, cryptographic protocols that account for device’s resource constraints, privacy-preserving mechanisms, and trust mechanisms for wireless ad hoc and sensor networks. Originality/value To the best of our knowledge, this is the first SLR on security challenges in ubicomp. The findings should serve as a reference to an extensive list of scientific contributions, as well as a guiding point for the researchers’ novel to the security research in ubicomp.

Publisher

Emerald

Subject

General Computer Science,Theoretical Computer Science

Reference253 articles.

1. A new multiple service key management scheme for secure wireless mobile multicast;IEEE Transactions on Mobile Computing,2014

2. IMAPS: Imbricated authentication protocol suite for mobile users and groups,2009

3. A systematic review of search-based testing for non-functional system properties;Information and Software Technology,2009

4. A privacy-aware continuous authentication scheme for proximity-based access control,2013

5. Privacy challenges in context-sensitive access control for pervasive computing environment,2007

Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. An optimized deep learning-based trust mechanism In VANET for selfish node detection;International Journal of Pervasive Computing and Communications;2021-12-31

2. Privacy and Security in Cognitive Cities: A Systematic Review;Applied Sciences;2021-05-14

3. A Systematic Review of Fairness in Artificial Intelligence Algorithms;Responsible AI and Analytics for an Ethical and Inclusive Digitized Society;2021

4. Cloud Computing With Kubernetes Cluster Elastic Scaling;Proceedings of the 3rd International Conference on Future Networks and Distributed Systems;2019-07

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3