Advertisement

A Study on Authentication Mechanism Using Robot Vacuum Cleaner

Conference paper
  • 1.2k Downloads
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3483)

Abstract

Robot is not a new field. It has been around for decades. In fact, most people have robots in their own home, even if they don’t recognize the robots as such. For example, a dishwasher automatically washes and dries your dishes, then grinds up the rinsed-off food so the organic matter doesn’t clog your drains. A washing machine soaks, soaps, agitates, and rinses your clothes. Down the street, the car wash-n-wax cleans, brushes, washes, and waxes your car, all for a few dollars. One of the better known home-oriented robots is robot vacuum cleaner which has already good cleaner for assistant house keeper. In this paper, we suggest that home security system using robot vacuum cleaner. Our robot vacuum cleaner makes an additional security function using camera. But, these technologies lack in provision of the authentication architecture of customers for the accountability, confidentiality. This paper presents the architecture of authentication mechanism to deal with the specific challenges arising from these applications and to overcome the weakness of traditional architecture for the secured infrastructure of home network environment.

Keywords

Mobile Device Security Requirement Authentication Code Authentication Mechanism Authentication Agency 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Oreback, A.: A Component Framework for Autonomous Mobile Robots, Doctoral Thesis (2004) Google Scholar
  2. 2.
    Coiffet, et al.: An introduction to robot technology, Hermes (1982) Google Scholar
  3. 3.
    Butler, J.: Robotics and Microelectronics Mobile Robots as Gateways into Wireless Sensor Networks. Technology@Intel Magazine (2003)Google Scholar
  4. 4.
    Katzenbeisser, S., Tomsich, P.: Applied Information Security for m-Commerce and Digital Television Environment. In: Bauknecht, K., Madria, S.K., Pernul, G. (eds.) EC-Web 2001. LNCS, vol. 2115, pp. 165–175. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  5. 5.
    Lee, H.J.: A Study on Method Using Effectiveness Interaction TV. In: HCI Conference (2003)Google Scholar
  6. 6.
    Lee, H.J.: Ubiquitous Innovation, e-co book (2004)Google Scholar
  7. 7.
    Tanh, D.V.: Security Issues in Mobile eCommerce. Lecture Notes in Computer Science, 467–476 (2000)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  1. 1.Quality & Reliability Lab. DAEWOO Electronics Corp.IncheonKorea
  2. 2.Department of Computer and Industrial EngineeringYonsei UniversitySeoulKorea
  3. 3.Somansa, Woorim e-Biz CenterSeoulKorea

Personalised recommendations