Towards secure resource sharing for impromptu collaboration in pervasive computing

Access control in mobile and pervasive computing is a complex issue, with many aspects relating to the establishment, management, and enforcement of methods and policies that allow mobile devices to share resources with each other. Communication between mobile devices can arise spontaneously, involve the sharing of few resources between heterogeneous platforms, and only need to be maintained for a short time. Additionally, the devices often communicate with each other a single time, and have no pre-shared secret or a priori knowledge of the other device. In this paper we propose a secure solution for providing controlled access to local resources in mobile and pervasive computing environments. Our solution incorporates demonstrative verification of security credentials, a key-based capability delegation, and easy to use access control features in order to provide simple access with low maintenance costs. It is particularly designed for one-time-only communication between mobile-to-mobile or mobile-to-kiosk devices.

[1]  Diana K. Smetters,et al.  Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.

[2]  Jean Bacon,et al.  Toward open, secure, widely distributed services , 2002, CACM.

[3]  Torsten Braun,et al.  Secure mobile IP communication , 2001, Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks.

[4]  Timothy W. Finin,et al.  Communications - Trust-Based Security in Pervasive Computing Environments , 2001, Computer.

[5]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[6]  Timothy W. Finin,et al.  Moving from Security to Distributed Trust in Ubiquitous Computing Environments , 2001 .

[7]  Dongwan Shin,et al.  Visual Device identification for Security Services in Ad-Hoc Wireless Networks , 2005, New Trends in Computer Networks.

[8]  Markus Lorch,et al.  A new security model for collaborative environments , 2003 .

[9]  M. Parashar,et al.  Context-aware Dynamic Access Control for Pervasive Applications , 2004 .

[10]  William R. Claycomb,et al.  Using A Two Dimensional Colorized Barcode Solution for Authentication in Pervasive Computing , 2006, 2006 ACS/IEEE International Conference on Pervasive Services.

[11]  Harry Chen,et al.  Centaurus: a framework for intelligent services in a mobile environment , 2001, Proceedings 21st International Conference on Distributed Computing Systems Workshops.

[12]  Gregory D. Abowd,et al.  Securing context-aware applications using environment roles , 2001, SACMAT '01.

[13]  Robert A. Ghanea-Hercock Phobos: An Agent-Based User Authentication System , 2003, IEEE Intell. Syst..

[14]  Gerd Kortuem,et al.  When peer-to-peer comes face-to-face: collaborative peer-to-peer computing in mobile ad-hoc networks , 2001, Proceedings First International Conference on Peer-to-Peer Computing.

[15]  Peter Steenkiste,et al.  Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[16]  Emil C. Lupu,et al.  Towards flexible credential verification in mobile ad-hoc networks , 2002, POMC '02.

[17]  Tim Kindberg,et al.  An authorization infrastructure for nomadic computing , 2002, SACMAT '02.

[18]  Timothy W. Finin,et al.  Trust-Based Security in Pervasive Computing Environments , 2022 .