Skip to main content

Using Adaptative Encryption for Ubiquitous Environments

  • Conference paper
Computational Science and Its Applications – ICCSA 2007 (ICCSA 2007)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4706))

Included in the following conference series:

  • 2060 Accesses

Abstract

One of the most important issues for ubiquitous computing is the problem of encrypting content in the devices, as the heterogeneity in the devices nature, capabilities, mobility and necessities make it very difficult to find a solution that may be applied to all of these devices for the encryption and decryption of data. Although this is an important issue in today’s computing, there are not proposals that suit the specific needs of the ubiquitous devices regarding power consumption and computing capabilities, as well as flexibility. In this paper we show how adaptative encryption is the base for encryption of the stored data in ubiquitous environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Argyroudis, P., Verma, R., Tewari, H., OḾahony, D.: Performance Analysis of Cryptographic Protocols on Handheld Devices. In: Proceedings of the Network Computing and Applications, pp. 169–174 (2004)

    Google Scholar 

  2. Bauer, M.: Designing and Using DMZ Networks to Protect Internet Servers. Linux Journal 17(83) (2001), http://www.linuxjournal.com/article/4415

  3. Cheswick, W., Bellovin, S., Rubin, A.: Firewalls and Internet Security: Repelling the Wily Hacker, 2nd edn. Addison-Wesley, Reading (2003)

    Google Scholar 

  4. Hancock, B.: Mass Network Flooding Attacks (Distributed Denial of Service - DDoS) Surface in the Wild. Computers & Security 19(1), 6–7 (2000)

    Article  Google Scholar 

  5. Izquierdo, A., Sierra, J.M., Torres, J.: On the implementation of security policies with adaptative encryption. Computer Communications 29(15), 2750–2758 (2006)

    Article  Google Scholar 

  6. Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton, USA (1996)

    Google Scholar 

  7. Needham, R.: Denial of Service: An Example. Communications of the ACM archive 37(11), 42–46 (1994)

    Article  Google Scholar 

  8. Rogaway, P., Bellare, M., Black, J.: OCB: A block-cipher mode of operation for efficient authenticated encryption. ACM Transactions on Information Systems Security 6(3), 365–403 (2003)

    Article  Google Scholar 

  9. Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. J. Wiley & Sons, Chichester (1995)

    Google Scholar 

  10. Stajano, F.: The Resurrecting Duckling - What Next? In: Proceedings of the 8th International Workshop on Security Protocols, pp. 204–214 (2003)

    Google Scholar 

  11. Stajano, F.: The security challenges of ubiquitous computing. In: Proceedings of the 5th Cryptographic Hardware and Embedded Systems Conference (CHES), vol. 1 (2003)

    Google Scholar 

  12. Wong, D., Fuentes, H., Chan, A.: The Performance Measurement of Cryptographic Primitives on Palm Devices. In: Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC), pp. 92–101 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Osvaldo Gervasi Marina L. Gavrilova

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Izquierdo, A., Torres, J., Sierra, J.M., Carbonell, M. (2007). Using Adaptative Encryption for Ubiquitous Environments. In: Gervasi, O., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2007. ICCSA 2007. Lecture Notes in Computer Science, vol 4706. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74477-1_50

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74477-1_50

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74475-7

  • Online ISBN: 978-3-540-74477-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics