Skip to main content

A Study on Authentication Mechanism Using Robot Vacuum Cleaner

  • Conference paper
  • 1609 Accesses

Part of the Lecture Notes in Computer Science book series (LNTCS,volume 3483)


Robot is not a new field. It has been around for decades. In fact, most people have robots in their own home, even if they don’t recognize the robots as such. For example, a dishwasher automatically washes and dries your dishes, then grinds up the rinsed-off food so the organic matter doesn’t clog your drains. A washing machine soaks, soaps, agitates, and rinses your clothes. Down the street, the car wash-n-wax cleans, brushes, washes, and waxes your car, all for a few dollars. One of the better known home-oriented robots is robot vacuum cleaner which has already good cleaner for assistant house keeper. In this paper, we suggest that home security system using robot vacuum cleaner. Our robot vacuum cleaner makes an additional security function using camera. But, these technologies lack in provision of the authentication architecture of customers for the accountability, confidentiality. This paper presents the architecture of authentication mechanism to deal with the specific challenges arising from these applications and to overcome the weakness of traditional architecture for the secured infrastructure of home network environment.


  • Mobile Device
  • Security Requirement
  • Authentication Code
  • Authentication Mechanism
  • Authentication Agency

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This is a preview of subscription content, access via your institution.

Buying options

USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
USD   139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Oreback, A.: A Component Framework for Autonomous Mobile Robots, Doctoral Thesis (2004)

    Google Scholar 

  2. Coiffet, et al.: An introduction to robot technology, Hermes (1982)

    Google Scholar 

  3. Butler, J.: Robotics and Microelectronics Mobile Robots as Gateways into Wireless Sensor Networks. Technology@Intel Magazine (2003)

    Google Scholar 

  4. Katzenbeisser, S., Tomsich, P.: Applied Information Security for m-Commerce and Digital Television Environment. In: Bauknecht, K., Madria, S.K., Pernul, G. (eds.) EC-Web 2001. LNCS, vol. 2115, pp. 165–175. Springer, Heidelberg (2001)

    CrossRef  Google Scholar 

  5. Lee, H.J.: A Study on Method Using Effectiveness Interaction TV. In: HCI Conference (2003)

    Google Scholar 

  6. Lee, H.J.: Ubiquitous Innovation, e-co book (2004)

    Google Scholar 

  7. Tanh, D.V.: Security Issues in Mobile eCommerce. Lecture Notes in Computer Science, 467–476 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations


Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, H.J., Park, H.J., Kim, S. (2005). A Study on Authentication Mechanism Using Robot Vacuum Cleaner. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3483. Springer, Berlin, Heidelberg.

Download citation

  • DOI:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25863-6

  • Online ISBN: 978-3-540-32309-9

  • eBook Packages: Computer ScienceComputer Science (R0)