Svoboda | Graniru | BBC Russia | Golosameriki | Facebook
skip to main content

Security and privacy issues of handheld and wearable wireless devices

Authors: Roberto Di Pietro, Luigi V. ManciniAuthors Info & Claims
Pages 74 - 79
Published: 01 September 2003 Publication History

Abstract

The distinguished capabilities of these devices are also the very reasons they require security and privacy protections of an unprecedented scale.

References

[1]
Borisov, N. et al. Intercepting mobile communications: The insecurity of 802.11. In Proceedings of ACM/IEEE MOBICOM 2001; 180--189.
[2]
Carman, D.W. et al. Constraints and approaches for distributed sensor network security. NAI Labs Technical Report. (Sept. 2000); www.nai.com/research/nailabs/cryptographic/a-communications-security.asp
[3]
Chan, H. et al. Random key predistribution schemes for sensor networks. In Proceedings of the IEEE Symposium on Security and Privacy (May 2003, Oakland, CA).
[4]
Coulouris, G. et al. Distributed Systems: Concepts and Design. Addison Wesley, Reading, PA., 2001.
[5]
Di Pietro, R. et al. Providing secrecy in key management protocols for large wireless sensor networks. J. Adhoc Networks. To appear.
[6]
Fox, A. and Gribble, S. Security on the move: Indirect authentication using Kerberos. In Proceedings of ACM/IEEE MOBICOM 1996; 155--164.
[7]
Guan, Y. et al. Preventing traffic analysis for real-time communication networks. In Proceedings of IEEE Milcom (Nov. 1999), 744--750.
[8]
Harter, A. et al. The anatomy of a context-aware application. In Proceedings of ACM/IEEE MOBICOM 1999; 59--68.
[9]
Hermann, R. et al. DEAPspace---Transient ad hoc networking of pervasive devices. Computer Networks 35 (2001), 411--428.
[10]
Kindberg, T. et al. People, places, things: Web presence for the real world. MONET 7, 5 (Oct. 2002), Kluwer A.P., 365--376.
[11]
Myers, B.A. Using handhelds and PCs together. Commun. ACM 44, 11 (Nov. 2001), 34--41.
[12]
Sandhu, R. et al. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Trans. Info. and System Security 3, 2 (May 2000) 85--106.

Cited By

View all
  • (2023)AMQP Protocol-Based Multilevel Security for M-commerce TransactionsExpert Clouds and Applications10.1007/978-981-99-1745-7_56(765-779)Online publication date: 2-Jul-2023
  • (2022)ES-PPDA: an efficient and secure privacy-protected data aggregation scheme in the IoT with an edge-based XaaS architectureJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-022-00295-511:1Online publication date: 26-Jul-2022
  • (2022)A Three-Level Gateway protocol for secure M-Commerce Transactions using Encrypted OTP2022 International Conference on Applied Artificial Intelligence and Computing (ICAAIC)10.1109/ICAAIC53929.2022.9792908(1408-1416)Online publication date: 9-May-2022
  • Show More Cited By

Recommendations

Reviews

John S. Edwards

Di Pietro and Mancini correctly call into question the methods used to maintain security and privacy, as handheld wearable wireless (HWW) devices come into use to connect our personal devices, and even our personal health and financial data, to services (housed presumably on the World Wide Web). There is a danger that the service industry may introduce these features into common use before the industry addresses and solves basic security issues. After a short mention of two methods of Web presence, the authors discuss the implications of directly connecting HWW devices to their services with an emphasis on the security challenge. Three security elements are covered in some detail: confidentiality, integrity, and availability. One additional element might be certifiabilily: a guarantee that entities at the other end of the link are the ones desired. When combined with adequate end-to-end cryptography, the message in the communication channel should be secure and would be sent to the intended party. The use of public key cryptography (PKC) is deprecated because "computation needed to encrypt and decrypt messages using PKC is overwhelming with respect to the computation required" when compared to symmetric cryptography. However, hybrid PKC approaches are not precluded, if a one-time session key is generated to encrypt the message. Public key cryptography, in combination with certificates, would support certifiability. The issues raised by the article are important, and associations and user groups should join the fray; the details of security are too important not to be considered in depth. Before we know it, wireless devices will be endemic. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Information & Contributors

Information

Published In

Communications of the ACM  Volume 46, Issue 9
Why CS students need math
September 2003
244 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/903893
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 September 2003
Published in CACM Volume 46, Issue 9

Permissions

Request permissions for this article.
Request Permissions

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)91
  • Downloads (Last 6 weeks)12
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2023)AMQP Protocol-Based Multilevel Security for M-commerce TransactionsExpert Clouds and Applications10.1007/978-981-99-1745-7_56(765-779)Online publication date: 2-Jul-2023
  • (2022)ES-PPDA: an efficient and secure privacy-protected data aggregation scheme in the IoT with an edge-based XaaS architectureJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-022-00295-511:1Online publication date: 26-Jul-2022
  • (2022)A Three-Level Gateway protocol for secure M-Commerce Transactions using Encrypted OTP2022 International Conference on Applied Artificial Intelligence and Computing (ICAAIC)10.1109/ICAAIC53929.2022.9792908(1408-1416)Online publication date: 9-May-2022
  • (2022)User Awareness of Wearable IoT Devices Privacy Issues2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)10.1109/3ICT56508.2022.9990688(627-634)Online publication date: 20-Nov-2022
  • (2020)More honour'd in the breach: predicting non-compliant behaviour through individual, situational and habitual factorsBehaviour & Information Technology10.1080/0144929X.2020.182244441:3(519-534)Online publication date: 22-Sep-2020
  • (2020)Internet of Things device authentication via electromagnetic fingerprintsEngineering Reports10.1002/eng2.122262:8Online publication date: 9-Jul-2020
  • (2019)Success Factors for Data Protection in Services and Support RolesCensorship, Surveillance, and Privacy10.4018/978-1-5225-7113-1.ch042(814-829)Online publication date: 2019
  • (2019)An Empirical Study on the Data Security and Privacy Awareness to Use Health Care Wearable Devices2019 16th International Conference on Service Systems and Service Management (ICSSSM)10.1109/ICSSSM.2019.8887825(1-6)Online publication date: Jul-2019
  • (2019)Hybridization design of materials and devices for flexible electrochemical energy storageEnergy Storage Materials10.1016/j.ensm.2019.03.00219(212-241)Online publication date: May-2019
  • (2019)Wearable U-HRM device for rural applicationsU-Healthcare Monitoring Systems10.1016/B978-0-12-815370-3.00001-3(1-14)Online publication date: 2019
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Magazine Site

View this article on the magazine site (external)

Magazine Site

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media

View Issue’s Table of Contents