Context-aware access to public shared devices

To allow for an efficient usage of an embedded device in pervasive computing environments, reliable and yet convenient user access is an important requirement. The problem becomes more complex when the accessed device is shared by the public with many different individuals. This paper first illustrates the common pitfalls and issues of establishing sessions to such devices. The paper then proposes a context-aware solution that uses different contexts to capture a usage session. The paper presents a general system design that supports a secure, selective, and identifiable user access of public shared devices with high usability. We have also implemented a prototype system to demonstrate the concept.

[1]  Sandeep K. S. Gupta,et al.  Proximity based access control in smart-emergency departments , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).

[2]  N. Asokan,et al.  Secure device pairing based on a visual channel , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[3]  Jakob E. Bardram,et al.  Context-Aware User Authentication - Supporting Proximity-Based Login in Pervasive Computing , 2003, UbiComp.

[4]  M. Parashar,et al.  Context-aware Dynamic Access Control for Pervasive Applications , 2004 .

[5]  Steven M. Bellovin,et al.  Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[6]  Mustaque Ahamad,et al.  Generalized role-based access control , 2001, Proceedings 21st International Conference on Distributed Computing Systems.

[7]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[8]  Bernt Schiele,et al.  Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts , 2001, UbiComp.

[9]  M.B. Srivastava,et al.  A new light sensing module for Mica motes , 2005, IEEE Sensors, 2005..

[10]  M. Srivastava,et al.  User Access of Public Shared Devices in Pervasive Computing Environments , 2007, 2007 Joint Workshop on High Confidence Medical Devices, Software, and Systems and Medical Device Plug-and-Play Interoperability (HCMDSS-MDPnP 2007).

[11]  Michael Sirivianos,et al.  Loud and Clear: Human-Verifiable Authentication Based on Audio , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).

[12]  Brian D. Noble,et al.  Zero-interaction authentication , 2002, MobiCom '02.

[13]  Diana K. Smetters,et al.  Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.