Abstract
Security, privacy and dependability are crucial issues if one wants to build a real smart home. First, in addition to established home security requirements, smart home adoption requires to solve brand-new security vulnerabilities deriving from the automated facets of smart homes. Thereafter, pervasive computing and ambient intelligence allow to collect a lot of information, to analyze it to derive new facts, and make them explicit. Finally, systems that are usually safe and dependable can fail when their behavior is becoming controlled as the result of complex interactions between many intertwined information systems. Unfortunately, application developers in smart home environments are usually neither security experts, nor familiar with ethical and legal requirements related to privacy. Security patterns can help to anticipate, overcome, and document systematically these difficult issues in building pervasive information systems in smart homes for cognitively impaired people. In this paper, we illustrate how security patterns can be extended and applied to Smart Home to foster autonomy of elderly or cognitively impaired people, then, we sketch the structure of the catalog which will be populated with a few patterns.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
He, W., et al.: 65+ in the U.S.: Current Population Reports, pp. 23–209. U.S. Bureau of the Census, Washington (2005)
Jorge, J.: Adaptive tools for the elderly new devices to cope with age induced cognitive disabilities. In: Proceedings of the 2001 WUAUC, pp. 66–70 (2001)
Pigot, H., Mayers, A., Giroux, S.: The intelligent habitat and everyday life activity support. In: Proceedings of the 5th International Conference on Simulations in Biomedicine, Slovenia, pp. 507–516 (2003)
Bauchet, J., Vergnes, D., Giroux, S., Pigot, H.: A pervasive cognitive assistant for smart homes. In: Proceedings of the 2006 ICADI, USA, p. 228 (2006)
Bauchet, J., Mayers, A.: A modelisation of ADLs in its environment for cognitive assistance. In: Proceedings of the 2005 ICOST, Canada, pp. 221–228 (2005)
Busnel, P., El Khoury, P., Giroux, S., Li, K.: Achieving Socio-Technical Confidentiality using Security Pattern in Smart Homes. In: 3rd International Symposium on Smart Home (SH 2008), China (2008)
El Khoury, P., Busnel, P., Giroux, S., Li, K.: Enforcing Security in Smart Homes using Security Patterns. International Journal of Smart Home (IJSH)Â 3(2) (2009)
Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley Professional, Reading (1994)
Schumacher, M.: Security Engineering with Patterns: Origins, Theoretical Models, and New Applications. LNCS, vol. 2754. Springer, Heidelberg (2003)
Yoder, J., Barcalow, J.: Architectural Patterns for Enabling Application Security. In: Conference on Pattern Languages of Programs (1997)
Fernandez, E., Pan, R.: A Pattern Language for Security Models. In: Conference on Pattern Languages of Programs (2001)
Schumacher, M., Roedig, U.: Security Engineering with Patterns. In: Conference on Pattern Languages of Programs, USA (2001)
Kienzle, D., Elder, M., Tyree, D., Edwards-Hewitt, J.: Security Patterns Template and Tutorial (2002), http://www.securitypatterns.com/documents.html
Everyware: The Dawning Age of Ubiquitous Computing, 272 p. Peachpit Press Publications, Berkeley (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Busnel, P., Giroux, S. (2010). Security, Privacy, and Dependability in Smart Homes: A Pattern Catalog Approach. In: Lee, Y., et al. Aging Friendly Technology for Health and Independence. ICOST 2010. Lecture Notes in Computer Science, vol 6159. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13778-5_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-13778-5_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13777-8
Online ISBN: 978-3-642-13778-5
eBook Packages: Computer ScienceComputer Science (R0)