Ambient Intelligence
DOI: 10.1007/3-540-27139-2_10
|View full text |Cite
|
Sign up to set email alerts
|

Security for Ambient Intelligent Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 31 publications
0
6
0
Order By: Relevance
“…The AmI home network was provided by MANET. The attacks on the communication channel are majorly denial of service which includes flooding, jamming and eavesdropping (Ingrid et al, 2005). The proposed Real Time Dynamic Source Routing (RTDSR) protocol uses the idea of observation based cooperation enforcement in ad hoc network (oceans) protocol and collaborative reputation mechanism built on dynamic source routing (DSR) protocol.…”
Section: Trust Management For Channel Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…The AmI home network was provided by MANET. The attacks on the communication channel are majorly denial of service which includes flooding, jamming and eavesdropping (Ingrid et al, 2005). The proposed Real Time Dynamic Source Routing (RTDSR) protocol uses the idea of observation based cooperation enforcement in ad hoc network (oceans) protocol and collaborative reputation mechanism built on dynamic source routing (DSR) protocol.…”
Section: Trust Management For Channel Attacksmentioning
confidence: 99%
“…The nature of AmI home system which is life dependent necessitates the need for securing the home. Attacks in the AmI home can be on the communication channel or on the individual devices (Ingrid et al, 2005).…”
Section: Introductionmentioning
confidence: 99%
“…Another challenge for wearables is the body area network (Knospe & Pohl, 2004) which comprises the wearable computer, all attached devices and sensors, etc. The body area network is open to a number of security threats (Verbauwhede, Hodjat, Hwang, & Lai, 2005;Friedewald, Vildjiounaite, Punie, & Wright, 2007) if sensitive information stored is at risk. Further, also privacy and safety issues can arise if the wearer is identified and/or the electronic identity stolen.…”
Section: Body Area Network Securitymentioning
confidence: 99%
“…In their discussion on security in AmI environment, Verbauwhede et al [9] argue that traditional solutions for providing security will fail in AmI environments since these techniques traditionally focus on the communication channel and assume that the environments connected by this channel is secure. Similarly, for trust there needs to be more emphasis on the environment than on the communication channel.…”
Section: Persuasionmentioning
confidence: 99%