Nothing Special   »   [go: up one dir, main page]

Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8276))

  • 2187 Accesses

Abstract

Ubiquitous computing has inherent features, e.g., a number of elements in the system with restricted communication and computation capabilities, which make harder to achieve dependability. In this work we explore this research line through the study of TrustedPals, a smartcard-based framework which allows implementing security policies in ubiquitous systems and applications in a decentralized way. The current architecture of TrustedPals uses a consensus algorithm adapted to the omission failure model. In this work, we propose to alternatively use the Paxos algorithm, in order to address more ubiquitous environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Pease, M.C., Shostak, R.E., Lamport, L.: Reaching agreement in the presence of faults. J. ACM 27(2), 228–234 (1980)

    Article  MathSciNet  Google Scholar 

  2. Fischer, M.J., Lynch, N.A., Paterson, M.: Impossibility of distributed consensus with one faulty process. J. ACM 32(2), 374–382 (1985)

    Article  MathSciNet  Google Scholar 

  3. Chandra, T.D., Toueg, S.: Unreliable failure detectors for reliable distributed systems. J. ACM 43(2), 225–267 (1996)

    Article  MathSciNet  Google Scholar 

  4. Cortiñas, R., Freiling, F.C., Ghajar-Azadanlou, M., Lafuente, A., Larrea, M., Penso, L.D., Soraluze, I.: Secure failure detection and consensus in trustedpals. IEEE Trans. Dependable Sec. Comput. 9(4), 610–625 (2012)

    Article  Google Scholar 

  5. Fort, M., Freiling, F.C., Penso, L.D., Benenson, Z., Kesdogan, D.: Trustedpals: Secure multiparty computation implemented with smart cards. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 34–48. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  6. Yao, A.C.C.: Protocols for secure computations (extended abstract). In: FOCS, pp. 160–164. IEEE Computer Society (1982)

    Google Scholar 

  7. Lamport, L.: The part-time parliament. ACM Trans. Comput. Syst. 16(2), 133–169 (1998)

    Article  Google Scholar 

  8. Chandra, T.D., Hadzilacos, V., Toueg, S.: The weakest failure detector for solving consensus. Journal of the ACM 43(4), 685–722 (1996)

    Article  MathSciNet  Google Scholar 

  9. Casteigts, A.: The JBotSim library. CoRR abs/1001.1435 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer International Publishing Switzerland

About this paper

Cite this paper

Fernández-Campusano, C., Cortiñas, R., Larrea, M. (2013). Boosting Dependable Ubiquitous Computing: A Case Study. In: Urzaiz, G., Ochoa, S.F., Bravo, J., Chen, L.L., Oliveira, J. (eds) Ubiquitous Computing and Ambient Intelligence. Context-Awareness and Context-Driven Interaction. Lecture Notes in Computer Science, vol 8276. Springer, Cham. https://doi.org/10.1007/978-3-319-03176-7_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-03176-7_6

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-03175-0

  • Online ISBN: 978-3-319-03176-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics