Security, Privacy and Trust Issues in Smart Environments

  title={Security, Privacy and Trust Issues in Smart Environments},
  author={Paddy Nixon and Waleed Wagealla and Colin English and Sotirios Terzis},
Recent advances in networking, handheld computing and sensor technologies have driven forward research towards the realisation of Mark Weiser’s dream of calm and ubiquitous computing (variously called pervasive computing, ambient computing, active spaces, the disappearing computer or context-aware computing). In turn, this has led to the emergence of smart environments as one significant facet of research in this domain. 

Figures from this paper

Security issues with pervasive computing frameworks

This work examines the general issues inherent in any pervasive computing system, focusing on the hazards that emerge from the interactions between different forms of context, and applies this analysis to one particular context-aware infrastructure.

Security and trust assurances for smart environments

  • S. NaqviM. Riguidel
  • Computer Science
    IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.
  • 2005
This paper provides the details of the concepts of Infospheres and security domains which lead to the phenomenon of virtualization of security services and proposes virtual-to-virtual (V2V) paradigm to solve the security and trust problems of the smart environments.

Enabling Privacy in Pervasive Computing Using Fusion of Privacy Negotiation, Identity Management and Trust Management Techniques

This paper presents conceptual privacy enabling architecture of infrastructural pervasive middleware that uses trust management, privacy negotiation and identity management during the inter-entity communication lifecycle.

Privacy in the Age of Transparency

The present-day privacy legislation has several weaknesses if confronted with the AmI environment that could lead to the need for new principles on which to base new regulations, to take account of the changed context.

Multiple trusted devices authentication protocol for ubiquitous computing applications

A new authentication protocol which employs multiple trusted devices to validate other device's identity is introduced and it is hoped that by implementing the proposed protocol, the integrity of the entities involved in a ubiquitous computing applications can be increased.

Life-logging in smart environments: Challenges and security threats

The purpose of this paper is to detail current topics of life-logging in smart environments while describing interconnection issues, security threats and suggesting a lightweight framework for ensuring security, privacy and trustworthy life- Logging.

Capacity and Service (CapServ) Adaptive Trust Computation by Territory Formation in Ubiquitous Environment

  • B. AdithyaB. Babu
  • Computer Science, Business
    Int. J. Adv. Pervasive Ubiquitous Comput.
  • 2012
The authors proposed model for trust worthy communications among devices of various networks in a ubiquitous environment with varied service needs, security needs and computational-storage capacities using a novel approach for computing trust-adaptive to capacity and services.

Security and privacy challenges in industrial Internet of Things

This paper gives an introduction to industrial IoT systems, the related security and privacy challenges, and an outlook on possible solutions towards a holistic security framework for Industrial IoT systems.

Providing a new authentication tool for dependant people in pervasive environments

  • A. MhamedM. Mokhtari
  • Computer Science
    2006 2nd International Conference on Information & Communication Technologies
  • 2006
An overview of security requirements for smart environments which have been recently studied are given to better show the lack of security services for elderly and handicapped users.



Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments

The issue in the broad area of security for Pervasive Computing is maintaining trust in an interactive environment and the solution presented requires an infrastructure of pervasive and context sensing technology to provide entity mapping, policy and trust management services.

Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems

Six principles for guiding system design are developed, based on a set of fair information practices common in most privacy legislation in use today: notice, choice and consent, proximity and locality, anonymity and pseudonymity, security, and access and recourse.

Towards Security and Privacy for Pervasive Computing

The challenges for building security and privacy into pervasive computing environments are explored, a prototype implementation that addresses some of these issues is described, and some directions for future work are proposed.

A Privacy Awareness System for Ubiquitous Computing Environments

This work introduces a privacy awareness system targeted at ubiquitous computing environments that allows data collectors to both announce and implement data usage policies, as well as providing data subjects with technical means to keep track of their personal information as it is stored, used, and possibly removed from the system.

Securing context-aware applications using environment roles

By introducing environment roles, this work creates a uniform access control framework that can be used to secure context-aware applications and presents a security architecture that supports security policies that make use of environment roles to control access to resources.

Using Trust for Secure Collaboration in Uncertain Environments

The SECURE project investigates the design of security mechanisms for pervasive computing based on trust. It addresses how entities in unfamiliar pervasive computing environments can overcome initial

A Security Architecture Based on Trust Management for Pervasive Computing Systems

An infrastructure that complements existing security features like Public Key Infrastructure (PKI) and Role Based Access Control with distributed trust management to provide a highly flexible mode of enforcing security in a pervasive computing environments is presented.

Managing Interactions in Smart Environments

This position paper proposes ten dimensions along which this intelligence behind ubiquitous computing might be described, which can be summarized as meaningfulness, world modeling, user modeling, distribution, accessibility, extensibility, heterogeneity, automation, usability, and ubiquity.

Security for Ubiquitous Computing

Ubiquitous computing, over a decade in the making, has finally graduated from whacky buzzword through fashionable research topic to something that is definitely and inevitably happening: changes of the same magnitude and scope as those brought about by the World Wide Web.

The Role of Trust Management in Distributed Systems Security

The concept of trust management is introduced, its basic principles are explained, and some existing trust-management engines are described, including PoHcyMaker and KeyNote, which allow for increased flexibility and expressibility, as well as standardization of modern, scalable security mechanisms.