Abstract
The issue we have focused on in the broad area of security for Pervasive Computing is maintaining trust in an interactive environment. Our solution is based on the premise that computers and implicit interaction mechanisms must function in accordance with the explicit parameters of physical human-human interaction. Otherwise, this results in imbalances between the physical and virtual worlds, which leads to ”windows of vulnerability”. Our solution presented requires an infrastructure of pervasive and context sensing technology, to provide entity mapping, policy and trust management services. We also investigate generating cryptographic keys using the context available The underlying technology is based on the Smart-Its context sensing, computation and communications platform.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Abowd, G.D., Dey, A.K., Brown, P.J., Davies, N., Smith, M., Steggles, P.: Towards a better understanding of context and context-awareness. In: Gellersen, H.-W. (ed.) (panel statements) Handheld and Ubiquitous Computing, pp. 304–307. Springer, Berlin (1999)
Anderson, R.J.: Security Engineering: A Guide to Building Dependable Distributed Systems, p. 38. Wiley, Chichester (2001)
Arbaugh, W.A., Fithen, W.L., McHugh, J.: Windows of Vulnerability: A Case Study Analysis. IEEE Computer, 52-59 (December 2000)
Beigl, M., Gellersen, H.W., Schmidt, A.: MediaCups: Experience with Design and Use of Computer Augmented Everyday Artefacts. Computer Networks, Special Issue on Pervasive Computing 35(4), 401–409 (2001)
Brown, P., Burleson, W., Lamming, M., Rahlff, O.W., Romano, G., Scholtz, J., Snowdon, D.: Context-awareness: some compelling applications (December 2001), Retrieved from (February 2003), http://www.dcs.ex.ac.uk/~pjbrown/papers/acm.html
Covington, M.J., Long, W., Srinivasan, S., Dey, D., Ahamad, M., Abowd, A.: Securing Context-Aware Applications Using Environment Roles. In: SACMAT 2001, ACM, New York (copyright 2001)
Dourish, P., Bellotti, V.: Awareness and Coordination in Shared Work spaces. In: Proceedings of CSCW 1992, pp. 107-114 (1992)
Hendry, M.: Smart Card Security and Applications. Artech House (1997)
Holmquist, L.E., Falk, J., Wigstroem, J.: Supporting group collaboration with interpersonal awareness devices. Personal Technologies 3, 13–21 (1999)
Holmquist, L.E., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M., Gellersen, H.: Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, p. 116. Springer, Heidelberg (2001)
HuBaux, J.P., Buttyan, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: Proc. ACM MOBICOM (October 2001)
Hupfeld, F., Beigl, M.: Spatially aware local communication in the RAUM system. In: Scholten, H.J., van Sinderen, M. (eds.) IDMS 2000. LNCS, vol. 1905, pp. 285–296. Springer, Heidelberg (2000)
Jendricke, U., Kreutzer, M., Zugenmaier, A.: Pervasive Privacy with Identity Management. In: Workshop on Security in Ubiquitous Compiting, UBICOMP 2002 (September 2002)
Jiang, X., Hong, J.I., Landay, J.A.: Socially-Based Modeling of Privacy in Ubiquitous Computing. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 176–193. Springer, Heidelberg (2002)
Kagal, L., Finin, T., Joshi, A.: Trust-Based Security in Pervasive Computing Environments. IEEE Computer (December 2001)
Kim, Y., Perrig, A., Tsudik, G.: Communication-efficient group key agreement. In: Proceedings of IFIP SEC (2001)
Kindberg, T., Zhang, K.: Context authentication using constrained channels. HP Labs Tech. report HPL-2001-84 (2001)
Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security support for mobile ad-hoc networks. In: Proc. IEEE ICNP, pp. 251–260 (2001)
Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 237–245. Springer, Heidelberg (2002)
Langheinrich, M., Mattern, F., Romer, K., Vogt, H.: First Steps Towards an Event–Based Infrastructure for Smart Things. In: Ubiquitous Computing Workshop, PACT (2000)
Monrose, F., Reiter, M.K., Li, Q., Lopresti, D.P., Shih, C.: Toward Speech-Generated Cryptographic Keys on Resource Constrained Devices. In: Proceedings of 11th USENIX Security Symposium (2002)
Noble, B.D., Corner, M.D.: The case for transient authentication. Presented at the 10th ACM SIGOPS European Workshop (September 2002)
Norman, D.A.: The Invisible Computer. MIT Press, Cambridge (1999)
Orr, R.J., Abowd, G.D.: The Smart Floor: A Mechanism for Natural User Identification and Tracking, Georgia Institute of Technology (2000)
Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for web transactions. DIMACS Technical Report, 97(15) (April 1997)
Schmidt, A.: Implicit Human-Computer Interaction through Context, Personal Technologies, pp. 191-199 (June 2000)
Schmidt, A., Beigl, M.: New Challenges of Ubiquitous Computing and Augmented Reality. In: 5th CaberNet Radicals Workshop, Valadares, NR. Porto, Portugal, July 5-8 (1998)
Sloman, M., Lupu, E.: Policy Specification for Programmable Networks. In: Covaci, S. (ed.) IWAN 1999. LNCS, vol. 1653, pp. 73–85. Springer, Heidelberg (1999)
Stadler, M.: Publicly verifiable secret sharing. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 191–199. Springer, Heidelberg (1996)
Strasser, M., Rothermel, K.: System Mechanisms for Partial Rollback of Mobile Agent Execution. In: Proceedings of the 20th International Conference on Distributed Computing Systems (ICDCS 2000), pp. 20–28. IEEE Computer Society, Los Alamitos (2000)
Want, R., Fishkin, K.P., Gujar, A., Harrison, B.L.: Bridging Physical and Virtual Worlds with Electronic Tags. In: Proceedings of CHI 1999, ACM Press, New York (1999)
Weiser, M.: Some Computer Science Issues for Ubiquitous Computing. In: PARC 1993 (1993)
Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network 13, 24–30 (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Robinson, P., Beigl, M. (2004). Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds) Security in Pervasive Computing. Lecture Notes in Computer Science, vol 2802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39881-3_15
Download citation
DOI: https://doi.org/10.1007/978-3-540-39881-3_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20887-7
Online ISBN: 978-3-540-39881-3
eBook Packages: Springer Book Archive