Skip to main content

Using Adaptative Encryption for Ubiquitous Environments

  • Conference paper
  • 2001 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4706))

Abstract

One of the most important issues for ubiquitous computing is the problem of encrypting content in the devices, as the heterogeneity in the devices nature, capabilities, mobility and necessities make it very difficult to find a solution that may be applied to all of these devices for the encryption and decryption of data. Although this is an important issue in today’s computing, there are not proposals that suit the specific needs of the ubiquitous devices regarding power consumption and computing capabilities, as well as flexibility. In this paper we show how adaptative encryption is the base for encryption of the stored data in ubiquitous environments.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Argyroudis, P., Verma, R., Tewari, H., OḾahony, D.: Performance Analysis of Cryptographic Protocols on Handheld Devices. In: Proceedings of the Network Computing and Applications, pp. 169–174 (2004)

    Google Scholar 

  2. Bauer, M.: Designing and Using DMZ Networks to Protect Internet Servers. Linux Journal 17(83) (2001), http://www.linuxjournal.com/article/4415

  3. Cheswick, W., Bellovin, S., Rubin, A.: Firewalls and Internet Security: Repelling the Wily Hacker, 2nd edn. Addison-Wesley, Reading (2003)

    Google Scholar 

  4. Hancock, B.: Mass Network Flooding Attacks (Distributed Denial of Service - DDoS) Surface in the Wild. Computers & Security 19(1), 6–7 (2000)

    Article  Google Scholar 

  5. Izquierdo, A., Sierra, J.M., Torres, J.: On the implementation of security policies with adaptative encryption. Computer Communications 29(15), 2750–2758 (2006)

    Article  Google Scholar 

  6. Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton, USA (1996)

    Google Scholar 

  7. Needham, R.: Denial of Service: An Example. Communications of the ACM archive 37(11), 42–46 (1994)

    Article  Google Scholar 

  8. Rogaway, P., Bellare, M., Black, J.: OCB: A block-cipher mode of operation for efficient authenticated encryption. ACM Transactions on Information Systems Security 6(3), 365–403 (2003)

    Article  Google Scholar 

  9. Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. J. Wiley & Sons, Chichester (1995)

    Google Scholar 

  10. Stajano, F.: The Resurrecting Duckling - What Next? In: Proceedings of the 8th International Workshop on Security Protocols, pp. 204–214 (2003)

    Google Scholar 

  11. Stajano, F.: The security challenges of ubiquitous computing. In: Proceedings of the 5th Cryptographic Hardware and Embedded Systems Conference (CHES), vol. 1 (2003)

    Google Scholar 

  12. Wong, D., Fuentes, H., Chan, A.: The Performance Measurement of Cryptographic Primitives on Palm Devices. In: Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC), pp. 92–101 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Osvaldo Gervasi Marina L. Gavrilova

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Izquierdo, A., Torres, J., Sierra, J.M., Carbonell, M. (2007). Using Adaptative Encryption for Ubiquitous Environments. In: Gervasi, O., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2007. ICCSA 2007. Lecture Notes in Computer Science, vol 4706. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74477-1_50

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74477-1_50

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74475-7

  • Online ISBN: 978-3-540-74477-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics