Cryptanalysis of ubiquitous computing systems

2016 18th Mediterranean Electrotechnical Conference (MELECON)(2016)

引用 2|浏览24
暂无评分
摘要
Recent technological advances in hardware and software have irrevocably affected the classical picture of computing systems. Today, these no longer consist only of servers, mainframes and workstations, but involve a wide range of pervasive and embedded devices, leading to the concept of ubiquitous computing systems. There is, however, an important gap in the adaptation of the existent cryptanalytic methodologies and tools to this relatively new ubiquitous computing framework. Efforts to correct this gap should target four main axes: the development of new cryptographic models, further cryptanalysis of the main building blocks, progress in hardware and software security engineering, and advances in the security assessment of real-world systems. Researchers have only recently started to devote their efforts to the study of the security of ubiquitous computing systems and the necessary lightweight cryptography. Despite the critical flaws found, the required highly-specialized skills and the isolation of the involved disciplines are a true barrier for advancing and identifying additional issues. It is therefore necessary to establish a network of researchers with complementary skills so that expertise in cryptography, information security, privacy, and embedded systems can be put to work together. The outcome of this networking efforts will directly help industry stakeholders and regulatory bodies to increase security and privacy in ubiquitous computing systems, in order to eventually make citizens better protected in their everyday life.
更多
查看译文
关键词
Cryptography,Security Assessment,Privacy,Ubiquitous Computing,Embedded Devices,IoT,Internet of Things,Lightweight Cryptography
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要