Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments

The issue we have focused on in the broad area of security for Pervasive Computing is maintaining trust in an interactive environment. Our solution is based on the premise that computers and implicit interaction mechanisms must function in accordance with the explicit parameters of physical human-human interaction. Otherwise, this results in imbalances between the physical and virtual worlds, which leads to ”windows of vulnerability”. Our solution presented requires an infrastructure of pervasive and context sensing technology, to provide entity mapping, policy and trust management services. We also investigate generating cryptographic keys using the context available The underlying technology is based on the Smart-Its context sensing, computation and communications platform.

[1]  Markus Stadler,et al.  Publicly Verifiable Secret Sharing , 1996, EUROCRYPT.

[2]  Brian D. Noble,et al.  The case for transient authentication , 2002, EW 10.

[3]  James A. Landay,et al.  Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing , 2002, UbiComp.

[4]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[5]  Michael Beigl,et al.  Spatially Aware Local Communication in the RAUM System , 2000, IDMS.

[6]  William A. Arbaugh,et al.  IEEE 52 Computer , 1985 .

[7]  Gregory D. Abowd,et al.  Towards a Better Understanding of Context and Context-Awareness , 1999, HUC.

[8]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[9]  Emil C. Lupu,et al.  Policy Specification for Programmable Networks , 1999, IWAN.

[10]  Lars Erik Holmquist,et al.  Supporting group collaboration with interpersonal awareness devices , 1999, Personal Technologies.

[11]  Mark Weiser,et al.  Some computer science issues in ubiquitous computing , 1993, CACM.

[12]  B. Gladman,et al.  Security Engineering: a Guide to Building Dependable Distributed Systems Physical Tamper Resistance 14.1 Introduction , 2022 .

[13]  Timothy W. Finin,et al.  Trust-Based Security in Pervasive Computing Environments , 2022 .

[14]  Marc Langheinrich,et al.  First Steps Towards an Event-Based Infrastructure for Smart Things , 2000 .

[15]  Tim Kindberg,et al.  Context authentication using constrained channels , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[16]  Gene Tsudik,et al.  Communication-Efficient Group Key Agreement , 2001, SEC.

[17]  Albrecht Schmidt,et al.  Implicit human computer interaction through context , 2000, Personal Technologies.

[18]  Berni Dwan,et al.  Smart card security and applications , 1998 .

[19]  Michael Kreutzer,et al.  Pervasive Privacy with Identity Management , 2002 .

[20]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[21]  Markus Straßer,et al.  System mechanisms for partial rollback of mobile agent execution , 2000, Proceedings 20th IEEE International Conference on Distributed Computing Systems.

[22]  Gregory D. Abowd,et al.  Securing context-aware applications using environment roles , 2001, SACMAT '01.

[23]  Ross J. Anderson Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .

[24]  Gregory D. Abowd,et al.  The smart floor: a mechanism for natural user identification and tracking , 2000, CHI Extended Abstracts.

[25]  Paul Dourish,et al.  Awareness and coordination in shared workspaces , 1992, CSCW '92.

[26]  Donald A. Norman,et al.  The invisible computer , 1998 .

[27]  Albrecht Schmidt,et al.  Mediacups: experience with design and use of computer-augmented everyday artefacts , 2001, Comput. Networks.

[28]  Peter Brown Context-awareness: some compelling applications , 2000 .

[29]  Daniel P. Lopresti,et al.  Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices , 2002, USENIX Security Symposium.

[30]  Michael K. Reiter,et al.  Crowds: anonymity for Web transactions , 1998, TSEC.

[31]  Roy Want,et al.  Bridging physical and virtual worlds with electronic tags , 1999, CHI '99.

[32]  Marc Langheinrich,et al.  A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.

[33]  Bernt Schiele,et al.  Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts , 2001, UbiComp.