Picture of a black hole

Strathclyde Open Access research that creates ripples...

The Strathprints institutional repository is a digital archive of University of Strathclyde's Open Access research outputs. Strathprints provides access to thousands of research papers by University of Strathclyde researchers, including by Strathclyde physicists involved in observing gravitational waves and black hole mergers as part of the Laser Interferometer Gravitational-Wave Observatory (LIGO) - but also other internationally significant research from the Department of Physics. Discover why Strathclyde's physics research is making ripples...

Strathprints also exposes world leading research from the Faculties of Science, Engineering, Humanities & Social Sciences, and from the Strathclyde Business School.

Discover more...

Security challenges in the personal distributed environment

Schwiderski-grosche, S. and Tomlinson, A. and Goo, S.K. and Irvine, J. (2004) Security challenges in the personal distributed environment. In: 60th IEEE Vehicular Technology Conference, 2004-09-26 - 2004-09-29.

Full text not available in this repository. (Request a copy from the Strathclyde author)

Abstract

Future communications systems are expected to enable interaction between an increasingly diverse range of devices, both mobile and fixed. This will allow users to construct their own personal distributed environments using a combination of different communications technologies. Depending on the services' availability, the communication configuration could be, for instance, via a cellular system, a wireless ad hoc network, a digital broadcast system, or a fixed telephone network. This new form of communication configuration inherently imposes strict requirements on security, especially when the number of involved entities, accessible network nodes, and service providers increases. The creation of such heterogeneous, dynamic, and distributed networks raises many technical issues. The paper discusses the particular problems involved in securing such an environment and establishes a series of requirements that future security architectures can be based on.