skip to main content
10.1145/1248054.1248059acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
Article

Context-aware access to public shared devices

Published:11 June 2007Publication History

ABSTRACT

To allow for an efficient usage of an embedded device in pervasive computing environments, reliable and yet convenient user access is an important requirement. The problem becomes more complex when the accessed device is shared by the public with many different individuals. This paper first illustrates the common pitfalls and issues of establishing sessions to such devices. The paper then proposes a context-aware solution that uses different contexts to capture a usage session. The paper presents a general system design that supports a secure, selective, and identifiable user access of public shared devices with high usability. We have also implemented a prototype system to demonstrate the concept.

References

  1. M. D. Corner, and B. D. Noble, "Zero-Interaction Authentication," Proceedings of Eighth Annual International Conference on Mobile Computing and Networking (Mobicom), 2002, pp. 23--28. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. J. E. Bardram, R. E. Kjær, and M. Pedersen. "Context-Aware User Authentication -- Supporting Proximity-Based Login in Pervasive Computing," Proceedings of Fifth International Conference on Ubiquitous Computing (Ubicomp), LNCS 2864, Springer, 2003, pp. 107--123.Google ScholarGoogle Scholar
  3. D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong, "Talking to Strangers: Authentication in Ad-Hoc Wireless Networks," Proceedings of Network and Distributed System Security Symposium (NDSS), Internet Society, 2002, pp. 23--35.Google ScholarGoogle Scholar
  4. F. Stajano and R. Anderson, "The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks," Proceedings of the 7th International Workshop on Security Protocols, LNCS 1796, Springer, 1999, pp. 172--194. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S. K. S. Gupta, T. Mukherjee, K. Venkatasubramanian, and T. Taylor, "Proximity Based Access Control in Smart-Emergency Departments," Proceedings of 4th IEEE Conference on Pervasive Computing Workshops, First Workshop On Ubiquitous&Pervasive Health Care (UbiCare), 2006, pp. 512--516. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. L. E. Holmquist, F. Mattern, B. Schiele, P. Alahuhta, M. Beigl, and H. W. Gellersen, "Smart-Its Friends: A Technique for Users to Easily Establish Connections between Artefacts," Proceedings of Third International Conference on Ubiquitous Computing (Ubicomp), LNCS 2201, Springer, 2001, pp. 116--122. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. S. M. Bellovin and M. Merritt, "Encrypted key exchange: password-based protocols secure against dictionary attacks," Proceedings of the IEEE Symposium on Security and Privacy, 1992, pp. 72--84. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. N. Saxena J. Ekberg, K. Kostiainen, and N. Asokan, "Secure Device Pairing based on a Visual Channel," Proceedings of the 2006 IEEE Symposium on Security and Privacy, 2006, pp. 306--313. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Goodrich, M. Sirivianos, J. Solis, G. Tsudik, and E. Uzun, "Loud and Clear: Human-verifiable Authentication Based on Audio," Proceedings of 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06), 2006, pp. 10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M.J Moyer, M. Ahamad, "Generalized Role-Based Access Control," Proceedings of the 21st IEEE International Conference on Distributed Computing System, 2001, pp. 391--398. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Crossbow MICAz platform, http://www.xbow.com/Products/productdetails.aspx?sid=164Google ScholarGoogle Scholar
  12. D. Jea, I. Yap, and M. B. Srivastava, "User Access of Public Shared Devices in Pervasive Computing Environments," to be appear in Workshop On High Confidence Medical Devices, Software, and Systems (HCMDSS), 2007 Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. G. Zhang and M. Parashar, "Context-Aware Dynamic Access Control for Pervasive Applications," Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), 2004, pp. 219--225.Google ScholarGoogle Scholar
  14. H. Park, J. Friedman, J. Burke, and M. B. Srivastava. "A new light sensing module for mica motes," In The 4th IEEE Conference on Sensors, 2005.Google ScholarGoogle Scholar

Index Terms

  1. Context-aware access to public shared devices

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      HealthNet '07: Proceedings of the 1st ACM SIGMOBILE international workshop on Systems and networking support for healthcare and assisted living environments
      June 2007
      110 pages
      ISBN:9781595937674
      DOI:10.1145/1248054
      • General Chairs:
      • Robin Kravets,
      • Chiara Petrioli

      Copyright © 2007 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 11 June 2007

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Upcoming Conference

      MOBISYS '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader