Font Size: a A A

Research On Pervasive Computing Security Technology

Posted on:2011-04-26Degree:MasterType:Thesis
Country:ChinaCandidate:Q Q FengFull Text:PDF
GTID:2178330332966715Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Pervasive computing is the third computing model after mainframe computing and desktop computing.It is the integration of information and physical space,it emphasizes embedded the computer in their daily life,people can get the transparent service in this environment anytime and anywhere.Pervasive computing is a human-centered computing paradign,in which user is the center of computing .The computation should cater for user's intent,and the user should change nothing for the computer.In the early of pervasive computing research ,people focus on the realization of ubiquitous computing.But with the development of the research,how to solve the security problem is become more and more urgent.Because of the characteristics of pervasive computing,thetraditional security mechanisms can't be applied to the pervasive environment,so we need to study the new security strategy to solve the security issues for pervasive computing. This paper focuse on the privacy protect and service model.Pervasive computing provide transparent services for users through the context,and the context include the users'privacy.Pervasive computing privacy protection faced more severe test. In the pervasive computing environment,the equipments and resources are dynamic,and users need to select service providers based on context.In the paper,a secure protocol to protect privacy was proposed based on the existing secure protocols.This protocol introduced service discoverers,which have strong computing and storage capacity.The serice discoverers used for forwarding the information,and reduced the workload of service providers and users.In this protocol the service discoverers as the intermediate stations for information to protect the privacy of users'.In the paper, the protocol prevent the information being trackd by redistribution the ID. The information was sent with random number to prevent replayed attack. The protocol reduce the computational complexity ,and it is more suitable for ubiquitous computing. Meanwhile a suitable model for pervasive computing services was presented based on existing trust mechanisms.This model quantify the confidence,and make a comprehensive assessment to service providers.The global confidence is determined by the concept of recommend credibility,the service content credibility,and direct credibility. The service requesters could choose the service providers based on the service history recently first.If the user isn't get the satisfactory service,he could choose the service providers by the formula.This service model overcome the pervasive computing in the choice of service providers blindly,and at the same time the recommend credibility can prevent the joint cheating behavior. While this model accord with the trusted dynamic of pervasive computing,and prevent the behavior of single note of failure.With this model service requestor can choose a more suitable service provider for itself.
Keywords/Search Tags:Pervasive computing, Privacy protection, Trust, Service Model
PDF Full Text Request
Related items