Picture of smart phone in human hand

World leading smartphone and mobile technology research at Strathclyde...

The Strathprints institutional repository is a digital archive of University of Strathclyde's Open Access research outputs. Strathprints provides access to thousands of Open Access research papers by University of Strathclyde researchers, including by Strathclyde researchers from the Department of Computer & Information Sciences involved in researching exciting new applications for mobile and smartphone technology. But the transformative application of mobile technologies is also the focus of research within disciplines as diverse as Electronic & Electrical Engineering, Marketing, Human Resource Management and Biomedical Enginering, among others.

Explore Strathclyde's Open Access research on smartphone technology now...

Security challenges in the personal distributed environment

Schwiderski-grosche, S. and Tomlinson, A. and Goo, S.K. and Irvine, J. (2004) Security challenges in the personal distributed environment. In: 60th IEEE Vehicular Technology Conference, 2004-09-26 - 2004-09-29.

Full text not available in this repository. Request a copy from the Strathclyde author

Abstract

Future communications systems are expected to enable interaction between an increasingly diverse range of devices, both mobile and fixed. This will allow users to construct their own personal distributed environments using a combination of different communications technologies. Depending on the services' availability, the communication configuration could be, for instance, via a cellular system, a wireless ad hoc network, a digital broadcast system, or a fixed telephone network. This new form of communication configuration inherently imposes strict requirements on security, especially when the number of involved entities, accessible network nodes, and service providers increases. The creation of such heterogeneous, dynamic, and distributed networks raises many technical issues. The paper discusses the particular problems involved in securing such an environment and establishes a series of requirements that future security architectures can be based on.