Distance-Based Access Modifiers Applied to Safety in Home Networks

  • Kjeld H. Mortensen
  • Kari R. Schougaard
  • Ulrik P. Schultz
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3295)


Home networks and the interconnection of home appliances is a classical theme in ubiquitous computing research. Security is a recurring concern, but there is a lack of awareness of safety: preventing the computerized house from harming the inhabitants, even in a worst-case scenario where an unauthorized user gains remote control of the facilities. We address this safety issue at the middleware level by restricting the operations that can be performed on devices according to the physical location of the user initiating the request. Operations that pose a potential safety hazard can only be performed within a physical proximity that ensures safety.

We use a declarative approach integrated with an IDL language to express location-based restrictions on operations. This model has been implemented in a middleware for home audio-video devices, using infrared communication and a local-area network to implement location awareness.


Remote Control Policy Language Local Network Ubiquitous Computing Safety Restriction 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bardram, J.E., Kjær, R.E., Pedersen, M.Ø.: Context-aware user authentication: Supporting proximity-based login in pervasive computing. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, pp. 107–123. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  2. 2.
    Chambers, C.: Predicate classes. In: Nierstrasz, O. (ed.) ECOOP 1993. LNCS, vol. 707, pp. 268–296. Springer, Heidelberg (1993)CrossRefGoogle Scholar
  3. 3.
    Chen, G., Kotz, D.: A survey of context-aware mobile computing research. Technical Report TR2000-381, Dept. of Computer Science, Dartmouth College (November 2000)Google Scholar
  4. 4.
    Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns: elements of reusable object-oriented software. Addison-Wesley, Reading (1994)Google Scholar
  5. 5.
    Harter, A., Hopper, A., Steggles, P., Ward, A., Webster, P.: The anatomy of a context-aware application. Wireless Networks 8(2/3), 187–197 (2002)zbMATHCrossRefGoogle Scholar
  6. 6.
    Hightower, J., Borriella, G.: Location systems for ubiquitous computing. IEEE Computer 34(8), 57–66 (2001)Google Scholar
  7. 7.
    Kagal, L., Finin, T., Joshi, A.: A policy language for a pervasive computing environment. In: Fourth IEEE International Workshop on Policies for Distributed Systems and Networks, June 2003, IEEE, Los Alamitos (2003)Google Scholar
  8. 8.
    Trevor, J., Hilbert, D.M., Schilit, B.N.: Issues in personalizing shared ubiquitous devices. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 56–72. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  9. 9.
    Want, R., Hopper, A., Falcão, V., Gibbons, J.: The active badge location system. ACM Transactions on Information Systems (TOIS) 10(1), 91–102 (1992)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Kjeld H. Mortensen
    • 1
  • Kari R. Schougaard
    • 1
  • Ulrik P. Schultz
    • 1
  1. 1.Centre for Pervasive Computing/ISIS, Department of Computer ScienceUniversity of AarhusDenmark

Personalised recommendations