Security risks in the short-range communication of ubiquitous application

Antti Evesti, Jani Suomalainen, Reijo Savola

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    1 Citation (Scopus)

    Abstract

    Recently, various applications applying ubiquitous computing have appeared. For instance, health applications have benefited from information and services, which are available from various sensors and medical devices in the surrounding environment. These applications utilize different wireless communication technologies in order to achieve a good connectivity, which is essential in ubiquitous computing. Weak security in wireless networks may ruin the security of the whole application. Hence, it is vital to realize threats, possible vulnerabilities and security assumptions made in these technologies. In this paper, we study Bluetooth, ZigBee and NFC from the security point of view in ubiquitous health applications. In the study, we emphasize security aspects starting from the physical communication layer.
    Original languageEnglish
    Title of host publication8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)
    PublisherIEEE Institute of Electrical and Electronic Engineers
    Pages612-617
    ISBN (Electronic)978-1-908320-20-9
    DOIs
    Publication statusPublished - 2013
    MoE publication typeA4 Article in a conference publication
    Event8th International Conference for Internet Technology and Secured Transactions, ICITST-2013 - London, United Kingdom
    Duration: 9 Dec 201312 Dec 2013

    Conference

    Conference8th International Conference for Internet Technology and Secured Transactions, ICITST-2013
    Abbreviated titleICITST-2013
    Country/TerritoryUnited Kingdom
    CityLondon
    Period9/12/1312/12/13

    Fingerprint

    Dive into the research topics of 'Security risks in the short-range communication of ubiquitous application'. Together they form a unique fingerprint.

    Cite this