Abstract
In recent years the number of Ambient Intelligent systems is growing steadily, especially several fields such as domotic and remote teaching are practical applications of AmI. A relevant characteristic of these systems is sharing a double goal, comfort and simplicity of final users. However, the adoption of these scenarios lacks of a security basis. We defend that security is an essential feature to deploy in any kind of system. Security in conventional systems is a currently unsolved challenge and new attacks and vulnerabilities of systems arise everyday, in AAL systems the problem is even more complex since whether security challenges are hard in homogeneous solutions these escalate when moving to highly dynamic and heterogeneous systems. Several technical solutions have been proposed for specific security components in AAL systems, but the problem to solve the security of the whole system is still open. We address this problem providing a security architecture for the universAAL infrastructure. Among all the different security properties (trust, authenticity, integrity, confidentiality and accountability) we focus on the authorization and authentication, this paper presents a semantic based access control model for universAAL.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Aarts, E., Harwig, R., Schuurmans, M.: Ambient Intelligence, pp. 235–250. McGraw-Hill (2002)
Costa, R., Carneiro, D., Novais, P., Lima, L., Machado, J., Marques, A., Neves, J.: Ambient Assisted Living. In: 3rd Symposium of Ubiquitous Computing and Ambient Intelligence, Berlin, Heidelberg. AISC, vol. 51, pp. 86–94 (2009)
Hanke, S., et al.: universAAL - An Open and Consolidated AAL Platform. In: Wichert, R., Eberhardt, B. (eds.) Ambient Assisted Living, pp. 127–140 (2011)
Shibboleth Consortium. Shibboleth, http://shibboleth.net/
Chadwick, D.W., Otenko, A.: The PERMIS X.509 role based privilege management infrastructure. In: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, SACMAT 2002, pp. 135–140 (2002)
Rigney, C., Willens, S., Rubens, A., Simpson, W.: Remote Authentication Dial In User Service (RADIUS). Technical Report 1645, Network Working Group (2000)
Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: Session Initiation Protocol. Technical report, RFC 3261 (2002)
Koshutanski, H., Massacci, F.: Interactive access control for autonomic systems: From th eory to Implementation. ACM Transactions on Autonomous and Adaptive Systems 3(3), 1–31 (2008)
OpenLDAP Foundation. Lightweight Directory Access Protocol (LDAP): Technical Specification Road Map. Technical report, Network Working Group (2006)
Spyns, P., Oberle, D., Volz, R., Zheng, J., Jarrar, M., Sure, Y., Studer, R., Meersman, R.: OntoWeb - A Semantic Web Community Portal. In: Karagiannis, D., Reimer, U. (eds.) PAKM 2002. LNCS (LNAI), vol. 2569, pp. 189–200. Springer, Heidelberg (2002)
Jacek, K., Vitvar, T., Fensel, D.: D3.4.3 MicroWSMO and hRESTS (2008)
Tazari, M.-R., Furfari, F., Ramos, J.-P.L., Ferro, E.: The PERSONA Service Platform for AAL Spaces. In: Nakashima, H., Aghajan, H., Augusto, J.C. (eds.) Handbook of Ambient Intelligence and Smart Environments, pp. 1171–1199. Springer US, Boston (2010)
Gong, L., Ellison, G., Dageforde, M.: Inside JavaTM 2 Platform Security: Architecture, API Design, and Implementation, 2nd edn. Prentice Hall (2003)
Ahler, M., Grinewitschus, V., Ressel, C., Miranda, J.M., Ramos, Á., Mevissen, R., Tobies, S.: Detailed Design of the Amigo Middleware Core Security & Privacy, Content Distribution, Data Storage. Technical report (2005)
Miller, S.P., Neuman, B.C., Schiller, J.I., Saltzer, J.H.: Kerberos authentication and authorization system. In: Project Athena Technical Plan, pp. 1–32 (1987)
Ferraiolo, D.F., Kuhn, D.R.: Role-Based Access Controls. In: 15th National Computer Security Conference, vol. 2, pp. 554–563. Artech House Publishers, Baltimore (1992)
National Institute of Standards and Technology. Data encryption standard (des) (1999)
Kelly, S.: Aruba Networks. Security Implications of Using the Data Encryption Standard (DES). Technical report, Network Working Group (2006)
Scarfone, K., Padgette, J.: Guide to Bluetooth security. NIST Special Publication, 800:121 (2008)
Wi-fi Alliance. Wi-Fi Protected Setup Specification, pp. 1–110 (December 2006)
OASIS Security Services TC. SAML 2.0 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Antón, P., Muñoz, A., Maña, A. (2012). Authentication and Authorization in Ambient Assisting Living Applications: An Approach for UniversAAL. In: Bravo, J., Hervás, R., Rodríguez, M. (eds) Ambient Assisted Living and Home Care. IWAAL 2012. Lecture Notes in Computer Science, vol 7657. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35395-6_19
Download citation
DOI: https://doi.org/10.1007/978-3-642-35395-6_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35394-9
Online ISBN: 978-3-642-35395-6
eBook Packages: Computer ScienceComputer Science (R0)