Robot is not a new field. It has been around for decades. In fact, most people have robots in their own home, even if they don’t recognize the robots as such. For example, a dishwasher automatically washes and dries your dishes, then grinds up the rinsed-off food so the organic matter doesn’t clog your drains. A washing machine soaks, soaps, agitates, and rinses your clothes. Down the street, the car wash-n-wax cleans, brushes, washes, and waxes your car, all for a few dollars. One of the better known home-oriented robots is robot vacuum cleaner which has already good cleaner for assistant house keeper. In this paper, we suggest that home security system using robot vacuum cleaner. Our robot vacuum cleaner makes an additional security function using camera. But, these technologies lack in provision of the authentication architecture of customers for the accountability, confidentiality. This paper presents the architecture of authentication mechanism to deal with the specific challenges arising from these applications and to overcome the weakness of traditional architecture for the secured infrastructure of home network environment.
- Mobile Device
- Security Requirement
- Authentication Code
- Authentication Mechanism
- Authentication Agency
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, access via your institution.
Tax calculation will be finalised at checkout
Purchases are for personal use onlyLearn about institutional subscriptions
Unable to display preview. Download preview PDF.
Oreback, A.: A Component Framework for Autonomous Mobile Robots, Doctoral Thesis (2004)
Coiffet, et al.: An introduction to robot technology, Hermes (1982)
Butler, J.: Robotics and Microelectronics Mobile Robots as Gateways into Wireless Sensor Networks. Technology@Intel Magazine (2003)
Katzenbeisser, S., Tomsich, P.: Applied Information Security for m-Commerce and Digital Television Environment. In: Bauknecht, K., Madria, S.K., Pernul, G. (eds.) EC-Web 2001. LNCS, vol. 2115, pp. 165–175. Springer, Heidelberg (2001)
Lee, H.J.: A Study on Method Using Effectiveness Interaction TV. In: HCI Conference (2003)
Lee, H.J.: Ubiquitous Innovation, e-co book (2004)
Tanh, D.V.: Security Issues in Mobile eCommerce. Lecture Notes in Computer Science, 467–476 (2000)
Editors and Affiliations
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, H.J., Park, H.J., Kim, S. (2005). A Study on Authentication Mechanism Using Robot Vacuum Cleaner. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3483. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424925_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25863-6
Online ISBN: 978-3-540-32309-9