ABSTRACT
To allow for an efficient usage of an embedded device in pervasive computing environments, reliable and yet convenient user access is an important requirement. The problem becomes more complex when the accessed device is shared by the public with many different individuals. This paper first illustrates the common pitfalls and issues of establishing sessions to such devices. The paper then proposes a context-aware solution that uses different contexts to capture a usage session. The paper presents a general system design that supports a secure, selective, and identifiable user access of public shared devices with high usability. We have also implemented a prototype system to demonstrate the concept.
- M. D. Corner, and B. D. Noble, "Zero-Interaction Authentication," Proceedings of Eighth Annual International Conference on Mobile Computing and Networking (Mobicom), 2002, pp. 23--28. Google ScholarDigital Library
- J. E. Bardram, R. E. Kjær, and M. Pedersen. "Context-Aware User Authentication -- Supporting Proximity-Based Login in Pervasive Computing," Proceedings of Fifth International Conference on Ubiquitous Computing (Ubicomp), LNCS 2864, Springer, 2003, pp. 107--123.Google Scholar
- D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong, "Talking to Strangers: Authentication in Ad-Hoc Wireless Networks," Proceedings of Network and Distributed System Security Symposium (NDSS), Internet Society, 2002, pp. 23--35.Google Scholar
- F. Stajano and R. Anderson, "The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks," Proceedings of the 7th International Workshop on Security Protocols, LNCS 1796, Springer, 1999, pp. 172--194. Google ScholarDigital Library
- S. K. S. Gupta, T. Mukherjee, K. Venkatasubramanian, and T. Taylor, "Proximity Based Access Control in Smart-Emergency Departments," Proceedings of 4th IEEE Conference on Pervasive Computing Workshops, First Workshop On Ubiquitous&Pervasive Health Care (UbiCare), 2006, pp. 512--516. Google ScholarDigital Library
- L. E. Holmquist, F. Mattern, B. Schiele, P. Alahuhta, M. Beigl, and H. W. Gellersen, "Smart-Its Friends: A Technique for Users to Easily Establish Connections between Artefacts," Proceedings of Third International Conference on Ubiquitous Computing (Ubicomp), LNCS 2201, Springer, 2001, pp. 116--122. Google ScholarDigital Library
- S. M. Bellovin and M. Merritt, "Encrypted key exchange: password-based protocols secure against dictionary attacks," Proceedings of the IEEE Symposium on Security and Privacy, 1992, pp. 72--84. Google ScholarDigital Library
- N. Saxena J. Ekberg, K. Kostiainen, and N. Asokan, "Secure Device Pairing based on a Visual Channel," Proceedings of the 2006 IEEE Symposium on Security and Privacy, 2006, pp. 306--313. Google ScholarDigital Library
- M. Goodrich, M. Sirivianos, J. Solis, G. Tsudik, and E. Uzun, "Loud and Clear: Human-verifiable Authentication Based on Audio," Proceedings of 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06), 2006, pp. 10. Google ScholarDigital Library
- M.J Moyer, M. Ahamad, "Generalized Role-Based Access Control," Proceedings of the 21st IEEE International Conference on Distributed Computing System, 2001, pp. 391--398. Google ScholarDigital Library
- Crossbow MICAz platform, http://www.xbow.com/Products/productdetails.aspx?sid=164Google Scholar
- D. Jea, I. Yap, and M. B. Srivastava, "User Access of Public Shared Devices in Pervasive Computing Environments," to be appear in Workshop On High Confidence Medical Devices, Software, and Systems (HCMDSS), 2007 Google ScholarDigital Library
- G. Zhang and M. Parashar, "Context-Aware Dynamic Access Control for Pervasive Applications," Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), 2004, pp. 219--225.Google Scholar
- H. Park, J. Friedman, J. Burke, and M. B. Srivastava. "A new light sensing module for mica motes," In The 4th IEEE Conference on Sensors, 2005.Google Scholar
Index Terms
- Context-aware access to public shared devices
Recommendations
A generalized context-based access control model for pervasive environments
SPRINGL '09: Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBSPervasive Computing Environments enable new opportunities for users to share and to access resources anytime and anywhere in a more natural way, making access control a critical issue. These heterogeneous and dynamic sensor-rich environments ...
Context-aware role-based access control in pervasive computing systems
SACMAT '08: Proceedings of the 13th ACM symposium on Access control models and technologiesIn this paper we present a context-aware RBAC (CARBAC) model for pervasive computing applications. The design of this model has been guided by the context-based access control requirements of such applications. These requirements are related to users' ...
Context-aware pervasive service composition and its implementation
Incorporating service composition and pervasive computing into managing users' complex everyday activities calls for the Pervasive Service Composition paradigm for everyday life. In this paper, we propose the concept of Context-Aware Pervasive Service ...
Comments