Tailored Security and Safety for Pervasive Computing

  title={Tailored Security and Safety for Pervasive Computing},
  author={Erik-Oliver Blass and Martina Zitterbart},
Pervasive computing makes high demands on security: devices are seriously resource-restricted, communication takes place spontaneously, and adversaries might control some of the devices. We claim that 1.) today’s research, studying traditional security properties for pervasive computing, leads to inefficient, expensive, and unnecessary strong and unwanted security solutions. Instead, security solutions tailored to the demands of a user, the scenario, or the expected adversary are more promising… 
On the benefit of context-awareness for security mechanisms in LTE/EPS networks
This paper motivate the integration of a context-aware security controller into LTE/EPS networks to minimize the overall security cost and demonstrates that the gain that is achieved in terms of processing cost justify taking additional complexity to support adaptive security mechanisms.
Towards adaptive security mechanisms in 3GPP EPS/LTE networks
The preliminary findings suggest that activating security mechanisms only when needed results in a significantly lower security-related signaling load.
On the need for adaptive connectivity management in multi-access architectures
The need for a flexible connectivity management that optimizes network resource usage is highlighted and the security implementation in the EPS architecture is analyzed to lead to an interesting conclusion on the technical challenges related to the deployment of a flexible security management.


Wireless Sensor Network Security
This book provides a deep overview of the major security issues that any WSN designers have to face, and also gives a comprehensive guide of existing solutions and open problems.
A Conceptual Model for Analysis and Design of Tunable Security Services
A conceptual model for analysis and design of tunable security services is proposed and a high-level design methodology is presented that can be used to identify the most appropriate security configurations for a particular scenario.
A Framework for Probabilistic, Authentic Aggregation in Wireless Sensor Networks
The ESAWN framework is presented, a highly customizable protocol for secure in-network data aggregation that provides gracefully degrading security guarantees, in particular dataauthenticity, and can trade-off security against energy in a very fine-grained manner.
Battery power-aware encryption
A hardware/software set-up to measure the battery power consumption of encryption algorithms through real-life experimentation is introduced and mathematical models to capture the relationships between power consumption and security are proposed.
On the security of public key protocols
  • D. Dolev, A. Yao
  • Computer Science
    22nd Annual Symposium on Foundations of Computer Science (sfcs 1981)
  • 1981
Several models are formulated in which the security of protocols can be discussed precisely, and algorithms and characterizations that can be used to determine protocol security in these models are given.
Design and implementation of a tunable encryption service for networked applications
  • S. Lindskog, A. Brunstrom
  • Computer Science
    Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.
  • 2005
The proposed tunable encryption service is based on a selective encryption paradigm in which the applications can request a desired encryption level, but can be changed at any time during their lifetime.
Relaxed authenticity for data aggregation in wireless sensor networks
This work presents "ESAWN", a protocol that probabilistically relaxes authenticity in the presence of a fraction of compromised nodes, and presents MICA2-based simulation results, which indicate that even for high probabilities of authenticity and fraction of compromise, ESAWN is more energy-efficient compared to (100%-)secure but non-aggregating communication.
Quality of security service
It is shown how the range of service levels associated with these variables can support the provision of Quality of Security Service, whereby security is a constructive network management tool rather than a performance obstacle.
Toward a taxonomy and costing method for security services
  • C. Irvine, T. Levin
  • Computer Science
    Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99)
  • 1999
A preliminary security service taxonomy is defined and is used as a framework for defining the costs associated with network security services.
Vulnerabilities and Attacks in Wireless Sensor Networks
A generic adversary model is developed that allows to classify adversaries according to two dimensions of power: presence and intervention and provides a framework for realistic security analysis in wireless sensor networks.