Skip to main content

Security, Privacy, and Dependability in Smart Homes: A Pattern Catalog Approach

  • Conference paper
Aging Friendly Technology for Health and Independence (ICOST 2010)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6159))

Included in the following conference series:

Abstract

Security, privacy and dependability are crucial issues if one wants to build a real smart home. First, in addition to established home security requirements, smart home adoption requires to solve brand-new security vulnerabilities deriving from the automated facets of smart homes. Thereafter, pervasive computing and ambient intelligence allow to collect a lot of information, to analyze it to derive new facts, and make them explicit. Finally, systems that are usually safe and dependable can fail when their behavior is becoming controlled as the result of complex interactions between many intertwined information systems. Unfortunately, application developers in smart home environments are usually neither security experts, nor familiar with ethical and legal requirements related to privacy. Security patterns can help to anticipate, overcome, and document systematically these difficult issues in building pervasive information systems in smart homes for cognitively impaired people. In this paper, we illustrate how security patterns can be extended and applied to Smart Home to foster autonomy of elderly or cognitively impaired people, then, we sketch the structure of the catalog which will be populated with a few patterns.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. He, W., et al.: 65+ in the U.S.: Current Population Reports, pp. 23–209. U.S. Bureau of the Census, Washington (2005)

    Google Scholar 

  2. Jorge, J.: Adaptive tools for the elderly new devices to cope with age induced cognitive disabilities. In: Proceedings of the 2001 WUAUC, pp. 66–70 (2001)

    Google Scholar 

  3. Pigot, H., Mayers, A., Giroux, S.: The intelligent habitat and everyday life activity support. In: Proceedings of the 5th International Conference on Simulations in Biomedicine, Slovenia, pp. 507–516 (2003)

    Google Scholar 

  4. Bauchet, J., Vergnes, D., Giroux, S., Pigot, H.: A pervasive cognitive assistant for smart homes. In: Proceedings of the 2006 ICADI, USA, p. 228 (2006)

    Google Scholar 

  5. Bauchet, J., Mayers, A.: A modelisation of ADLs in its environment for cognitive assistance. In: Proceedings of the 2005 ICOST, Canada, pp. 221–228 (2005)

    Google Scholar 

  6. Busnel, P., El Khoury, P., Giroux, S., Li, K.: Achieving Socio-Technical Confidentiality using Security Pattern in Smart Homes. In: 3rd International Symposium on Smart Home (SH 2008), China (2008)

    Google Scholar 

  7. El Khoury, P., Busnel, P., Giroux, S., Li, K.: Enforcing Security in Smart Homes using Security Patterns. International Journal of Smart Home (IJSH) 3(2) (2009)

    Google Scholar 

  8. Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley Professional, Reading (1994)

    Google Scholar 

  9. Schumacher, M.: Security Engineering with Patterns: Origins, Theoretical Models, and New Applications. LNCS, vol. 2754. Springer, Heidelberg (2003)

    Google Scholar 

  10. Yoder, J., Barcalow, J.: Architectural Patterns for Enabling Application Security. In: Conference on Pattern Languages of Programs (1997)

    Google Scholar 

  11. Fernandez, E., Pan, R.: A Pattern Language for Security Models. In: Conference on Pattern Languages of Programs (2001)

    Google Scholar 

  12. Schumacher, M., Roedig, U.: Security Engineering with Patterns. In: Conference on Pattern Languages of Programs, USA (2001)

    Google Scholar 

  13. Kienzle, D., Elder, M., Tyree, D., Edwards-Hewitt, J.: Security Patterns Template and Tutorial (2002), http://www.securitypatterns.com/documents.html

  14. Everyware: The Dawning Age of Ubiquitous Computing, 272 p. Peachpit Press Publications, Berkeley (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Busnel, P., Giroux, S. (2010). Security, Privacy, and Dependability in Smart Homes: A Pattern Catalog Approach. In: Lee, Y., et al. Aging Friendly Technology for Health and Independence. ICOST 2010. Lecture Notes in Computer Science, vol 6159. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13778-5_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13778-5_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13777-8

  • Online ISBN: 978-3-642-13778-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics