Whole Network Most Recent TOP10 High-Tech Textiles Market Products Technology
RSS rss   | See all blog subscribe options
Google google   |   What is RSS?
Yahoo! yahoo
Addthis AddThis Feed Button
Bloglines Bloglines
Newsletter
Advertisement

Use our search feature to look for other interesting posts

Just this blog Whole network
  • Would you like to see your text link here? Let us know!


 
  • Would you like to see your text link here? Let us know!
Advertisement


  • Testimonials

  • Best place to visit if you are interested in whats going on in the wearable computing industry. Regine, We Make Money Not Art






 

Fields for security applications in pervasive computing

Filed in archive Privacy by on December 10, 2006

Prof_Paar.jpg
Prof. Dr. Ing. Christoph Paar wrote a paper about security issues in pervasive computing. His main question was if there are differences between security applications for LAN and pervasive networks. This way he lists some of these networks and states that you'll need not much fantasy to find possible security problems here:

- Security in process automation
- Security in RFID-logistics chain
- Security in mobile applications
- Security in cars
- Security in ad-hoc-networks
- Security in geo-information-systems
- Security for "wearable" computer
- Security in intelligent rooms
- ...

Some of the differences right now are that in a LAN you can install new software what is not that easy for embedded computer chips. These chips today do not have the computing power for complex encryption. Dangerous are attacks that use information about the energy consumption or reverse engeneering to get information about the encryption used. Because you can not change things backwards it's more important to build in security systems before components are delivered.
Interesting that almost 98% of 32bit-chips are used within embedded systems and only 2% in usual computer.

Prof. Dr. Ing. Christoph Paar is director of the Horst Görtz Instituts for security in IT and teaches Communication security at the Ruhr-university Bochum, germany.

via (german) Inside-IT


Permalink: Fields for security applications in pervasive computing
Tags: Pervasive  Computing  Security  applications  security  pervasive+computing  security+applications  applica 

Trackback: http://www.creative-weblogging.com/cgi-bin/mt-tb.pl/45263



 
Tagcloud: About Cool Enterprises Events High-Tech Textiles Market Notes Privacy Products Science Technology