Skip to main content

A Study on Authentication Mechanism Using Robot Vacuum Cleaner

  • Conference paper
Computational Science and Its Applications – ICCSA 2005 (ICCSA 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3483))

Included in the following conference series:

  • 1662 Accesses

Abstract

Robot is not a new field. It has been around for decades. In fact, most people have robots in their own home, even if they don’t recognize the robots as such. For example, a dishwasher automatically washes and dries your dishes, then grinds up the rinsed-off food so the organic matter doesn’t clog your drains. A washing machine soaks, soaps, agitates, and rinses your clothes. Down the street, the car wash-n-wax cleans, brushes, washes, and waxes your car, all for a few dollars. One of the better known home-oriented robots is robot vacuum cleaner which has already good cleaner for assistant house keeper. In this paper, we suggest that home security system using robot vacuum cleaner. Our robot vacuum cleaner makes an additional security function using camera. But, these technologies lack in provision of the authentication architecture of customers for the accountability, confidentiality. This paper presents the architecture of authentication mechanism to deal with the specific challenges arising from these applications and to overcome the weakness of traditional architecture for the secured infrastructure of home network environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Oreback, A.: A Component Framework for Autonomous Mobile Robots, Doctoral Thesis (2004)

    Google Scholar 

  2. Coiffet, et al.: An introduction to robot technology, Hermes (1982)

    Google Scholar 

  3. Butler, J.: Robotics and Microelectronics Mobile Robots as Gateways into Wireless Sensor Networks. Technology@Intel Magazine (2003)

    Google Scholar 

  4. Katzenbeisser, S., Tomsich, P.: Applied Information Security for m-Commerce and Digital Television Environment. In: Bauknecht, K., Madria, S.K., Pernul, G. (eds.) EC-Web 2001. LNCS, vol. 2115, pp. 165–175. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  5. Lee, H.J.: A Study on Method Using Effectiveness Interaction TV. In: HCI Conference (2003)

    Google Scholar 

  6. Lee, H.J.: Ubiquitous Innovation, e-co book (2004)

    Google Scholar 

  7. Tanh, D.V.: Security Issues in Mobile eCommerce. Lecture Notes in Computer Science, 467–476 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, H.J., Park, H.J., Kim, S. (2005). A Study on Authentication Mechanism Using Robot Vacuum Cleaner. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3483. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424925_15

Download citation

  • DOI: https://doi.org/10.1007/11424925_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25863-6

  • Online ISBN: 978-3-540-32309-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics