• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Yin, Chen Yong, Zhao Jingxin, Yue Xinghui, Zheng Chen, Wu Yanjun, Wu Gaofei. Survey of Ubiquitous Computing Security[J]. Journal of Computer Research and Development, 2022, 59(5): 1054-1081. DOI: 10.7544/issn1000-1239.20211248
Citation: Li Yin, Chen Yong, Zhao Jingxin, Yue Xinghui, Zheng Chen, Wu Yanjun, Wu Gaofei. Survey of Ubiquitous Computing Security[J]. Journal of Computer Research and Development, 2022, 59(5): 1054-1081. DOI: 10.7544/issn1000-1239.20211248

Survey of Ubiquitous Computing Security

Funds: This work was supported by the National Natural Science Foundation of China (61772507).
More Information
  • Published Date: April 30, 2022
  • With the development of ubiquitous computing technology and ubiquitous operating system (UOS), ubiquitous computing has become a hot research topic both in industry and academy. As classic ubiquitous computing scenarios, smart home, industrial Internet of things, self-driving, and cloud computing, have become increasingly prosperous, and their security issues have attracted the attention of researchers. Currently, as the related research on ubiquitous computing security is in its initial stage, there is still no general security methods that can solve the emerging security issues of ubiquitous computing. In this paper, we firstly review the current status of ubiquitous computing, UOS, and summarize its architecture. Then, we analyze and summarize the state-of-the-art research effort on ubiquitous computing security, and divide security issues into three major aspects: system security, device security and communication security. We discuss the security issues and related research effort in four classic ubiquitous computing scenarios. Through in-depth analysis of the shortcomings of existing research and the causes of security problem, we summarize eight key technical challenges and opportunities in ubiquitous computing security. Finally, we discuss every challenge, and point out the potential security research directions of ubiquitous computing in future.
  • Related Articles

    [1]Dai Chenglong, Li Guanghui, Li Dong, Shen Jiahua, Pi Dechang. Electroencephalogram Clustering with Multiple Regularization Constrained Pseudo Label Propagation Optimization[J]. Journal of Computer Research and Development, 2024, 61(1): 156-171. DOI: 10.7544/issn1000-1239.202220295
    [2]Han Jingyu, Chen Wei, Zhao Jing, Lang Hang, Mao Yi. A Label Cleaning Method of ECG Data Based on Abnormality-Feature Patterns[J]. Journal of Computer Research and Development, 2023, 60(11): 2594-2610. DOI: 10.7544/issn1000-1239.202220334
    [3]Zhang Lu, Cao Feng, Liang Xinyan, Qian Yuhua. Cross-Modal Retrieval with Correlation Feature Propagation[J]. Journal of Computer Research and Development, 2022, 59(9): 1993-2002. DOI: 10.7544/issn1000-1239.20210475
    [4]Cheng Yusheng, Zhang Lulu, Wang Yibin, Pei Gensheng. Label-Specific Features Learning for Feature-Specific Labels Association Mining[J]. Journal of Computer Research and Development, 2021, 58(1): 34-47. DOI: 10.7544/issn1000-1239.2021.20190674
    [5]Hai Mo, Zhu Jianming. A Propagation Mechanism Combining an Optimal Propagation Path and Incentive in Blockchain Networks[J]. Journal of Computer Research and Development, 2019, 56(6): 1205-1218. DOI: 10.7544/issn1000-1239.2019.20180419
    [6]Zheng Wenping, Che Chenhao, Qian Yuhua, Wang Jie. A Two-Stage Community Detection Algorithm Based on Label Propagation[J]. Journal of Computer Research and Development, 2018, 55(9): 1959-1971. DOI: 10.7544/issn1000-1239.2018.20180277
    [7]Song Pan, Jing Liping. Exploiting Label Relationships in Multi-Label Classification with Neural Networks[J]. Journal of Computer Research and Development, 2018, 55(8): 1751-1759. DOI: 10.7544/issn1000-1239.2018.20180362
    [8]Li Feng, Miao Duoqian, Zhang Zhifei, Zhang Wei. Mutual Information Based Granular Feature Weighted k-Nearest Neighbors Algorithm for Multi-Label Learning[J]. Journal of Computer Research and Development, 2017, 54(5): 1024-1035. DOI: 10.7544/issn1000-1239.2017.20160351
    [9]Zhang Zhenhai, Li Shining, Li Zhigang, and Chen Hao. Multi-Label Feature Selection Algorithm Based on Information Entropy[J]. Journal of Computer Research and Development, 2013, 50(6): 1177-1184.
    [10]She Qiaoqiao, Yu Yang, Jiang Yuan, and Zhou Zhihua. Large-Scale Image Annotation via Random Forest Based Label Propagation[J]. Journal of Computer Research and Development, 2012, 49(11): 2289-2295.
  • Cited by

    Periodical cited type(5)

    1. 张琪东,迟静,陈玉妍,张彩明. 基于雾浓度分类与暗-亮通道先验的多分支去雾网络. 计算机研究与发展. 2024(03): 762-779 . 本站查看
    2. 苟光磊,朱东华,李小菲,韩岩奇. 深度掩膜布朗距离协方差小样本分类方法. 计算机应用研究. 2024(07): 2229-2234 .
    3. 韩岩奇,苟光磊,李小菲,朱东华. 融合多粒度注意力特征的小样本分类模型. 计算机应用研究. 2024(07): 2235-2240 .
    4. 潘雪玲,李国和,郑艺峰. 面向深度网络的小样本学习综述. 计算机应用研究. 2023(10): 2881-2888+2895 .
    5. 田晟兆,胡迎茜,谷成,陈端兵. 知识与数据联合驱动建模技术综述. 电子科技大学学报. 2023(06): 932-943 .

    Other cited types(8)

Catalog

    Article views (602) PDF downloads (501) Cited by(13)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return