Abstract
Within the scenario of a Smart Home, we discuss the issues involved in allowing limited interaction with the environment for unidentified principals, or guests. The challenges include identifying and authenticating guests on one hand and delegating authorization to them on the other. While the technical mechanisms for doing so in generic distributed systems have been around for decades, existing solutions are in general not applicable to the smart home because they are too complex to manage. We focus on providing both security and usability; we therefore seek simple and easy to understand approaches that can be used by a normal computer-illiterate home owner, not just by a trained system administrator. This position paper describes ongoing research and does not claim to have all the answers.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Kidd, C.D., Orr, R., Abowd, G.D., Atkeson, C.G., Essa, I.A., MacIntyre, B., Mynatt, E.D., Starner, T., Newstetter, W.: The aware home: A living laboratory for ubiquitous computing research. In: Streitz, N.A., Hartkopf, V. (eds.) CoBuild 1999. LNCS, vol. 1670, pp. 191–198. Springer, Heidelberg (1999)
Cooperstock, J.R., Tanikoshi, K., Beirne, G., Narine, T., Buxton, W.: Evolution of a reactive environment. In: Proc. of CHI 1995, Denver, CO, pp. 170–177 (1995)
Weatherall, J., Jones, A.: Ubiquitous networks and their applications. IEEE Wireless Communications 9, 18–19 (2002)
Sellen, A., Eardley, R., Izadi, S., Harper, R.: The whereabouts clock: early testing of a situated awareness device. In: CHI 2006: CHI 2006 extended abstracts on Human factors in computing systems, pp. 1307–1312. ACM Press, New York (2006)
Harper, R. (ed.): Inside the Smart Home. Springer, Heidelberg (2003)
IEEE 802.15 WPAN Task Group 4: ANSI/IEEE 802.15.4-2003, Wireless Medium Access Control and Physical Layer Specifications for Low-Rate Wireless Personal Area Networks. IEEE, New York (2003)
Hightower, J., Borriello, G.: Location systems for ubiquitous computing. IEEE Computer 34(8), 57–66 (2001)
Beresford, A.R.: Location privacy in ubiquitous computing. Technical Report UCAM-CL-TR-612, University of Cambridge, Computer Laboratory (2005)
Harter, A., Hopper, A., Steggles, P., Ward, A., Webster, P.: The anatomy of a context-aware application. In: Mobile Computing and Networking, pp. 59–68 (1999)
Stajano, F.: Security for Ubiquitous Computing. John Wiley and Sons, Chichester (2002)
Wong, F.L., Stajano, F.: Multi-channel protocols. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2005. LNCS, vol. 4631, pp. 112–127. Springer, Heidelberg (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Johnson, M., Stajano, F. (2009). Usability of Security Management:Defining the Permissions of Guests. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2006. Lecture Notes in Computer Science, vol 5087. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04904-0_36
Download citation
DOI: https://doi.org/10.1007/978-3-642-04904-0_36
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04903-3
Online ISBN: 978-3-642-04904-0
eBook Packages: Computer ScienceComputer Science (R0)