Abstract
As the vision of ubiquitous computing becomes reality smart devices are embedded into our surroundings and domestic appliances providing services transparently. The nature of such smart computing environments is open and dynamic; therefore the use of predefined security associations between all of the participating devices is particularly difficult. Our proposal, called ÆTHER, defines a security management architecture designed specifically to address access control and the establishment of associations in smart environments. Attribute authority sets and access control policy entries are embedded into pervasive devices defining initial trust relationships. Members of the attribute authority sets are trusted to issue credentials for the corresponding attributes that can then be used to gain access to services provided by smart devices. We allow these sets to grow dynamically without requiring manual reconfiguration facilitating decentralized administration, which is required in volatile pervasive environments, and attribute mapping to allow roaming among smart authority domains.
The first author is supported by the Irish Research Council for Science, Engineering and Technology as part of the Embark Initiative, under contract number RS/2002/599-2.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Argyroudis, P.G., Verma, R., Tewari, H., O’Mahony, D.: Performance analysis of cryptographic protocols on handheld devices. Technical report TCD-CS-2003-46, University of Dublin, Trinity College (2003)
Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: Talking to strangers: authentication in ad hoc wireless networks. In: Proc. 9th Network and Distributed System Security Symposium (2002)
Blaze, M., Feigenbaum, J., Keromytis, A.D.: The KeyNote trust management system version 2. Internet Engineering Task Force RFC 2704 (1999)
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proc. 1996 IEEE Symposium on Security and Privacy, pp. 164–173 (1996)
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Brumitt, B., Meyers, B., Krumm, J., Kern, A., Shafer, S.: EasyLiving: technologies for intelligent environments. In: Proc. 2nd Int’l. Symposium on Handheld and Ubiquitous Computing, pp. 12–29 (2000)
Clarke, D., Elien, J.-E., Ellison, C., Fredette, M., Morcos, A., Rivest, R.L.: Certificate chain discovery in SPKI/SDSI. Journal of Computer Security 9(4), 285–322 (2001)
Dublin Ad hoc Wireless Network (DAWN), see http://ntrg.cs.tcd.ie/dawn.php
Ellison, C., Frantz, B., Lampson, B., Rivest, R.L., Thomas, B., Ylonen, T.: SPKI certificate theory. Internet Engineering Task Force RFC 2693 (1999)
Gligor, V., Gavrilla, S.I., Ferraiolo, D.F.: On the formal definition of separation of duty policies and their composition. In: Proc. 1998 IEEE Symposium on Security and Privacy, pp. 172–183 (1998)
Herzberg, A., Mass, Y., Mihaeli, J., Naor, D., Ravid, Y.: Access control meets public key infrastructure, or: assigning roles to strangers. In: Proc. 2000 IEEE Symposium on Security and Privacy, pp. 2–14 (2000)
ISO/ITU-T Recommendation X.509. The directory: authentication framework (2001)
LaPlant, B., Trewin, S., Zimmermann, G., Vanderheiden, G.: The universal remote console: a universal access bus for pervasive computing. IEEE Pervasive Computing 1(3), 76–80 (2004)
Linn, J., Nystrom, M.: Attribute certification: an enabling technology for delegation and role-based controls in distributed environments. In: Proc. 4th ACM Workshop on Role- Based Access Control, pp. 121–130 (1999)
O’Mahony, D., Doyle, L.: Mobile computing: implementing pervasive information and communication technologies. chapter: An adaptable node architecture for future wireless networks. Kluwer Publishing, Dordrecht (2001)
Stajano, F.: The resurrecting duckling – what next? In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2000. LNCS, vol. 2133, pp. 204–214. Springer, Heidelberg (2001)
Stajano, F., Anderson, R.: The resurrecting duckling: security issues in ad hoc wireless networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172–182. Springer, Heidelberg (2000)
Want, R., Schilit, B.N., Adams, N.I., Gold, R., Petersen, K., Ellis, J.R., Goldberg, D., Weiser, M.: An overview of the PARCTAB ubiquitous computing experiment. IEEE Personal Communications 2(6), 28–33 (1995)
Weiser, M.: The computer for the twenty-first century. Scientific American 265(3), 94–104 (1991)
Winsborough, W.H., Li, N.: Towards practical automated trust negotiation. In: Proc. 3rd Int’l. Workshop on Policies for Distributed Systems and Networks, pp. 92–103 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Argyroudis, P.G., O’Mahony, D. (2004). Securing Communications in the Smart Home. In: Yang, L.T., Guo, M., Gao, G.R., Jha, N.K. (eds) Embedded and Ubiquitous Computing. EUC 2004. Lecture Notes in Computer Science, vol 3207. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30121-9_85
Download citation
DOI: https://doi.org/10.1007/978-3-540-30121-9_85
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22906-3
Online ISBN: 978-3-540-30121-9
eBook Packages: Springer Book Archive