Personal and Ubiquitous Computing

, Volume 14, Issue 4, pp 321–334 | Cite as

Context-based authentication and transport of cultural assets

  • Leonardo MostardaEmail author
  • Changyu Dong
  • Naranker Dulay
Original Article


We present a ubiquitous system that combines context information, security mechanisms and a transport infrastructure to provide authentication and secure transport of works of art. Authentication is provided for both auctions and exhibitions, where users can use their own mobile devices to authenticate works of art. Transport is provided by a secure protocol that makes use of position–time information and wireless sensors providing context information. The system has been used in several real case studies in the context of the CUSPIS project and continues to be used as a commercial product for the transportation and exhibition of cultural assets in Italy.


Ubiquitous systems Authentication 



This research was supported by UK EPSRC research grants EP/D076633/1 (UBIVAL) and EP/C537181/1 (CAREGRID). We would also like to thank the members of the Policy Research Group at Imperial College, and the CUSPIS partners: the Next S.p.A. research group, Vodafone, and the Italian and Greek ministries who supported our case studies.


  1. 1.
    Mostarda L, Dong C, Dulay N (2008) Place and time authentication of cultural assets. In: 2nd Joint ITRUST and PST conferences on privacy, trust and security (IFIPTM 2008)Google Scholar
  2. 2.
    Center of Study TCI: Dossier of MUSEUM (2006)
  3. 3.
    Artprice: 2006 Art Market Trends, Tendances du marche’ de l’art (2006)
  4. 4.
    Jacob J (2002) Counterfeit art—how to keep it out of your collection. Chubb CollectorsGoogle Scholar
  5. 5.
    Mostarda L, Tocchio A, Inverardi P, Costantini S (2007) A geo time authentication system. In: Proceeding of IFIPTM 2007Google Scholar
  6. 6.
    Radiocarbon Dating (2002) BBC on line resource.
  7. 7.
    Thermoluminescence (2002) Minnesota State University.
  8. 8.
    Klarreich E (2004) Con artists: Scanning program can discern true art. science news 166:340CrossRefGoogle Scholar
  9. 9.
    CUSPIS demonstration and performance evaluation report (2007) CUSPIS official home page.
  10. 10.
    Stallings W (2006) Cryptography and network security: principles and practice, 4th edn. Prentice HallGoogle Scholar
  11. 11.
    Web page on EPC global organization (2008)
  12. 12.
    Buchanan JDR, Cowburn RP, Jausovec AV, Petit D, Seem P, Xiong G, Atkinson D, Fenton K, Allwood DA, Bryan MT (2005) ‘Fingerprinting’ documents and packaging. Nature 436:475CrossRefGoogle Scholar
  13. 13.
    Pozzobon O, Wullems C, Kubic K (2004) Secure tracking using trusted GNSS receivers and Galileo authentication services. J Glob Position Syst 3:200–207CrossRefGoogle Scholar
  14. 14.
    Cultural Heritage Space Identification System (CUSPIS) (2007) European Commission 6th framework program—2nd call Galileo joint undertaking.
  15. 15.
  16. 16.
    Official web page of Galileo (2008)
  17. 17.
    Augello A, Santangelo A, Sorce S, Pilato G, Gentile A, Genco A, Gaglio S (2006) Maga: a mobile archaeological guide at Agrigento. University of Palermo, ICAR_CNRGoogle Scholar
  18. 18.
    Pilato G, Augello A, Santangelo A, Gentile A, Gaglio S (2006) An intelligent multimodal site-guide for the “parco archeologico della valle dei templi” in Agrigento. In: Proceedings of first European workshop on intelligent technologies for cultural heritage exploitation, at the 17th European conference on artificial intelligenceGoogle Scholar
  19. 19.
    Park D, Nam T, Shi C, Golub G, Loan CV (2006) Designing an immersive tour experience system for cultural tour sites. In: Chi ’06 extended abstracts on human factors in computing systems edition, April 22–27. ACM Press, Montréal, Québec, Canada, pp 1193–1198Google Scholar
  20. 20.
    Vicenzaoro winter: Traceability and guarantee label (2007)
  21. 21.
    Juels A (2006) Rfid security and privacy: a research survey. IEEE J Sel Areas CommunGoogle Scholar
  22. 22.
    Caputo T (2005) Rfid technology beyond wal-mart. WinesandVinesGoogle Scholar
  23. 23.
    Web page of the TagStream Company (2008)
  24. 24.
    Texas Instruments and VeriSign, Inc. (2007) Securing the pharmaceutical supply chain with RFID and public-key infrastructure technologiesGoogle Scholar
  25. 25.
    Juels A, Weis SA (2005) Authenticating pervasive devices with human protocols. In: Shoup V (ed) CRYPTO. Volume 3621 of lecture notes in computer science. Springer, pp 293–308Google Scholar
  26. 26.
    Tuyls P, Batina L (2006) Rfid-tags for anti-counterfeiting. In: Pointcheval D (ed) CT-RSA. Volume 3860 of lecture notes in computer science. Springer, pp 115–131Google Scholar
  27. 27.
    EPC global standard powered by GS1: Object Naming Service (ONS) 5 Version 1.0 (2005)Google Scholar
  28. 28.
    Mirowski L (2006) Detecting clone radio frequency identifications tags. Bachelor’s Thesis, School of Computing, University of TasmaniaGoogle Scholar
  29. 29.
    Lehtonen M, Michahelles F, Fleisch E (2007) Probabilistic approach for location-based authentication. In: 1st International workshop on security for spontaneous interaction IWSSI 2007Google Scholar
  30. 30.
    Anderson RJ (1998) On the security of digital tachographs. In: ESORICS ’98: proceedings of the 5th European symposium on research in computer security. Springer-Verlag, London, UK, pp 111–125Google Scholar
  31. 31.
    A GPS based monitoring system (2008)

Copyright information

© Springer-Verlag London Limited 2009

Authors and Affiliations

  • Leonardo Mostarda
    • 1
    Email author
  • Changyu Dong
    • 1
  • Naranker Dulay
    • 1
  1. 1.Department of ComputingImperial College LondonLondonUK

Personalised recommendations