Skip to main content

Context-Aware User Authentication – Supporting Proximity-Based Login in Pervasive Computing

  • Conference paper
UbiComp 2003: Ubiquitous Computing (UbiComp 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2864))

Included in the following conference series:

Abstract

This paper explores computer security in pervasive computing with focus on user authentication. We present the concept of Proximity-Based User Authentication, as a usability-wise ideal for UbiComp systems. We present a context-aware user authentication protocol, which (1) uses a JavaCard for identification and cryptographic calculations, (2) uses a context-awareness system for verifying the user’s location, and (3) implements a security fall-back strategy. We analyze the security of this protocol and discuss the tradeoff between usability and security. We also present our current implementation of the protocol and discuss future work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abowd, G.D., Brumitt, B., Shafer, S. (eds.): Proceedings of Ubicomp 2001: Ubiquitous Computing. LNCS, vol. 2201, p. 184. Springer, Heidelberg (2001)

    Book  Google Scholar 

  2. Anderson, R., Kuhn, M.: Tamper resistance – a cautionary note. In: The Second USENIX Workshop on Electronic Commerce Proceedings (1996)

    Google Scholar 

  3. Baentsch, M., Buhler, P., Eirich, T., Höring, F., Oestreicher, M.: Javacard – from hype to reality. IEEE Concurrency, 36–43 (October-December 1999)

    Google Scholar 

  4. Bardram, J.E.: The Trouble with Login – On usability and Computer Security in Pervasive Computing. Technical Report CfPC 2003–PB–50, Center for Pervasive Computing, Aarhus, Denmark (2003), Available from http://www.pervasive.dk/publications

  5. Bennett, F., Richardson, T., Harter, A.: Teleporting – Making Applications Mobile. In: Proceedings of the IEEE Workshop on Mobile Computer Systems and Applications, Los Alamitos, CA, USA, pp. 82–84. IEEE CS Press, Los Alamitos (1994)

    Google Scholar 

  6. Borriello, G., Holmquist, L.E. (eds.): Proceedings of Ubicomp 2002: Ubiquitous Computing. LNCS, vol. 2498. Springer, Heidelberg (2002)

    Google Scholar 

  7. Brumitt, B., Meyers, B., Krumm, J., Kern, A., Shafer, S.: EasyLiving: Technologies for Intelligent Environments. In: Thomas, P., Gellersen, H.-W. (eds.) HUC 2000. LNCS, vol. 1927, pp. 12–29. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  8. Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems (TOCS) 8(1), 18–36 (1990)

    Article  Google Scholar 

  9. Bussard, L., Roudier, Y.: Embedding distance-bounding protocols within intuitive interactions (2003)

    Google Scholar 

  10. Center for Pervasive Healthcare, http://www.cfph.dk

  11. Christensen, H.B., Bardram, J.: Supporting human activities – exploring activity-centered computing. In: Borriello and Holmquist [6], pp. 107–116

    Google Scholar 

  12. Corner, M.D., Noble, B.D.: Zero-interaction authentication. In: Proceedings of the eighth annual international conference on Mobile computing and networking, pp. 1–11. ACM Press, New York (2002)

    Chapter  Google Scholar 

  13. Datatronic Long Range RFID Portal Antennas (297C-AT3M/S), http://www.datatronicrfid.com

  14. Denning, D.E., MacDoran, P.D.: Location-Based Authentication: Grounding Cyberspace for Better Security. Computer Fraud and Security (February 1996), Available from http://cosc.georgetown.edu/denning/infosec/Grounding.txt

  15. Ensure Technologies, http://www.ensuretech.com

  16. Harter, A., Hopper, P., Steggles, A., Webster, P.: The Anatomy of a Context- Aware Application. In: Proceedings of the 5th Annunal ACM/IEEE Conference on Mobile Computing and Networking (MobiCom 1999), Seattle, WA, USA, pp. 59–68. ACM Press, New York (1999)

    Chapter  Google Scholar 

  17. IBM JCOP Smart Card Technology, http://www.zurich.ibm.com/csc/infosec/smartcard.html

  18. Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)

    Google Scholar 

  19. Nagel, K., Kidd, C.D., O’Connell, T., Dey, A., Abowd, G.D.: The Family Intercom: Developing a Context-Aware Audio Communication System. In: Abowd et al. [1], pp. 176–183

    Google Scholar 

  20. Philips Semiconductors MIFARE Demonstration System (MF EV500), http://www.semiconductors.philips.com/markets/identification/products/mifare/

  21. Russell, D.M., Drews, C., Sue, A.: Social Aspects of Using Large Public Interactive Displays for Collaboration. In: Borriello and Holmquist [6], pp. 229–236

    Google Scholar 

  22. Russell, D.M., Gossweiler, R.: On the Design of Personal & Communal Large Information Scale Appliances. In: Abowd et al. [1], pp. 354–361

    Google Scholar 

  23. Schneider, B.: Secrets and Lies: Digital Security in a Networked World, 1st edn. John Wiley & Sons, Chichester (2000)

    Google Scholar 

  24. Smith, M.T.: Smart Cards: Integrating for Portable Complexity. IEEE Computer, 110–115 (August 1998)

    Google Scholar 

  25. Tanenbaum, A.S.: Modern Operating Systems, 2nd edn. Prentice Hall, Englewood Cliffs (2001)

    Google Scholar 

  26. Trevor, J., Hilbert, D.M., Schilit, B.N.: Issues in Personalizing Shared Ubiquitous Devices. In: Borriello and Holmquist [6], pp. 56–72

    Google Scholar 

  27. Want, R., Hopper, A., Falco, V., Gibbons, J.: The active badge location system. ACM Transactions on Information Systems (TOIS) 10(1), 91–102 (1992)

    Article  Google Scholar 

  28. Werb, J., Lanzl, C.: Designing a positioning system for finding things and people. IEEE Spectrum 35(9), 71–78 (1998)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bardram, J.E., Kjær, R.E., Pedersen, M.Ø. (2003). Context-Aware User Authentication – Supporting Proximity-Based Login in Pervasive Computing. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds) UbiComp 2003: Ubiquitous Computing. UbiComp 2003. Lecture Notes in Computer Science, vol 2864. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39653-6_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-39653-6_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20301-8

  • Online ISBN: 978-3-540-39653-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics