NFC-based mobile middleware for intuitive user interaction with security in smart homes

Home networks and networked consumer electronic devices are increasingly becoming a part of our everyday lives. One of the challenges in designing smart home technology is making these systems secure and, at the same time, easy-to-use for non-expert consumers. We believe that mobile devices equipped with a “touch” network interface and corresponding middleware are ideal for enabling users to intuitively setup and manage the security of their smart homes. In this paper, we propose such a middleware for mobile phones based on Near Field Communication (NFC) technology. We propose a mobile middleware architecture based on a higher-level UserInteraction with Security (UI-SEC) middleware, called IntuiSec, and a lower-level NFC middleware, called iTouch. We present the proposed overall architecture, with particular emphasis on the integration modules, as well as, the detailed design of the necessary NFC records that are exchanged over RF. Finally, we present our experience with an initial implementation of parts of the proposed middleware using actual NFC hardware and Symbian-based mobile phones.

[1]  Paul Dourish,et al.  Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.

[2]  Bahram Shafai,et al.  An Experimental Hardware Extension Platform for Mobile Devices in Smart Spaces , 2006, PSC.

[3]  Diana K. Smetters,et al.  Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute , 2004, USENIX Security Symposium.

[4]  Dimitris N. Kalofonos,et al.  Intuisec: A Framework for Intuitive User Interaction with Smart Home Security using Mobile Devices , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.

[5]  Jukka Riekki,et al.  Requesting Pervasive Services by Touching RFID Tags , 2006, IEEE Pervasive Computing.

[6]  Hans Scholten,et al.  Home Network Security , 2008, Seventh International Conference on Networking (icn 2008).

[7]  S. Ungar,et al.  Home network security , 2002, Proceedings 2002 IEEE 4th International Workshop on Networked Appliances (Cat. No.02EX525).

[8]  Dimitris Kalofonos,et al.  Usable Security in Smart Homes , 2007 .

[9]  Rafael Ballagas,et al.  Spontaneous marriages of mobile devices and interactive spaces , 2005, CACM.

[10]  Mikio Hashimoto,et al.  A study on secure wireless networks consisting of home appliances , 2002, 2002 Digest of Technical Papers. International Conference on Consumer Electronics (IEEE Cat. No.02CH37300).

[11]  Chris Hurley,et al.  WarDriving: Drive, Detect, Defend: A Guide to Wireless Security , 2004 .

[12]  Zoe Antoniou,et al.  Intuitive Service Discovery in RFID-enhanced networks , 2006, 2006 1st International Conference on Communication Systems Software & Middleware.

[13]  Diana K. Smetters,et al.  Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.