Security in Pervasive Computing

Given the continuing technical progress in computing and communication, it seems that we are heading towards an all-encompassing use of networks and computing power, a new era commonly termed “Pervasive Computing”. Its vision is grounded in the firm belief amongst the scientific community that Moore’s Law (i.e. the observation that the computer power available on a chip approximately doubles every eighteen months) will hold true for at least another 10 years. This means that in the next few years, microprocessors will become so small and inexpensive that they can be embedded in almost everything – not only electrical devices, cars, household appliances, toys, and tools, but also such mundane things as pencils (e.g. to digitize everything we draw) and clothes. All these devices will be interwoven and connected together by wireless networks. In fact, technology is expected to make further dramatic improvements, which means that eventually billions of tiny and mobile processors will occupy the environment and be incorporated into many objects of the physical world. Together with powerful and cheap sensors (and thus the ability to sense the environment), this progress in processor and communication technology will render everyday objects “smart” – they know where they are, and they may adapt to the environment and provide useful services in addition to their original purpose. These smart objects may form spontaneous networks, giving rise to a world-wide distributed system several orders of magnitude larger than today’s Internet. It is clear that we are moving only gradually towards the ultimate vision of Pervasive Computing. Much progress in computer science, communication engineering, and material science is necessary to render the vision economically feasible and to overcome current technological hurdles. However, the prospects of a world of things that virtually talk to each other are fascinating: many new services would then be possible that transform the huge amount of information gathered by the smart devices into value for the human user, and an entire industry may be set up to establish and run the underlying infrastructure for the smart and networked objects. Clearly, there are also many issues on the political, legal, and social level to consider. Privacy is certainly a primary concern when devices or smart everyday objects can be localized and traced, and when various objects we use daily report their state and sensor information to other objects. The repercussions of such an extensive integration of computer technology into our everyday lives as Pervasive Computing advocates it, are difficult to predict and only time will tell whether this technology does contribute to a better and more enjoyable world or, on the contrary, promote a more totalitarian regime. D. Hutter et al. (Eds.): Security in Pervasive Computing 2003, LNCS 2802, p. 1, 2004. c © Springer-Verlag Berlin Heidelberg 2004 Cyber Assist Project and Its Security Requirement (Abstract of Invited Talk)

[1]  Joachim Biskup,et al.  Confidentiality Policies and Their Enforcement for Controlled Query Evaluation , 2002, ESORICS.

[2]  Dieter Hutter,et al.  Informationsflusskontrolle als Grundlage für die Sicherheit von Multi-Agenten-Systemen , 2003, PIK Prax. Informationsverarbeitung Kommun..

[3]  Heiko Mantel,et al.  Unwinding Possibilistic Security Properties , 2000, ESORICS.

[4]  Helmut Reiser,et al.  Security requirements for management systems using mobile agents , 2000, Proceedings ISCC 2000. Fifth IEEE Symposium on Computers and Communications.

[5]  Heiko Mantel,et al.  A generic approach to the security of multi-threaded programs , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..

[6]  Robert B. Ross,et al.  Secure Agent Programs , 2000 .

[7]  Ina Schaefer Secure mobile multiagent systems in virtual marketplaces : a case study on comparison shopping , 2002 .

[8]  Heiko Mantel,et al.  Possibilistic definitions of security-an assembly kit , 2000, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13.

[9]  Heiko Mantel,et al.  On the composition of secure systems , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.