A secure context distribution framework for peer-based pervasive systems

Pervasive computing envisions seamless and distraction-free application support for everyday user tasks. Achieving this requires a high degree of automation. In many scenarios, the basis for automation is context information that can be acquired unobtrusively by means of sensors. Consequently, it is vital to ensure the validity of the context information, especially, in cases where automatic decisions can have severe security implications. In smart environments, the validity of context information can be ensured simply using a centralized context storage that is securely connected to all trusted sensors. In peer-based systems such a centralized approach cannot be applied. Instead, it is necessary to use all devices to distribute context information which requires additional precautions to ensure its validity. In this paper, we derive the requirements on secure context distribution for peer-based systems. Furthermore, we describe a generic distribution framework to enable the usage of context information in security critical applications. On the basis of a prototypical implementation, we present an evaluation indicating that the proposed framework can achieve a high level of security while being applicable to many scenarios.

[1]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[2]  Philip Robinson,et al.  Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments , 2003, SPC.

[3]  Timothy W. Finin,et al.  Moving from Security to Distributed Trust in Ubiquitous Computing Environments , 2001 .

[4]  Roy H. Campbell,et al.  Context and location-aware encryption for pervasive computing environments , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).

[5]  Dan S. Wallach,et al.  A Survey of Peer-to-Peer Security Issues , 2002, ISSS.

[6]  Pedro José Marrón,et al.  Generic role assignment: A uniform middleware abstraction for configuration of pervasive systems , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.

[7]  Timothy W. Finin,et al.  Communications - Trust-Based Security in Pervasive Computing Environments , 2001, Computer.

[8]  Peng Wang,et al.  Robust Accounting in Decentralized P2P Storage Systems , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).

[9]  David Cooper,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.

[10]  Russ Housley,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.

[11]  Gregor Schiele,et al.  BASE - a micro-broker-based middleware for pervasive computing , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..