Skip to main content

Securing Communications in the Smart Home

  • Conference paper
Embedded and Ubiquitous Computing (EUC 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3207))

Included in the following conference series:

Abstract

As the vision of ubiquitous computing becomes reality smart devices are embedded into our surroundings and domestic appliances providing services transparently. The nature of such smart computing environments is open and dynamic; therefore the use of predefined security associations between all of the participating devices is particularly difficult. Our proposal, called ÆTHER, defines a security management architecture designed specifically to address access control and the establishment of associations in smart environments. Attribute authority sets and access control policy entries are embedded into pervasive devices defining initial trust relationships. Members of the attribute authority sets are trusted to issue credentials for the corresponding attributes that can then be used to gain access to services provided by smart devices. We allow these sets to grow dynamically without requiring manual reconfiguration facilitating decentralized administration, which is required in volatile pervasive environments, and attribute mapping to allow roaming among smart authority domains.

The first author is supported by the Irish Research Council for Science, Engineering and Technology as part of the Embark Initiative, under contract number RS/2002/599-2.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Argyroudis, P.G., Verma, R., Tewari, H., O’Mahony, D.: Performance analysis of cryptographic protocols on handheld devices. Technical report TCD-CS-2003-46, University of Dublin, Trinity College (2003)

    Google Scholar 

  2. Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: Talking to strangers: authentication in ad hoc wireless networks. In: Proc. 9th Network and Distributed System Security Symposium (2002)

    Google Scholar 

  3. Blaze, M., Feigenbaum, J., Keromytis, A.D.: The KeyNote trust management system version 2. Internet Engineering Task Force RFC 2704 (1999)

    Google Scholar 

  4. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proc. 1996 IEEE Symposium on Security and Privacy, pp. 164–173 (1996)

    Google Scholar 

  5. Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  6. Brumitt, B., Meyers, B., Krumm, J., Kern, A., Shafer, S.: EasyLiving: technologies for intelligent environments. In: Proc. 2nd Int’l. Symposium on Handheld and Ubiquitous Computing, pp. 12–29 (2000)

    Google Scholar 

  7. Clarke, D., Elien, J.-E., Ellison, C., Fredette, M., Morcos, A., Rivest, R.L.: Certificate chain discovery in SPKI/SDSI. Journal of Computer Security 9(4), 285–322 (2001)

    Google Scholar 

  8. Dublin Ad hoc Wireless Network (DAWN), see http://ntrg.cs.tcd.ie/dawn.php

  9. Ellison, C., Frantz, B., Lampson, B., Rivest, R.L., Thomas, B., Ylonen, T.: SPKI certificate theory. Internet Engineering Task Force RFC 2693 (1999)

    Google Scholar 

  10. Gligor, V., Gavrilla, S.I., Ferraiolo, D.F.: On the formal definition of separation of duty policies and their composition. In: Proc. 1998 IEEE Symposium on Security and Privacy, pp. 172–183 (1998)

    Google Scholar 

  11. Herzberg, A., Mass, Y., Mihaeli, J., Naor, D., Ravid, Y.: Access control meets public key infrastructure, or: assigning roles to strangers. In: Proc. 2000 IEEE Symposium on Security and Privacy, pp. 2–14 (2000)

    Google Scholar 

  12. ISO/ITU-T Recommendation X.509. The directory: authentication framework (2001)

    Google Scholar 

  13. LaPlant, B., Trewin, S., Zimmermann, G., Vanderheiden, G.: The universal remote console: a universal access bus for pervasive computing. IEEE Pervasive Computing 1(3), 76–80 (2004)

    Article  Google Scholar 

  14. Linn, J., Nystrom, M.: Attribute certification: an enabling technology for delegation and role-based controls in distributed environments. In: Proc. 4th ACM Workshop on Role- Based Access Control, pp. 121–130 (1999)

    Google Scholar 

  15. O’Mahony, D., Doyle, L.: Mobile computing: implementing pervasive information and communication technologies. chapter: An adaptable node architecture for future wireless networks. Kluwer Publishing, Dordrecht (2001)

    Google Scholar 

  16. Stajano, F.: The resurrecting duckling – what next? In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2000. LNCS, vol. 2133, pp. 204–214. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  17. Stajano, F., Anderson, R.: The resurrecting duckling: security issues in ad hoc wireless networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172–182. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  18. Want, R., Schilit, B.N., Adams, N.I., Gold, R., Petersen, K., Ellis, J.R., Goldberg, D., Weiser, M.: An overview of the PARCTAB ubiquitous computing experiment. IEEE Personal Communications 2(6), 28–33 (1995)

    Article  Google Scholar 

  19. Weiser, M.: The computer for the twenty-first century. Scientific American 265(3), 94–104 (1991)

    Article  Google Scholar 

  20. Winsborough, W.H., Li, N.: Towards practical automated trust negotiation. In: Proc. 3rd Int’l. Workshop on Policies for Distributed Systems and Networks, pp. 92–103 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Argyroudis, P.G., O’Mahony, D. (2004). Securing Communications in the Smart Home. In: Yang, L.T., Guo, M., Gao, G.R., Jha, N.K. (eds) Embedded and Ubiquitous Computing. EUC 2004. Lecture Notes in Computer Science, vol 3207. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30121-9_85

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30121-9_85

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22906-3

  • Online ISBN: 978-3-540-30121-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics