Trust, security and privacy for pervasive applications
2013, The Journal of Supercomputing
https://doi.org/10.1007/S11227-013-0953-4Abstract
Pervasive computing, or ubiquitous computing, has evolved into an active research area, as a result of the tremendous advances in a broad range of technologies, including wireless networking, mobile and distributed computing, sensor systems, RFID technology, etc. Pervasive computing, which enables users to obtain information and services anytime and anywhere, could have a wide range of applications, such as healthcare, homecare, intelligent transportation, and environmental monitoring. However, it is quite difficult for pervasive applications to satisfy trust, security and privacy requirements, due to their ability to gather sensitive information and change the environment via actuating devices autonomously. This special section aims at presenting a collection of high quality research papers that report the latest research achievements in trust, security and privacy for pervasive applications, and providing a forum to present and discuss emerging ideas and trends in this highly challenging field. In this special section, we selected 8 papers out of 37 total submissions, which demonstrate some novel works in this field. A detailed overview of the selected works is given below. The first paper, "A Holistic Approach Examining RFID Design for Security and Privacy," [1] presents a holistic approach to ensure security and privacy for Radio
References (8)
- Good T, Benaissa M (2010) A holistic approach examining RFID design for security and privacy. J Supercomput. doi:10.1007/s11227-010-0497-9
- Zeng Y, Cao J, Hong J, Zhang S, Xie L (2010) Secure localization and location verification in wireless sensor networks: a survey. J Supercomput. doi:10.1007/s11227-010-0501-4
- Li R, Li J (2010) Requirements and design for neutral trust management framework in unstructured networks. J Supercomput. doi:10.1007/s11227-010-0502-3
- Pongaliur K, Xiao L, Liu AX (2010) Dynamic camouflage event based malicious node detection archi- tecture. J Supercomput. doi:10.1007/s11227-010-0508-x
- Wang F, Wang FR, Huang B, Yang LT (2011) ADVS: a reputation-based model on filtering SPIT over P2P-VoIP networks. J Supercomput. doi:10.1007/s11227-010-0545-5
- Qi F, Tang Z, Wang G, Wu J (2011) User requirements-aware security ranking in SSL protocol. J Su- percomput. doi:10.1007/s11227-010-0546-4
- Prathapani A, Santhanam L, Agrawal DP (2011) Detection of blackhole attack in a wireless mesh network using intelligent honeypot agents. J Supercomput. doi:10.1007/s11227-010-0547-3
- Zhao H, Li X (2011) VectorTrust: trust vector aggregation scheme for trust management in peer-to-peer networks. J Supercomput. doi:10.1007/s11227-011-0576-6