{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:38:44Z","timestamp":1760243924060,"version":"build-2065373602"},"reference-count":77,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2010,7,28]],"date-time":"2010-07-28T00:00:00Z","timestamp":1280275200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Pervasive wireless systems have significantly improved end-users\u2019 quality of life. As manufacturing costs decrease, communications bandwidth increases, and contextual information is made more readily available, the role of next generation wireless systems in facilitating users\u2019 daily activities will grow. Unique security and privacy issues exist in these wireless, context-aware, often decentralized systems. For example, the pervasive nature of such systems allows adversaries to launch stealthy attacks against them. In this review paper, we survey several emergent personal wireless systems and their applications. These systems include mobile social networks, active implantable medical devices, and consumer products. We explore each system\u2019s usage of contextual information and provide insight into its security vulnerabilities. Where possible, we describe existing solutions for defendingagainst these vulnerabilities. Finally, we point out promising future research directions for improving these systems\u2019 robustness and security<\/jats:p>","DOI":"10.3390\/fi2030190","type":"journal-article","created":{"date-parts":[[2010,7,28]],"date-time":"2010-07-28T20:09:50Z","timestamp":1280347790000},"page":"190-211","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Applications and Security of Next-Generation, User-Centric Wireless Systems"],"prefix":"10.3390","volume":"2","author":[{"given":"Jerry Rick","family":"Ramstetter","sequence":"first","affiliation":[{"name":"Department of Computer Science, Rutgers University, Piscataway, NJ, 08854, USA"}]},{"given":"Yaling","family":"Yang","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, VA, 24061, USA"}]},{"given":"Danfeng","family":"Yao","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Virginia Tech, Blacksburg, VA, 24061, USA"}]}],"member":"1968","published-online":{"date-parts":[[2010,7,28]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Schilit, B., Adams, N., and Want, R. (1994, January 8\u20139). Context-Aware Computing Applications. Proceedings of WMCSA \u201994: The 1994 First Workshop on Mobile Computing Systems and Applications, Santa Cruz, CA, USA.","DOI":"10.1109\/WMCSA.1994.16"},{"key":"ref_2","unstructured":"Facebook. Available online: http:\/\/facebook.com."},{"key":"ref_3","unstructured":"MySpace. Available online: http:\/\/myspace.com."},{"key":"ref_4","unstructured":"Twitter. Available online: http:\/\/twitter.com."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MNET.2008.4579771","article-title":"WhozThat? evolving an ecosystem for context-aware mobile social networks","volume":"22","author":"Beach","year":"2008","journal-title":"IEEE Network"},{"key":"ref_6","unstructured":"CenceMe. Available online: http:\/\/cenceme.org."},{"key":"ref_7","unstructured":"Foursquare: Learn More. Available online: http:\/\/foursquare.com\/learn_more."},{"key":"ref_8","unstructured":"BrightKite: Learn More. Available online: http:\/\/brightkite.com\/learn_more."},{"key":"ref_9","unstructured":"About Loopt. Available online: http:\/\/loopt.com\/about."},{"key":"ref_10","unstructured":"Google Latitude. Available online: http:\/\/latitude.google.com."},{"key":"ref_11","unstructured":"Li, J., and Khan, S.U. (, January December). MobiSN: Semantics-based Mobile ad hoc Social Network Framework. Proceedings of 52nd IEEE Global Communications Conference (Globecom), Honolulu, HI, USA."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MPRV.2005.37","article-title":"Social Serendipity: Mobilizing Social Software","volume":"4","author":"Eagle","year":"2005","journal-title":"IEEE Pervasive Comput."},{"key":"ref_13","unstructured":"Aka-Aki. Available online: http:\/\/aka-aki.com."},{"key":"ref_14","unstructured":"Jambo. Available online: http:\/\/jambo.net."},{"key":"ref_15","unstructured":"Mobiluck. Available online: http:\/\/mobiluck.com."},{"key":"ref_16","unstructured":"Aka-Aki Blog. Available online: http:\/\/blog.aka-aki.com\/?p=237."},{"key":"ref_17","unstructured":"Douceur, J.R. (2002). IPTPS \u201901: Revised Papers from the First International Workshop on Peer-to-Peer Systems, Springer-Verlag."},{"key":"ref_18","unstructured":"Levine, B.N., Shields, C., and Margolin, N.B. (2006). A Survey of Solutions to the Sybil Attack, University of Massachusetts Amherst. Techical Report 2006-052."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Newsome, J., Shi, E., Song, D., and Perrig, A. (2004, January 26\u201327). The sybil attack in sensor networks: analysis & defenses. Proceedings of IPSN \u201904: The 3rd International Symposium on Information Processing in Sensor Networks, Berkeley, CA, USA.","DOI":"10.1145\/984622.984660"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1109\/JSAC.2005.861382","article-title":"Location-based compromise-tolerant security mechanisms for wireless sensor networks","volume":"24","author":"Zhang","year":"2006","journal-title":"IEEE J. Sel. Area. Commun."},{"key":"ref_21","unstructured":"Trusted Computing Group. Available online: http:\/\/trustedcomputinggroup.net."},{"key":"ref_22","unstructured":"AbuHmed, T., Nyamaa, N., and Nyang, D. (, January December). Software-Based Remote Code Attestation in Wireless Sensor Network. Proceedings of 52nd IEEE Global Communications Conference (Globecom), Honolulu, HI, USA."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Shaneck, M., Mahadevan, K., Kher, V., and Kim, Y. (2005, January 13\u201314,). Remote software-based attestation for wireless sensors. Proceedings of The 2nd European Workshop on Security and Privacy in ad hoc and Sensor Networks, Visegrad, Hungary.","DOI":"10.1007\/11601494_3"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1465","DOI":"10.1126\/science.1160379","article-title":"reCAPTCHA: Human-Based Character Recognition via Web Security Measures","volume":"321","author":"Maurer","year":"2008","journal-title":"Science"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1145\/1151659.1159945","article-title":"SybilGuard: defending against sybil attacks via social networks","volume":"36","author":"Yu","year":"2006","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1036","DOI":"10.1109\/CSE.2009.243","article-title":"Solutions to Security and Privacy Issues in Mobile Social Networking","volume":"Volume 4","author":"Beach","year":"2009","journal-title":"Proceedings of 2009 International Conference on Computational Science and Engineering (CSE)"},{"key":"ref_27","unstructured":"Please Rob Me. Available online: http:\/\/pleaserobme.com."},{"key":"ref_28","unstructured":"Twitter: ongoing DoS. Available online: http:\/\/status.twitter.com\/post\/157191978\/ongoing-denial-of-service-attack."},{"key":"ref_29","unstructured":"Whalen, S. An Introduction to ARP Spoofing. Available online: http:\/\/packetstorm.securify.com\/papers\/protocols\/intro_to_arp_spoofing.pdf."},{"key":"ref_30","unstructured":"Malladi, S., Alves-Foss, J., and Heckendorn, R.B. (, January June). On Preventing Replay Attacks on Security Protocols. Proceedings of the International Conference on Security and Management, Las Vegas, NV, USA."},{"key":"ref_31","unstructured":"Moss, C., and Evans, D.W. (2005, January 13\u201315). Securing wireless communication against wormhole attacks. Proceedings of EHAC\u201905: The 4th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications, Salzburg, Austria."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Harbin, J., Mitchell, P., and Pearce, D. (2009, January 7\u201310). Wireless sensor network wormhole avoidance using disturbance-based routing schemes. Proceedings of the IEEE 6th International Symposium on Wireless Communication Systems (ISWCS), Siena, Italy.","DOI":"10.1109\/ISWCS.2009.5285300"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Triki, B., Rekhis, S., and Boudriga, N. (2009, January 9\u201311). Digital Investigation of Wormhole Attacks in Wireless Sensor Networks. Proceedings of NCA \u201909: The 2009 Eighth IEEE International Symposium on Network Computing and Applications, Cambridge, MA, USA.","DOI":"10.1109\/NCA.2009.10"},{"key":"ref_34","unstructured":"Xu, Y., Chen, G., Ford, J., and Makedon, F. (2007). Critical Infrastructure Protection, Springer."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/s11276-006-3723-x","article-title":"A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks","volume":"13","author":"Poovendran","year":"2007","journal-title":"Wireless Networking"},{"key":"ref_36","unstructured":"Kan, T., Kerins, T., and Kursawe, K. (2006, January 10\u201312). Security in Next Generation Consumer Electronic Devices. Proceedings of Securing Electronic Business Processes\u2013Highlights of the Information Security Solutions Europe 2006 Conference, Rome, Italy."},{"key":"ref_37","unstructured":"Saponas, T.S., Lester, J., Hartung, C., Agarwal, S., and Kohno, T. (2007, January 6\u201310). Devices that tell on you: privacy trends in consumer ubiquitous computing. Proceedings of SS \u201907: 16th USENIX Security Symposium on USENIX Security Symposium, Boston, MA, USA."},{"key":"ref_38","unstructured":"Dilparic, L., and Arvind, D.K. (2004, January 27\u201329). Design and Evaluation of a Network-Based Asynchronous Architecture for Cryptographic Devices. Proceedings of ASAP \u201904: The 15th IEEE International Conference on Application-Specific Systems, Architectures and Processors, Galveston, TX, USA."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Srinivasan, V., Stankovic, J., and Whitehouse, K. (2008, January 21\u201324). Protecting your daily in-home activity information from a wireless snooping attack. Proceedings of UbiComp \u201908: The 10th international conference on Ubiquitous computing, Seoul, South Korea.","DOI":"10.1145\/1409635.1409663"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Jiang, T., Wang, H.J., and Hu, Y.C. (2007, January 11\u201314). Preserving location privacy in wireless LANs. Proceedings of MobiSys \u201907: The 5th international conference on Mobile systems, applications and services, San Juan, Puerto Rico.","DOI":"10.1145\/1247660.1247689"},{"key":"ref_41","unstructured":"G\u00c3\u00b6rlach, A., Heinemann, A., and Terpstra, W.W. (2004). Privacy, Security and Trust within the Context of Pervasive Computing, the Kluwer International Series in Engineering and Computer Science, Kluwer (Springer) Academic Publishers."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","article-title":"Location Privacy in Pervasive Computing","volume":"2","author":"Beresford","year":"2003","journal-title":"IEEE Pervasive Comput."},{"key":"ref_43","unstructured":"Karasawa, K., Kira, Y., Tsuchiya, Y., Yamada, K., and Takahashi, K. (2005, January 3\u20136). A Detachable IPsec Device for Secure Consumer Communication Platform. Proceedings of IEEE Consumer Communications and Networking Conference Poster Session, Las Vegas, NV, USA."},{"key":"ref_44","unstructured":"St. Jude\u2019s WiFi Pacemaker Wins Approval. Available online: http:\/\/dotmed.com\/news\/story\/9878."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MPRV.2008.16","article-title":"Security and Privacy for Implantable Medical Devices","volume":"7","author":"Halperin","year":"2008","journal-title":"IEEE Pervasive Comput."},{"key":"ref_46","unstructured":"Denning, T., Fu, K., and Kohno, T. (August, January 28). Absence makes the heart grow fonder: new directions for implantable medical device security. Proceedings of HOTSEC \u201908: The 3rd Conference on Hot Topics in Security, Boston, MA, USA."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Drew, T., and Gini, M. (2006, January 8\u201312). Implantable medical devices as agents and part of multiagent systems. Proceedings of AAMAS \u201906: The Fifth International Joint Conference on Autonomous Agents and Multiagent Systems, Hakodate, Japan.","DOI":"10.1145\/1160633.1160930"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Gupta, S.K.S., Mukherjee, T., and Venkatasubramanian, K. (2006, January 13\u201317). Criticality Aware Access Control Model for Pervasive Applications. Proceedings of PERCOM \u201906: The Fourth Annual IEEE International Conference on Pervasive Computing and Communications, Pisa, Italy.","DOI":"10.1109\/PERCOM.2006.19"},{"key":"ref_49","unstructured":"Zhang, Y.T., Bao, S.D., and Shen, L.F. (2005, January 1\u20134). Physiological Signal Based Entity Authentication for Body Area Sensor Networks and Mobile Healthcare Systems. Proceedings of 27th IEEE Conference on Engineering in Medicine and Biology, Shanghai, China."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Cherukuri, S., Venkatasubramanian, K., and Gupta, S. (2003, January 6\u20139). Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body. Proceedings of International Conference on Parallel Processing Workshop, Kaohsiung, Taiwan.","DOI":"10.1109\/ICPPW.2003.1240399"},{"key":"ref_51","unstructured":"Mahimkar, A., and Shmatikov, V. (2005, January 20\u201322). Game-Based Analysis of Denial-of-Service Prevention Protocols. Proceedings of CSFW \u201905: The 18th IEEE Workshop on Computer Security Foundations, Aix-en-Provence, France."},{"key":"ref_52","unstructured":"Andersen, D.G. (2003, January 26\u201328). Mayday: distributed filtering for internet services. Proceedings of USITS \u201903: The 4th conference on USENIX Symposium on Internet Technologies and Systems, Seattle, WA, USA."},{"key":"ref_53","unstructured":"Barker, W.C. (2008). Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, National Institute of Standards and Technology. NIST Special Publication 800-67."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A Method for Obtaining Digital Signatures and Public-Key Cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Commun. ACM"},{"key":"ref_55","unstructured":"Desmedt, Y.G., and Frankel, Y. (1989, January 20\u201324). Threshold cryptosystems. Proceedings of CRYPTO \u201989: The 9th Annual International Cryptology Conference, Santa Barbara, CA, USA."},{"key":"ref_56","first-page":"7","article-title":"An introduction to threshold cryptography","volume":"2","author":"Gemmel","year":"1997","journal-title":"CryptoBytes"},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Feng, Y., Liu, Z., and Li, J. (2006, January 18\u201321). Securing Membership Control in Mobile ad hoc Networks. Proceedings of ICIT \u201906: The 9th International Conference on Information Technology, Mumbai, India.","DOI":"10.1109\/ICIT.2006.81"},{"key":"ref_58","unstructured":"Khalili, A., Katz, J., and Arbaugh, W.A. (2003, January 27\u201331). Toward Secure Key Distribution in Truly Ad-Hoc Networks. Proceedings of SAINT-W \u201903: The 2003 Symposium on Applications and the Internet Workshops, Orlando, Florida, USA."},{"key":"ref_59","unstructured":"Kong, J., Zerfos, P., Luo, H., Lu, S., and Zhang, L. (2001, January 11\u201314). Providing Robust and Ubiquitous Security Support for Mobile ad hoc Networks. Proceedings of ICNP \u201901: The Ninth International Conference on Network Protocols, Riverside, CA, USA."},{"key":"ref_60","unstructured":"Luo, H., and Lu, S. (2000). Ubiquitous and Robust Authentication Services for ad hoc Wireless Networks, University of California, Los Angeles. Technical Report UCLA-CSD-TR-200030."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1145\/1077391.1077395","article-title":"SeRLoc: Robust localization for wireless sensor networks","volume":"1","author":"Lazos","year":"2005","journal-title":"ACM TOSN"},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Lanzisera, S., Lin, D.T., and Pister, K.S.J. (2006, January 30). RF time of flight ranging for wireless sensor network localization. Presented at Workshop on Intelligent Solutions in Embedded Systems (WISES), Vienna, Austria.","DOI":"10.1109\/WISES.2006.329127"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Chiang, J.T., Haas, J.J., and Hu, Y.C. (2009, January 16\u201318). Secure and precise location verification using distance bounding and simultaneous multilateration. Proceedings of WiSec \u201909: The Second ACM Conference on Wireless Network Security, Zurich, Switzerland.","DOI":"10.1145\/1514274.1514301"},{"key":"ref_64","unstructured":"Capkun, S., and Hubaux, J.P. (2005, January 13\u201317). Secure positioning of wireless devices with application to sensor networks. Proceedings of INFOCOM 2005: 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Miami, FL, USA."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Sastry, N., Shankar, U., and Wagner, D. (2003, January 19). Secure Verification of Location Claims. Presented at ACM Workshop on Wireless Security (WiSe 2003), San Diego, CA, USA.","DOI":"10.1145\/941312.941313"},{"key":"ref_66","unstructured":"Brands, S., and Chaum, D. (1993, January 23\u201327). Distance-bounding protocols. Proceedings of EUROCRYPT \u201993: Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology, Lofthus, Norway."},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Kolodziej, K.W., and Hjelm, J. (2006). Local Positioning Systems: LBS Applications and Services, CRC Press.","DOI":"10.1201\/9780849333491"},{"key":"ref_68","unstructured":"(2007). Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Standards Association. IEEE 802.11-2007."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/j.adhoc.2006.11.006","article-title":"Secure probabilistic location verification in randomly deployed wireless sensor networks","volume":"6","author":"Ekici","year":"2008","journal-title":"Ad Hoc Networks"},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Liu, Y., Zhou, H., and Zhao, B. (2007, January 12\u201314). Secure Location Verification Using Hop-Distance Relationship in Wireless Sensor Networks. Proceedings of APSCC \u201907: The 2nd IEEE Asia-Pacific Service Computing Conference, Tsukuba Science City, Japan.","DOI":"10.1109\/APSCC.2007.4414442"},{"key":"ref_71","unstructured":"Vural, S., and Ekici, E. Analysis of hop-distance relationship in spatially random sensor networks. Proceedings of MobiHoc \u201905: The 6th ACM International Symposium on Mobile ad hoc Networking and Computing, Urbana-Champaign, IL, USA."},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Wei, Y., Yu, Z., and Guan, Y. (2007, January 25\u201329). Location Verification Algorithms for Wireless Sensor Networks. Proceedings of the 27th International Conference on Distributed Computing Systems (ICDCS), Toronto, Ontario, Canada.","DOI":"10.1109\/ICDCS.2007.117"},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/WC-M.2006.250353","article-title":"Position Verification Approaches for Vehicular ad hoc Networks","volume":"13","author":"Leinmuller","year":"2006","journal-title":"IEEE Wirel. Commun."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"829","DOI":"10.1109\/JSAC.2005.863855","article-title":"Secure localization and authentication in ultra-wideband sensor networks","volume":"24","author":"Zhang","year":"2006","journal-title":"IEEE J. Sel. Area. Commun."},{"key":"ref_75","unstructured":"Hightower, J., and Borriello, G. (2001). A Survey and Taxonomy of Location Sensing Systems for Ubiquitous Computing, University of Washington. UW CSE 01-08-03."},{"key":"ref_76","unstructured":"Srinivasan, A., and Wu, J. (2008). Encyclopedia of Wireless and Mobile Communications, CRC Press, Taylor and Francis Group."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1145\/1517480.1517485","article-title":"Proactive attacker localization in wireless LAN","volume":"39","author":"Han","year":"2009","journal-title":"SIGCOMM Comput. Commun. Rev."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/2\/3\/190\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T22:03:01Z","timestamp":1760220181000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/2\/3\/190"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7,28]]},"references-count":77,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2010,9]]}},"alternative-id":["fi2030190"],"URL":"https:\/\/doi.org\/10.3390\/fi2030190","relation":{},"ISSN":["1999-5903"],"issn-type":[{"type":"electronic","value":"1999-5903"}],"subject":[],"published":{"date-parts":[[2010,7,28]]}}}