Skip to main content

Trust-Based and Context-Aware Authentication in a Software Architecture for Context and Proximity-Aware Services

  • Chapter
Architecting Dependable Systems VI

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 5835))

Abstract

We describe an existing software architecture for context and proximity aware services that enables trust-based and context-aware authentication. A service is proximity aware when it automatically detects the presence of entities in its proximity. Authentication is context-aware when it uses contextual information to discern among different identities and to evaluate to which extent they are authentic. The software architecture that we describe here is functioning in our Institute: It manages a sensor network to detect the presence and location of users and their devices. A context manager is responsible to merge the different sources of contextual information, to solve potential contradictions, and to determine the level of authentication of the identity of the person approaching one of the services offered in the coffee-break corners of our Institute. In our solution for context-aware authentication, sensors are managed as if they were recommenders having subjective belief, disbelief, and uncertainty (i.e., trust) on the position and identity of users. A sensor’s subjective trust depends on what it has been sensing in the environment. We discuss the results of an array of simulations that we conducted to validate our concept of trust-based and context-aware authentication. We use Subjective Logic to manage trust.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hulsebosch, H., Lenzini, G., Eertink, H.: Quality of authenticator scheme. Technical Report Public Deliverable D2.3, STORK - Secure Identity Across Borders Linked (2009), http://www.eid-stork.eu/dmdocuments/D2.3_final._1.pdf

  2. Hesselman, C., Eertink, H., Wibbels, M., Sheikh, K., Tokmakoff, A.: Controlled disclosure of context information across ubiquitous computing domains. In: Proc. IEEE Int. Conf. on Sensor Networks Ubiquitous, and Trustworthy Computing (STUC 2008), Taichun, Taiwan, pp. 98–105. IEEE Computer Society, Los Alamitos (2008)

    Chapter  Google Scholar 

  3. Jøsang, A.: A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 9(3), 279–312 (2001)

    MathSciNet  Google Scholar 

  4. Lenzini, G.: Design of architectures for proximity-aware services: Experiments in context- based authentication with subjective logic. In: Proc. of the 4th Int. Work. on Views on Design of Complex Architectures (VODCA 2008), Bertinoro, Italy, August 30-31 (2008)

    Google Scholar 

  5. Lenzini, G., Hulsebosch, R.J., Bargh, M.S.: Trust-enhanced security in location-based adaptive authentication. In: Proc. of the ESORICS 3rd International Workshop on Security and Trust Management (STM 2007), Dresden, Germany, September 27. Electronic Notes in Theoretical Computer Science, vol. 197, pp. 105–119. Elsevier Science Direct, Amsterdam (2008)

    Google Scholar 

  6. Neisse, R., Wegdam, M., van Sinderen, M., Lenzini, G.: Trust management model and architecture for context-aware service platforms. In: Meersman, R., Tari, Z. (eds.) OTM 2007, Part II. LNCS, vol. 4804, pp. 1803–1820. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  7. van Kranenburg, H., Barg, M.S., Iacob, S., Paddemors, A.: A context management framework for supporting context aware distributed applications. IEEE Communications Magazine 44(8), 67–74 (2006)

    Article  Google Scholar 

  8. Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems (2005) (available on line on ScienceDirect) (in press)

    Google Scholar 

  9. Jøsang, A., Hayward, R., Pope, S.: Trust network analysis with subjective logic. In: Proc. of the 29th Australasian Computer Science Conference (ACSC 2006), Australia, January 16-19. ACM International Conference Proceeding Series, vol. 48, pp. 85–94. Australian Computer Society (2006)

    Google Scholar 

  10. Hulsebosch, R.J., Bargh, M.S., Lenzini, G., Ebben, P.W.G., Jacob, S.M.: Context sensitive adaptive authentication. In: Kortuem, G., Finney, J., Lea, R., Sundramoorthy, V. (eds.) EuroSSC 2007. LNCS, vol. 4793, pp. 93–109. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  11. Jøsang, A.: Probabilistic logic under uncertainty. In: Proc. of the 13th Australian Symposium on Theory of Computing (CATS 2007), Ballarat, Victoria, AU. ACM Int. Conf. Proc, vol. 65, pp. 101–110. Austrialian Computer Society Inc. (2007)

    Google Scholar 

  12. Shafer, G.: Belief functions and possibility measures. In: The Analysis of Fuzzy Information. Mathematics and Logic, vol. 1, pp. 51–84. CRC Press, Boca Raton (1987)

    Google Scholar 

  13. Jøsang, A., Pope, S.: Dempster’s rule as seen by little coloured balls, Manuscript, Submitted to Journal of Automated Reasoning (2009)

    Google Scholar 

  14. Berger, A.L., Pietra, S.D., Pietra, V.J.D.: A maximum entropy approach to natural language processing. Computational Linguistics 22(1), 39–71 (1996)

    Google Scholar 

  15. Jøsang, A., Pope, S., Marsh, S.: Exploring different types of trust propagation. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 179–192. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  16. Bardram, J.E., Kjær, R.E., Pederson, M.Ø.: Context-aware user authentication – supporting proximity-based login in pervasive computing. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, pp. 107–123. Springer, Heidelberg (2003)

    Google Scholar 

  17. Cheng, C., Jain, R., van den Berg, E.: Location prediction algorithms for mobile wireless systems, pp. 245–263. CRC Press, Inc., Boca Raton (2003)

    Google Scholar 

  18. Akoush, S., Sameh, A.: Bayesian learning of neural networks for mobile user position prediction. In: Proc. of 16th Int. Conf. on Computer Communications and Networks (ICCCN 2007), August 13-16, pp. 1234–1239 (2007)

    Google Scholar 

  19. Wu, H., Siegel, M., Stiefelhagen, R., Yang, J.: Sensor Fusion using Dempster-Shafer Theory. In: Proc. of 19th IEEE Instrumentation and Measurement Technology Conference (IMTC 2002), May 21-23, pp. 7–12. IEEE Computer Society, Anchorage (2002)

    Google Scholar 

  20. Wu, H., Siegel, M., Ablay, S.: Sensor Fusion using Dempster-Shafer Theory ii: Static Weighting and Kalman Filter-like Dynamic Weighting. In: Proc. of 20th IEEE Instrumentation and Measurement Technology Conference (IMTC 2003), May 20-22, pp. 907–912. IEEE Computer Society, Vail (2003)

    Google Scholar 

  21. Svensson, H., Jøsang, A.: Correlation of Intrusion Alarms with Subjective Logic. Technical Report IMM-TR-2001-14, Informatics and Mathematical Modelling, Technical University of Denmark, DTU (2001)

    Google Scholar 

  22. Jøsang, A., Gray, E., Kinateder, M.: Analysing Topologies of Transitive Trust. In: Dimitrakos, T., Martinelli, F. (eds.) Proc. of the 1st International Workshop on Formal Aspects in Security and Trust (FAST 2003), Pisa, Italy, September 8, pp. 9–22 (2003)

    Google Scholar 

  23. Jøsang, A., Gray, L., Kinateder, M.: Simplification and analysis of transitive trust networks. Web Intelligence and Agent Systems Journal 4(2), 139–161 (2006)

    Google Scholar 

  24. Yan, Z.: Autonomic trust management for a pervasive system. In: Proc. of the Int. Conf. on Security and Cryptography (SECRYPT 2008), Porto, Portugal, July 26-29 (2008)

    Google Scholar 

  25. Mulder, I., Lenzini, G., Bargh, M.S., Hulsebosch, B.: Reading the tea-leaves in an intelligent coffee corner: Challenges for understanding behavior. Behavior Research Methods 41, 820–826

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Lenzini, G. (2009). Trust-Based and Context-Aware Authentication in a Software Architecture for Context and Proximity-Aware Services. In: de Lemos, R., Fabre, JC., Gacek, C., Gadducci, F., ter Beek, M. (eds) Architecting Dependable Systems VI. Lecture Notes in Computer Science, vol 5835. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10248-6_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10248-6_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10247-9

  • Online ISBN: 978-3-642-10248-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics