A survey of security middleware for pervasive and ubiquitous systems

Jameela Al-Jaroodi, Alyaziyah Al-Dhaheri, Fatmah Al-Abdouli, Nader Mohamed

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)

    Abstract

    Recently, pervasive and ubiquitous computing evolved tremendously and has become an integral part of many fields. This is widely attributed to their efficiency in integrating with everyday components and handling tasks in a faster and better way. As a result, technologies to facilitate their development, integration and security also evolved. Middleware is an essential component in this field and recently more emphasis has been put on security middleware as an enabling component for pervasive and ubiquitous applications. This is due to the high levels of personal and private data sharing in these systems. In this paper we survey some representative security middleware approaches and highlight their various properties and characteristics. We also discuss and compare these approaches in terms of their design, target environments, and main features. The review reveals that several options are available; however, there are still many issues and problems to be addressed to achieve more efficient security middleware.

    Original languageEnglish
    Title of host publicationNBiS 2009 - 12th International Conference on Network-Based Information Systems
    Pages188-193
    Number of pages6
    DOIs
    Publication statusPublished - 2009
    EventNBiS 2009 - 12th International Conference on Network-Based Information Systems - Indianapolis, IN, United States
    Duration: Aug 19 2009Aug 21 2009

    Publication series

    NameNBiS 2009 - 12th International Conference on Network-Based Information Systems

    Other

    OtherNBiS 2009 - 12th International Conference on Network-Based Information Systems
    Country/TerritoryUnited States
    CityIndianapolis, IN
    Period8/19/098/21/09

    Keywords

    • Ad hoc networks
    • Authentication
    • Pervasive environments
    • Security middleware
    • Ubiquitous computing
    • p2p systems

    ASJC Scopus subject areas

    • Computer Networks and Communications
    • Information Systems

    Fingerprint

    Dive into the research topics of 'A survey of security middleware for pervasive and ubiquitous systems'. Together they form a unique fingerprint.

    Cite this