IWAAL 2012: Ambient Assisted Living and Home Care pp 135-142 | Cite as
Authentication and Authorization in Ambient Assisting Living Applications: An Approach for UniversAAL
Abstract
In recent years the number of Ambient Intelligent systems is growing steadily, especially several fields such as domotic and remote teaching are practical applications of AmI. A relevant characteristic of these systems is sharing a double goal, comfort and simplicity of final users. However, the adoption of these scenarios lacks of a security basis. We defend that security is an essential feature to deploy in any kind of system. Security in conventional systems is a currently unsolved challenge and new attacks and vulnerabilities of systems arise everyday, in AAL systems the problem is even more complex since whether security challenges are hard in homogeneous solutions these escalate when moving to highly dynamic and heterogeneous systems. Several technical solutions have been proposed for specific security components in AAL systems, but the problem to solve the security of the whole system is still open. We address this problem providing a security architecture for the universAAL infrastructure. Among all the different security properties (trust, authenticity, integrity, confidentiality and accountability) we focus on the authorization and authentication, this paper presents a semantic based access control model for universAAL.
Keywords
Session Initiation Protocol Ambient Intelligence Ambient Assist Live Security Architecture Data Encryption StandardPreview
Unable to display preview. Download preview PDF.
References
- 1.Aarts, E., Harwig, R., Schuurmans, M.: Ambient Intelligence, pp. 235–250. McGraw-Hill (2002)Google Scholar
- 2.Costa, R., Carneiro, D., Novais, P., Lima, L., Machado, J., Marques, A., Neves, J.: Ambient Assisted Living. In: 3rd Symposium of Ubiquitous Computing and Ambient Intelligence, Berlin, Heidelberg. AISC, vol. 51, pp. 86–94 (2009)Google Scholar
- 3.Hanke, S., et al.: universAAL - An Open and Consolidated AAL Platform. In: Wichert, R., Eberhardt, B. (eds.) Ambient Assisted Living, pp. 127–140 (2011)Google Scholar
- 4.Shibboleth Consortium. Shibboleth, http://shibboleth.net/
- 5.Chadwick, D.W., Otenko, A.: The PERMIS X.509 role based privilege management infrastructure. In: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, SACMAT 2002, pp. 135–140 (2002)Google Scholar
- 6.Rigney, C., Willens, S., Rubens, A., Simpson, W.: Remote Authentication Dial In User Service (RADIUS). Technical Report 1645, Network Working Group (2000)Google Scholar
- 7.Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: Session Initiation Protocol. Technical report, RFC 3261 (2002)Google Scholar
- 8.Koshutanski, H., Massacci, F.: Interactive access control for autonomic systems: From th eory to Implementation. ACM Transactions on Autonomous and Adaptive Systems 3(3), 1–31 (2008)CrossRefGoogle Scholar
- 9.OpenLDAP Foundation. Lightweight Directory Access Protocol (LDAP): Technical Specification Road Map. Technical report, Network Working Group (2006)Google Scholar
- 10.Spyns, P., Oberle, D., Volz, R., Zheng, J., Jarrar, M., Sure, Y., Studer, R., Meersman, R.: OntoWeb - A Semantic Web Community Portal. In: Karagiannis, D., Reimer, U. (eds.) PAKM 2002. LNCS (LNAI), vol. 2569, pp. 189–200. Springer, Heidelberg (2002)CrossRefGoogle Scholar
- 11.Jacek, K., Vitvar, T., Fensel, D.: D3.4.3 MicroWSMO and hRESTS (2008)Google Scholar
- 12.Tazari, M.-R., Furfari, F., Ramos, J.-P.L., Ferro, E.: The PERSONA Service Platform for AAL Spaces. In: Nakashima, H., Aghajan, H., Augusto, J.C. (eds.) Handbook of Ambient Intelligence and Smart Environments, pp. 1171–1199. Springer US, Boston (2010)CrossRefGoogle Scholar
- 13.Gong, L., Ellison, G., Dageforde, M.: Inside JavaTM 2 Platform Security: Architecture, API Design, and Implementation, 2nd edn. Prentice Hall (2003)Google Scholar
- 14.Ahler, M., Grinewitschus, V., Ressel, C., Miranda, J.M., Ramos, Á., Mevissen, R., Tobies, S.: Detailed Design of the Amigo Middleware Core Security & Privacy, Content Distribution, Data Storage. Technical report (2005)Google Scholar
- 15.Miller, S.P., Neuman, B.C., Schiller, J.I., Saltzer, J.H.: Kerberos authentication and authorization system. In: Project Athena Technical Plan, pp. 1–32 (1987)Google Scholar
- 16.Ferraiolo, D.F., Kuhn, D.R.: Role-Based Access Controls. In: 15th National Computer Security Conference, vol. 2, pp. 554–563. Artech House Publishers, Baltimore (1992)Google Scholar
- 17.National Institute of Standards and Technology. Data encryption standard (des) (1999)Google Scholar
- 18.Kelly, S.: Aruba Networks. Security Implications of Using the Data Encryption Standard (DES). Technical report, Network Working Group (2006)Google Scholar
- 19.Scarfone, K., Padgette, J.: Guide to Bluetooth security. NIST Special Publication, 800:121 (2008)Google Scholar
- 20.Wi-fi Alliance. Wi-Fi Protected Setup Specification, pp. 1–110 (December 2006)Google Scholar
- 21.OASIS Security Services TC. SAML 2.0 (2005)Google Scholar