skip to main content
10.1145/2638728.2641706acmconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
research-article

Exploring the design space for geo-fenced connected devices and services at home

Published:13 September 2014Publication History

ABSTRACT

This paper offers a reflection on the design space for a geo-fenced connected device and service (GFS) - a specification enforcing that a connected device can only be used within a virtual perimeter. Many connected devices are nowadays being accessed through applications running on mobile devices instead of tangible controls. Whilst this ubiquitous access is highly convenient, it is also making connected devices more vulnerable. As such, we reintroduce location-constrained interaction, adapted to connected devices present in a modern home, and explore three design cardinals: (i) spatial granularity, (ii) roles and delegation, and (iii) access control. We report on a qualitative study that explored this design space through a prototype geo-fenced connected lighting system. Our findings suggest that users would like to have geo-fencing for a subset of connected devices, prefer to define geo-fences statically but with different granularities for different devices, and desire access control through location verification and credentials.

References

  1. iOS: Understanding iBeacon. http://support.apple.com/kb/HT6048.Google ScholarGoogle Scholar
  2. Kontakt ibeacon. http://kontakt.io.Google ScholarGoogle Scholar
  3. Nest. https://nest.com.Google ScholarGoogle Scholar
  4. node.js. http://nodejs.org.Google ScholarGoogle Scholar
  5. OpenID Authentication 2.0. http://openid.net/specs/.Google ScholarGoogle Scholar
  6. Philips Hue. http://meethue.com.Google ScholarGoogle Scholar
  7. The OAuth 2.0 Authorization Framework. http://tools.ietf.org/html/rfc6749.Google ScholarGoogle Scholar
  8. Bareth, U. Privacy-aware and Energy-efficient Geofencing through Reverse Cellular Positioning. In Proceedings of IWCMC'12 (2012), 153--158.Google ScholarGoogle ScholarCross RefCross Ref
  9. Brush, A. J. B., Lee, B., Mahajan, R., Agarwal, S., Saroiu, S., and Dixon, C. Home automation in the wild: challenges and opportunities. In Proceedings of CHI'11 (2011), 2115--2124. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Kawsar, F., and Brush, A. J. B. Home Computing Unplugged: Why, Where and when People Use Different Connected Devices at Home. In Proceedings of UbiComp'13 (2013), 627--636. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Kim, T. H.-J., Bauer, L., Newsome, J., Perrig, A., and Walker, J. Challenges in Access Right Assignment for Secure Home Networks. In Proceedings HotSec'10 (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Kindberg, T., Zhang, K., and Shankar, N. Context Authentication Using Constrained Channels. In Proceedings of WMCSA'02 (2002), 14--21. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Luo, W., and Hengartner, U. VeriPlace: A Privacy-aware Location Proof Architecture. In Proceedings of GIS'10 (2010), 23--32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Mennicken, S., and Huang, E. M. Hacking the Natural Habitat: An In-the-wild Study of Smart Homes, Their Development, and the People Who Live in Them. In Proceedings of Pervasive'12 (2012), 143--160. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Saroiu, S., and Wolman, A. Enabling New Mobile Applications with Location Proofs. In Proceedings of HotMobile'09 (2009), 31--36. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Sastry, N., Shankar, U., and Wagner, D. Secure Verification of Location Claims. In Proceedings of WiSe'03 (2003), 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Takayama, L., Pantofaru, C., Robson, D., Soto, B., and Barry, M. Making technology homey: Finding sources of satisfaction and meaning in home automation. In Proceedings of UbiComp'12 (2012), 511--520. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Zhu, Z., and Cao, G. APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services. In Proceedings of INFOCOM'11 (2011), 1889--1897.Google ScholarGoogle Scholar

Index Terms

  1. Exploring the design space for geo-fenced connected devices and services at home

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      UbiComp '14 Adjunct: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication
      September 2014
      1409 pages
      ISBN:9781450330473
      DOI:10.1145/2638728

      Copyright © 2014 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 13 September 2014

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate764of2,912submissions,26%

      Upcoming Conference

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader