Security for Ubiquitous Computing / Edition 1

Security for Ubiquitous Computing / Edition 1

by Frank Stajano
     
 

ISBN-10: 0470844930

ISBN-13: 9780470844939

Pub. Date: 04/11/2002

Publisher: Wiley

* Ubiquitous computing refers to computers embedded in everyday devices communicating with each other over ad-hoc wireless networks

• Focuses on two very hot topics: ad-hoc wireless networking and security

• Covers security issues for well-established and widely used technologies such as GSM, Bluetooth, and IP

• Presents a framework to make

Overview

* Ubiquitous computing refers to computers embedded in everyday devices communicating with each other over ad-hoc wireless networks

• Focuses on two very hot topics: ad-hoc wireless networking and security

• Covers security issues for well-established and widely used technologies such as GSM, Bluetooth, and IP

• Presents a framework to make sense of the many and varied issues at stake, a taxonomy of the major problems and in-depth discussion of some specific, cutting-edge solutions

• Includes a primer on security and the basics of cryptography

• Describes the security issues in "peer-to-peer networking," a new technology that is gaining prominence in the media with applications such as Napster and ICQ Chat

Product Details

ISBN-13:
9780470844939
Publisher:
Wiley
Publication date:
04/11/2002
Series:
Wiley Series on Communications Networking & Distributed Systems Series, #1
Edition description:
New Edition
Pages:
268
Product dimensions:
6.91(w) x 9.80(h) x 0.80(d)

Table of Contents

About the Author.

Forward.

Preface.

Acknowledgements.

Contact Information.

1. Introduction.

Scenario.

Essential terminology.

Problems.

Notation.

2. Ubiquitous computing.

Xerox PARC.

Norman's Invisible Computer.

MIT.

HP's Cooltown.

ORL/AT&T Labs Cambridge.

Security issues.

3. Computer security.

Confidentiality.

Integrity.

Availability.

Authentication.

Security policies.

4. Authentication.

New preconditions.

The Resurrecting Duckling security policy model.

The many ways of being a master.

5. Confidentiality.

Cryptographic primitives for peanut processors.

Personal privacy.

6. Integrity.

Message integrity.

Device integrity.

7. Availability.

Threats to the communications channel.

Threats to the battery energy.

Threats from mobile code.

8. Anonymity.

The Cocaine Auction Protocol.

The anonymity layer.

9. Conclusions.

Appendix A: A Short Primer on Functions.

Appendix B: Existing Network Security Solutions.

Annotated bibliography.

Index.

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >