Abstract
One of the most important issues for ubiquitous computing is the problem of encrypting content in the devices, as the heterogeneity in the devices nature, capabilities, mobility and necessities make it very difficult to find a solution that may be applied to all of these devices for the encryption and decryption of data. Although this is an important issue in today’s computing, there are not proposals that suit the specific needs of the ubiquitous devices regarding power consumption and computing capabilities, as well as flexibility. In this paper we show how adaptative encryption is the base for encryption of the stored data in ubiquitous environments.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Argyroudis, P., Verma, R., Tewari, H., OḾahony, D.: Performance Analysis of Cryptographic Protocols on Handheld Devices. In: Proceedings of the Network Computing and Applications, pp. 169–174 (2004)
Bauer, M.: Designing and Using DMZ Networks to Protect Internet Servers. Linux Journal 17(83) (2001), http://www.linuxjournal.com/article/4415
Cheswick, W., Bellovin, S., Rubin, A.: Firewalls and Internet Security: Repelling the Wily Hacker, 2nd edn. Addison-Wesley, Reading (2003)
Hancock, B.: Mass Network Flooding Attacks (Distributed Denial of Service - DDoS) Surface in the Wild. Computers & Security 19(1), 6–7 (2000)
Izquierdo, A., Sierra, J.M., Torres, J.: On the implementation of security policies with adaptative encryption. Computer Communications 29(15), 2750–2758 (2006)
Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton, USA (1996)
Needham, R.: Denial of Service: An Example. Communications of the ACM archive 37(11), 42–46 (1994)
Rogaway, P., Bellare, M., Black, J.: OCB: A block-cipher mode of operation for efficient authenticated encryption. ACM Transactions on Information Systems Security 6(3), 365–403 (2003)
Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. J. Wiley & Sons, Chichester (1995)
Stajano, F.: The Resurrecting Duckling - What Next? In: Proceedings of the 8th International Workshop on Security Protocols, pp. 204–214 (2003)
Stajano, F.: The security challenges of ubiquitous computing. In: Proceedings of the 5th Cryptographic Hardware and Embedded Systems Conference (CHES), vol. 1 (2003)
Wong, D., Fuentes, H., Chan, A.: The Performance Measurement of Cryptographic Primitives on Palm Devices. In: Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC), pp. 92–101 (2001)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Izquierdo, A., Torres, J., Sierra, J.M., Carbonell, M. (2007). Using Adaptative Encryption for Ubiquitous Environments. In: Gervasi, O., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2007. ICCSA 2007. Lecture Notes in Computer Science, vol 4706. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74477-1_50
Download citation
DOI: https://doi.org/10.1007/978-3-540-74477-1_50
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74475-7
Online ISBN: 978-3-540-74477-1
eBook Packages: Computer ScienceComputer Science (R0)