Skip to main content

Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2802))

Abstract

The issue we have focused on in the broad area of security for Pervasive Computing is maintaining trust in an interactive environment. Our solution is based on the premise that computers and implicit interaction mechanisms must function in accordance with the explicit parameters of physical human-human interaction. Otherwise, this results in imbalances between the physical and virtual worlds, which leads to ”windows of vulnerability”. Our solution presented requires an infrastructure of pervasive and context sensing technology, to provide entity mapping, policy and trust management services. We also investigate generating cryptographic keys using the context available The underlying technology is based on the Smart-Its context sensing, computation and communications platform.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abowd, G.D., Dey, A.K., Brown, P.J., Davies, N., Smith, M., Steggles, P.: Towards a better understanding of context and context-awareness. In: Gellersen, H.-W. (ed.) (panel statements) Handheld and Ubiquitous Computing, pp. 304–307. Springer, Berlin (1999)

    Chapter  Google Scholar 

  2. Anderson, R.J.: Security Engineering: A Guide to Building Dependable Distributed Systems, p. 38. Wiley, Chichester (2001)

    Google Scholar 

  3. Arbaugh, W.A., Fithen, W.L., McHugh, J.: Windows of Vulnerability: A Case Study Analysis. IEEE Computer, 52-59 (December 2000)

    Google Scholar 

  4. Beigl, M., Gellersen, H.W., Schmidt, A.: MediaCups: Experience with Design and Use of Computer Augmented Everyday Artefacts. Computer Networks, Special Issue on Pervasive Computing 35(4), 401–409 (2001)

    Google Scholar 

  5. Brown, P., Burleson, W., Lamming, M., Rahlff, O.W., Romano, G., Scholtz, J., Snowdon, D.: Context-awareness: some compelling applications (December 2001), Retrieved from (February 2003), http://www.dcs.ex.ac.uk/~pjbrown/papers/acm.html

  6. Covington, M.J., Long, W., Srinivasan, S., Dey, D., Ahamad, M., Abowd, A.: Securing Context-Aware Applications Using Environment Roles. In: SACMAT 2001, ACM, New York (copyright 2001)

    Google Scholar 

  7. Dourish, P., Bellotti, V.: Awareness and Coordination in Shared Work spaces. In: Proceedings of CSCW 1992, pp. 107-114 (1992)

    Google Scholar 

  8. Hendry, M.: Smart Card Security and Applications. Artech House (1997)

    Google Scholar 

  9. Holmquist, L.E., Falk, J., Wigstroem, J.: Supporting group collaboration with interpersonal awareness devices. Personal Technologies 3, 13–21 (1999)

    Article  Google Scholar 

  10. Holmquist, L.E., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M., Gellersen, H.: Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, p. 116. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  11. HuBaux, J.P., Buttyan, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: Proc. ACM MOBICOM (October 2001)

    Google Scholar 

  12. Hupfeld, F., Beigl, M.: Spatially aware local communication in the RAUM system. In: Scholten, H.J., van Sinderen, M. (eds.) IDMS 2000. LNCS, vol. 1905, pp. 285–296. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  13. Jendricke, U., Kreutzer, M., Zugenmaier, A.: Pervasive Privacy with Identity Management. In: Workshop on Security in Ubiquitous Compiting, UBICOMP 2002 (September 2002)

    Google Scholar 

  14. Jiang, X., Hong, J.I., Landay, J.A.: Socially-Based Modeling of Privacy in Ubiquitous Computing. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 176–193. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  15. Kagal, L., Finin, T., Joshi, A.: Trust-Based Security in Pervasive Computing Environments. IEEE Computer (December 2001)

    Google Scholar 

  16. Kim, Y., Perrig, A., Tsudik, G.: Communication-efficient group key agreement. In: Proceedings of IFIP SEC (2001)

    Google Scholar 

  17. Kindberg, T., Zhang, K.: Context authentication using constrained channels. HP Labs Tech. report HPL-2001-84 (2001)

    Google Scholar 

  18. Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security support for mobile ad-hoc networks. In: Proc. IEEE ICNP, pp. 251–260 (2001)

    Google Scholar 

  19. Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 237–245. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  20. Langheinrich, M., Mattern, F., Romer, K., Vogt, H.: First Steps Towards an Event–Based Infrastructure for Smart Things. In: Ubiquitous Computing Workshop, PACT (2000)

    Google Scholar 

  21. Monrose, F., Reiter, M.K., Li, Q., Lopresti, D.P., Shih, C.: Toward Speech-Generated Cryptographic Keys on Resource Constrained Devices. In: Proceedings of 11th USENIX Security Symposium (2002)

    Google Scholar 

  22. Noble, B.D., Corner, M.D.: The case for transient authentication. Presented at the 10th ACM SIGOPS European Workshop (September 2002)

    Google Scholar 

  23. Norman, D.A.: The Invisible Computer. MIT Press, Cambridge (1999)

    Google Scholar 

  24. Orr, R.J., Abowd, G.D.: The Smart Floor: A Mechanism for Natural User Identification and Tracking, Georgia Institute of Technology (2000)

    Google Scholar 

  25. Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for web transactions. DIMACS Technical Report, 97(15) (April 1997)

    Google Scholar 

  26. Schmidt, A.: Implicit Human-Computer Interaction through Context, Personal Technologies, pp. 191-199 (June 2000)

    Google Scholar 

  27. Schmidt, A., Beigl, M.: New Challenges of Ubiquitous Computing and Augmented Reality. In: 5th CaberNet Radicals Workshop, Valadares, NR. Porto, Portugal, July 5-8 (1998)

    Google Scholar 

  28. Sloman, M., Lupu, E.: Policy Specification for Programmable Networks. In: Covaci, S. (ed.) IWAN 1999. LNCS, vol. 1653, pp. 73–85. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  29. Stadler, M.: Publicly verifiable secret sharing. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 191–199. Springer, Heidelberg (1996)

    Google Scholar 

  30. Strasser, M., Rothermel, K.: System Mechanisms for Partial Rollback of Mobile Agent Execution. In: Proceedings of the 20th International Conference on Distributed Computing Systems (ICDCS 2000), pp. 20–28. IEEE Computer Society, Los Alamitos (2000)

    Chapter  Google Scholar 

  31. Want, R., Fishkin, K.P., Gujar, A., Harrison, B.L.: Bridging Physical and Virtual Worlds with Electronic Tags. In: Proceedings of CHI 1999, ACM Press, New York (1999)

    Google Scholar 

  32. Weiser, M.: Some Computer Science Issues for Ubiquitous Computing. In: PARC 1993 (1993)

    Google Scholar 

  33. Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network 13, 24–30 (1999)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Robinson, P., Beigl, M. (2004). Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds) Security in Pervasive Computing. Lecture Notes in Computer Science, vol 2802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39881-3_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-39881-3_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20887-7

  • Online ISBN: 978-3-540-39881-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics