Instant Matchmaking: Simple and Secure Integrated Ubiquitous Computing Environments

  • D. K. Smetters
  • Dirk Balfanz
  • Glenn Durfee
  • Trevor F. Smith
  • Kyung-Hee Lee
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4206)


Effective ubiquitous computing applications need to integrate users’ personal devices and data with the devices and resources they encounter around them. Previous work addressed this problem by simply enabling the user to take all of their data with them wherever they go. In this paper, we present a more flexible approach: the “instant matchmaker”, a personal device that allows a user to seamlessly and securely connect his local computing environment with his other personal resources, wherever they are. The matchmaker provides an intuitive user experience, while simultaneously enabling extremely fine-grained control over access to resources. We have implemented a cellphone-based matchmaker and explored its use in a secure media sharing application. The matchmaker concept, however, is general, and can be used to enable a range of appealing and secure ubicomp applications.


Ubiquitous Computing Personal Resource Home Network Access Control Policy Virtual Private Network 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Want, R., Pering, T., Danneels, G., Kumar, M., Sundar, M., Light, J.: The personal server: Changing the way we think about ubiquitous computing. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 194–209. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  2. 2.
    Pering, T., Nguyen, D.H., Light, J., Want, R.: Face-to-face media sharing using wireless mobile devices. In: Seventh IEEE International Symposium on Multimedia (ISM 2005), pp. 269–276 (2005)Google Scholar
  3. 3.
    Smetters, D.K., Grinter, R.E.: Moving from the design of usable security technologies to the design of useful secure applications. In: New Security Paradigms Workshop 2002. ACM Press, New York (2002)Google Scholar
  4. 4.
    Cheung, H.: How To: Building a BlueSniper rifle - Part 1 (2005),
  5. 5.
    The Trifinite Group: The car whisperer (2005),
  6. 6.
    Slingbox (2006),
  7. 7.
    Orb Networks (2006),
  8. 8.
    GoToMyPC (2006),
  9. 9.
    Oprea, A., Balfanz, D., Durfee, G., Smetters, D.: Securing a remote terminal application with a mobile trusted device. In: Proceedings of the Annual Computer Security Applications Conference, Tucson, AZ (2004)Google Scholar
  10. 10.
    Corner, M.D., Noble, B.D.: Zero-interaction authentication. In: Proceedings of the eighth Annual International Conference on Mobile Computing and Networking (MOBICOM 2002), pp. 1–11. ACM Press, New York (2002)CrossRefGoogle Scholar
  11. 11.
    Bauer, L., Garriss, S., Reiter, M.K.: Distributed proving in access-control systems. In: IEEE Symposium on Security and Privacy, pp. 81–95 (2005)Google Scholar
  12. 12.
    Bauer, L., Garriss, S., McCune, J.M., Reiter, M.K., Rouse, J., Rutenbar, P.: Device-enabled authorization in the grey-system. In: ISC, pp. 431–445 (2005)Google Scholar
  13. 13.
    Balfanz, D., Dean, D., Spreitzer, M.: A security infrastructure for distributed Java applications. In: 21th IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA (2000)Google Scholar
  14. 14.
    Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.: The KeyNote Trust-Management System Version 2. IETF - Network Working Group, The Internet Society. RFC 2704 (1999)Google Scholar
  15. 15.
    DeTreville, J.: Binder, a logic-based security language. In: 2002 IEEE Symposium on Security and Privacy, Oakland, CA (2002)Google Scholar
  16. 16.
    Bauer, L., Schneider, M.A., Felten, E.W.: A general and flexible access-control system for the web. In: Proceedings of the 11th USENIX Security Symposium, San Francisco, CA (2002)Google Scholar
  17. 17.
    Abadi, M., Burrows, M., Lampson, B.: A calculus for access control in distributed systems. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 1–23. Springer, Heidelberg (1992)Google Scholar
  18. 18.
    Halpern, J.Y., van der Meyden, R.: A logic for SDSI’s linked local name spaces. In: Proceedings of the 12th IEEE Computer Security Foundations Workshop, Mordano, Italy, pp. 111–122 (1999)Google Scholar
  19. 19.
    Stajano, F., Anderson, R.J.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172–194. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  20. 20.
    Balfanz, D., Smetters, D., Stewart, P., Wong, H.C.: Talking to strangers: Authentication in ad-hoc wireless networks. In: Proceedings of the 2002 Network and Distributed Systems Security Symposium (NDSS 2002), San Diego, CA, The Internet Society (2002)Google Scholar
  21. 21.
    Rekimoto, J., Ayatsuka, Y., Kohno, M., Oba, H.: Proximal interactions: A direct manipulation technique for wireless networking. In: INTERACT 2003 (2003)Google Scholar
  22. 22.
    Kohno, M., Rekimoto, J.: New generation of IP-phone enabled mobile devices. In: Paternó, F. (ed.) Mobile HCI 2002. LNCS, vol. 2411, pp. 319–329. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  23. 23.
    Kindberg, T., Zhang, K.: Secure spontaneous device association. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, pp. 124–131. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  24. 24.
    Kindberg, T., Zhang, K.: Validating and securing spontaneous associations between wireless devices. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol. 2851, pp. 44–53. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  25. 25.
    McCune, J.M., Perrig, A., Reiter, M.K.: Seeing-is-believing: Using camera phones for human-verifiable authentication. In: Proceedings of the IEEE Symposium on Security and Privacy (2005)Google Scholar
  26. 26.
    Balfanz, D., Durfee, G., Grinter, R.E., Smetters, D., Stewart, P.: Network-in-a-box: How to set up a secure wireless network in under a minute. In: Proceedings of the 13th USENIX Security Symposium, San Diego, CA (2004)Google Scholar
  27. 27.
    Balfanz, D., Durfee, G., Smetters, D.: Making the impossible easy: Usable PKI. In: Cranor, L.F., Garfinkel, S. (eds.) Security and Usability – Designing Secure Systems that People Can Use, pp. 319–334. O’Reilly Media, Inc., Sebastopol (2005)Google Scholar
  28. 28.
    Dierks, T., Allen, C.: The TLS Protocol Version 1.0. IETF - Network Working Group. The Internet Society. RFC 2246 (1999)Google Scholar
  29. 29.
    Edwards, W.K., Newman, M.W., Sedivy, J.Z., Smith, T.F., Izadi, S.: Challenge: Recombinant computing and the Speakeasy approach. In: Proceedings of the Eighth ACM International Conference on Mobile Computing and Networking (Mobicom 2002), Atlanta, GA (2002)Google Scholar
  30. 30.
    Newman, M.W., Sedivy, J.Z., Edwards, W.K., Smith, T.F., Marcelo, K., Neuwirth, C.M., Hong, J.I., Izadi, S.: Designing for serendipity: Supporting end-user configuration of ubiquitous computing environments. In: Proceedings of the Conference on Designing Interactive Systems (DIS 2002), London, UK (2002)Google Scholar
  31. 31.
    Newman, M.W., Izadi, S., Edwards, W.K., Smith, T.F., Sedivy, J.Z.: User interfaces when and where they are needed: An infrastructure for recombinant computing. In: Proceedings of the Symposium on User Interface Software and Technology (UIST), Paris, France. ACM, New York (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • D. K. Smetters
    • 1
  • Dirk Balfanz
    • 1
  • Glenn Durfee
    • 1
  • Trevor F. Smith
    • 1
  • Kyung-Hee Lee
    • 2
  1. 1.Palo Alto Research CenterPalo AltoU.S.A.
  2. 2.Samsung Advanced Institute of TechnologySuwonKorea

Personalised recommendations