Authentication and Authorization in Ambient Assisting Living Applications: An Approach for UniversAAL

  • Pablo Antón
  • Antonio Muñoz
  • Antonio Maña
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7657)

Abstract

In recent years the number of Ambient Intelligent systems is growing steadily, especially several fields such as domotic and remote teaching are practical applications of AmI. A relevant characteristic of these systems is sharing a double goal, comfort and simplicity of final users. However, the adoption of these scenarios lacks of a security basis. We defend that security is an essential feature to deploy in any kind of system. Security in conventional systems is a currently unsolved challenge and new attacks and vulnerabilities of systems arise everyday, in AAL systems the problem is even more complex since whether security challenges are hard in homogeneous solutions these escalate when moving to highly dynamic and heterogeneous systems. Several technical solutions have been proposed for specific security components in AAL systems, but the problem to solve the security of the whole system is still open. We address this problem providing a security architecture for the universAAL infrastructure. Among all the different security properties (trust, authenticity, integrity, confidentiality and accountability) we focus on the authorization and authentication, this paper presents a semantic based access control model for universAAL.

Keywords

Session Initiation Protocol Ambient Intelligence Ambient Assist Live Security Architecture Data Encryption Standard 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Aarts, E., Harwig, R., Schuurmans, M.: Ambient Intelligence, pp. 235–250. McGraw-Hill (2002)Google Scholar
  2. 2.
    Costa, R., Carneiro, D., Novais, P., Lima, L., Machado, J., Marques, A., Neves, J.: Ambient Assisted Living. In: 3rd Symposium of Ubiquitous Computing and Ambient Intelligence, Berlin, Heidelberg. AISC, vol. 51, pp. 86–94 (2009)Google Scholar
  3. 3.
    Hanke, S., et al.: universAAL - An Open and Consolidated AAL Platform. In: Wichert, R., Eberhardt, B. (eds.) Ambient Assisted Living, pp. 127–140 (2011)Google Scholar
  4. 4.
    Shibboleth Consortium. Shibboleth, http://shibboleth.net/
  5. 5.
    Chadwick, D.W., Otenko, A.: The PERMIS X.509 role based privilege management infrastructure. In: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, SACMAT 2002, pp. 135–140 (2002)Google Scholar
  6. 6.
    Rigney, C., Willens, S., Rubens, A., Simpson, W.: Remote Authentication Dial In User Service (RADIUS). Technical Report 1645, Network Working Group (2000)Google Scholar
  7. 7.
    Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: Session Initiation Protocol. Technical report, RFC 3261 (2002)Google Scholar
  8. 8.
    Koshutanski, H., Massacci, F.: Interactive access control for autonomic systems: From th eory to Implementation. ACM Transactions on Autonomous and Adaptive Systems 3(3), 1–31 (2008)CrossRefGoogle Scholar
  9. 9.
    OpenLDAP Foundation. Lightweight Directory Access Protocol (LDAP): Technical Specification Road Map. Technical report, Network Working Group (2006)Google Scholar
  10. 10.
    Spyns, P., Oberle, D., Volz, R., Zheng, J., Jarrar, M., Sure, Y., Studer, R., Meersman, R.: OntoWeb - A Semantic Web Community Portal. In: Karagiannis, D., Reimer, U. (eds.) PAKM 2002. LNCS (LNAI), vol. 2569, pp. 189–200. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  11. 11.
    Jacek, K., Vitvar, T., Fensel, D.: D3.4.3 MicroWSMO and hRESTS (2008)Google Scholar
  12. 12.
    Tazari, M.-R., Furfari, F., Ramos, J.-P.L., Ferro, E.: The PERSONA Service Platform for AAL Spaces. In: Nakashima, H., Aghajan, H., Augusto, J.C. (eds.) Handbook of Ambient Intelligence and Smart Environments, pp. 1171–1199. Springer US, Boston (2010)CrossRefGoogle Scholar
  13. 13.
    Gong, L., Ellison, G., Dageforde, M.: Inside JavaTM 2 Platform Security: Architecture, API Design, and Implementation, 2nd edn. Prentice Hall (2003)Google Scholar
  14. 14.
    Ahler, M., Grinewitschus, V., Ressel, C., Miranda, J.M., Ramos, Á., Mevissen, R., Tobies, S.: Detailed Design of the Amigo Middleware Core Security & Privacy, Content Distribution, Data Storage. Technical report (2005)Google Scholar
  15. 15.
    Miller, S.P., Neuman, B.C., Schiller, J.I., Saltzer, J.H.: Kerberos authentication and authorization system. In: Project Athena Technical Plan, pp. 1–32 (1987)Google Scholar
  16. 16.
    Ferraiolo, D.F., Kuhn, D.R.: Role-Based Access Controls. In: 15th National Computer Security Conference, vol. 2, pp. 554–563. Artech House Publishers, Baltimore (1992)Google Scholar
  17. 17.
    National Institute of Standards and Technology. Data encryption standard (des) (1999)Google Scholar
  18. 18.
    Kelly, S.: Aruba Networks. Security Implications of Using the Data Encryption Standard (DES). Technical report, Network Working Group (2006)Google Scholar
  19. 19.
    Scarfone, K., Padgette, J.: Guide to Bluetooth security. NIST Special Publication, 800:121 (2008)Google Scholar
  20. 20.
    Wi-fi Alliance. Wi-Fi Protected Setup Specification, pp. 1–110 (December 2006)Google Scholar
  21. 21.
    OASIS Security Services TC. SAML 2.0 (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Pablo Antón
    • 1
  • Antonio Muñoz
    • 1
  • Antonio Maña
    • 1
  1. 1.E.T.S.I.InformaticaUniversity of MalagaMalagaSpain

Personalised recommendations