You are on page 1of 1

1-18

Pervasive Communications Handbook

delegation was being investigated in better ways to bootstrap so that Grey will be
more useful, even for a small population.
One of the objectives of this trial deployment was to study the types of accesscontrol policies users would create when no longer constrained by the limitations
imposed by difficult-to-obtain physical keys. It is observed that the users creating
policies that did not mirror the policies they had with physical keys, and it is found
that the low overhead for creating and changing policies with Grey encourages
policy change and the creation of policies that better fit the users needs.
Finally, it is surprised for some of the unanticipated uses that the users made of
the Grey system. For example, some of the users routinely use Grey to unlock
doors without having to get out of their chairs. It would not have probably discovered without a field study.

1.5 Conclusion
In this chapter, we have discussed the state of the art of privacy and security for pervasive communication. To determine the security and privacy for pervasive communication, related parameters are determined. Finally, two different existing solutions are
discussed targeting different pervasive environments.

References





1. SPPC: Workshop on Security and Privacy in Pervasive Computing, 2004.


2. http://www.atp.nist.gov/iteo/pervasive.htm.
3. http://www.computer.org/portal/web/csdl/doi/10.1109/MPRV.2007.86.
4. http://portal.acm.org/citation.cfm?id=1335023.
5. Rahman, Sk. Md. M., Inomata, A., Mambo, M., and Okamoto, E., Anonymous
On-Demand Position-based Routing in Mobile Ad-hoc Networks, IPSJ (Information
Processing Society of Japan) Journal, 2006; 47(8): 23962408.
6. Hu, Y. C., Perrig, A., Johnson, D. B., Packet leashes, A defense against wormhole
attacks in wireless ad hoc networks, in Proceedings of the 22nd Annual Joint
Conference of the IEEE Computer and Communications Societies (INFOCOM 2003),
San Francisco, March 30April 3, 2003.
7. Rahman, Sk. Md. M., Mambo, M., Inomata, A., and Okamoto, E., An anonymous
on-demand position-based routing in mobile ad hoc networks, in Proceedings of The
2006 Symposium on Applications & the Internet (SAINT-2006), Mesa/Phoenix, AZ,
IEEE Computer Society Order Number P2508, Library of Congress Number
2005937742, ISBN 0-7695-2508-3, pp. 300306, January 2327, 2006.
8. Wu, X, DISPOSER: distributed secure position service in mobile ad hoc networks.
Technical Report CSD TR #04-027, Dept. Computer Sciences, 2004.
9. Xue, Y., Li, B., and Nahrstedt, K., A scalable location management scheme in mobile
ad-hoc networks, in Proceedings of the 26th IEEE Annual Conference on Local
Computer Networks (LCN 2001), Tampa, FL, November 2001, pp. 102111.

You might also like