
The scope of this paper is to present the necessity to improve the existent ambient intelligence model with respect to data security. The security of such a model poses a great challenge due to the fact that different networks are mixing in order to provide such an environment. In addition, these networks are generally deployed and then left unattended. All these aspects joined together make it unfeasible to directly apply the traditional security mechanisms. Therefore, there is a need to analyze and better understand the security requirements of these networks. This paper provides the specific security attacks to such a model and supplies a solution for these attacks.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 1 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
