TY - GEN
T1 - A survey of security middleware for pervasive and ubiquitous systems
AU - Al-Jaroodi, Jameela
AU - Al-Dhaheri, Alyaziyah
AU - Al-Abdouli, Fatmah
AU - Mohamed, Nader
PY - 2009
Y1 - 2009
N2 - Recently, pervasive and ubiquitous computing evolved tremendously and has become an integral part of many fields. This is widely attributed to their efficiency in integrating with everyday components and handling tasks in a faster and better way. As a result, technologies to facilitate their development, integration and security also evolved. Middleware is an essential component in this field and recently more emphasis has been put on security middleware as an enabling component for pervasive and ubiquitous applications. This is due to the high levels of personal and private data sharing in these systems. In this paper we survey some representative security middleware approaches and highlight their various properties and characteristics. We also discuss and compare these approaches in terms of their design, target environments, and main features. The review reveals that several options are available; however, there are still many issues and problems to be addressed to achieve more efficient security middleware.
AB - Recently, pervasive and ubiquitous computing evolved tremendously and has become an integral part of many fields. This is widely attributed to their efficiency in integrating with everyday components and handling tasks in a faster and better way. As a result, technologies to facilitate their development, integration and security also evolved. Middleware is an essential component in this field and recently more emphasis has been put on security middleware as an enabling component for pervasive and ubiquitous applications. This is due to the high levels of personal and private data sharing in these systems. In this paper we survey some representative security middleware approaches and highlight their various properties and characteristics. We also discuss and compare these approaches in terms of their design, target environments, and main features. The review reveals that several options are available; however, there are still many issues and problems to be addressed to achieve more efficient security middleware.
KW - Ad hoc networks
KW - Authentication
KW - Pervasive environments
KW - Security middleware
KW - Ubiquitous computing
KW - p2p systems
UR - http://www.scopus.com/inward/record.url?scp=74549172931&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=74549172931&partnerID=8YFLogxK
U2 - 10.1109/NBiS.2009.31
DO - 10.1109/NBiS.2009.31
M3 - Conference contribution
AN - SCOPUS:74549172931
SN - 9780769537672
T3 - NBiS 2009 - 12th International Conference on Network-Based Information Systems
SP - 188
EP - 193
BT - NBiS 2009 - 12th International Conference on Network-Based Information Systems
T2 - NBiS 2009 - 12th International Conference on Network-Based Information Systems
Y2 - 19 August 2009 through 21 August 2009
ER -