Context-Aware Identity Management in Pervasive Ad-hoc Environments

Contextual information and Identity Management (IM) is of paramount importance in the growing use of portable mobile devices for sharing information and communication between emergency services in pervasive ad-hoc environments. Mobile Ad-hoc Networks (MANets) play a vital role within such a context. The concept of ubiquitous/pervasive computing is intrinsically tied to wireless communications. Apart from many remote services, proximity services (context-awareness) are also widely available, and people rely on numerous identities to access these services. The inconvenience of these identities creates significant security vulnerability as well as user discomfort, especially from the network and device point of view in MANet environments. In this article, the authors address how contextual information is represented to facilitate IM and present a User-centered and Context-aware Identity Management (UCIM) framework for MANets.

[1]  Karsten Schwan,et al.  Opportunistic Overlays: Efficient Content Delivery in Mobile Ad Hoc Networks , 2005, Middleware.

[2]  Emil C. Lupu,et al.  The Ponder Policy Specification Language , 2001, POLICY.

[3]  Marek Hatala,et al.  Enabling User Control with Personal Identity Management , 2007, IEEE International Conference on Services Computing (SCC 2007).

[4]  Tzung-Shi Chen,et al.  A framework of mobile context management for supporting context-aware environments in mobile ad hoc networks , 2007, IWCMC.

[5]  Adrian David Cheok,et al.  A User Acceptance Study on a Plant Mixed Reality System for Primary School Children , 2008 .

[6]  Jörn Altmann,et al.  UNIQuE: A User-Centric Framework for Network Identity Management , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.

[7]  Naranker Dulay,et al.  Authorisation and Conflict Resolution for Hierarchical Domains , 2007, Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07).

[8]  Haiyong Luo,et al.  The WiMap: A Dynamic Indoor WLAN Localization System , 2011, Int. J. Adv. Pervasive Ubiquitous Comput..

[9]  Mark Strembeck,et al.  An approach to engineer and enforce context constraints in an RBAC environment , 2003, SACMAT '03.

[10]  Judith A. Symonds,et al.  An Evaluation of the RFID Security Benefits of the APF System: Hospital Patient Data Protection , 2009, Int. J. Adv. Pervasive Ubiquitous Comput..

[11]  Abhilasha Bhargav-Spantzel,et al.  User centricity: a taxonomy and open issues , 2006, DIM '06.

[12]  Claudia Linnhoff-Popien,et al.  A Context Modeling Survey , 2004 .

[13]  Mehdi Khosrow-Pour,et al.  Ubiquitous and Pervasive Computing: Concepts, Methodologies, Tools, and Applications , 2009 .

[14]  Gareth J. F. Jones,et al.  Context-aware Retrieval: Exploring a New Environment for Information Retrieval and Information Filtering , 2001, Personal and Ubiquitous Computing.

[15]  Marten van Sinderen,et al.  An Information Model and Architecture for Context-Aware Management Domains , 2008, 2008 IEEE Workshop on Policies for Distributed Systems and Networks.

[16]  Dongwan Shin,et al.  Towards Privacy in Enterprise Directory Services: A User-Centric Approach to Attribute Management , 2007, 2007 41st Annual IEEE International Carnahan Conference on Security Technology.

[17]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[18]  Nicola Blefari-Melazzi,et al.  Reconfigurable Systems with a User-Centric Focus , 2007, 2007 International Symposium on Applications and the Internet Workshops.

[19]  Petri Savolainen,et al.  Ubiquitous Communication: where is the Value Created in the Multi-Play Value Network? , 2009 .

[20]  Wang Mei,et al.  Research and Implementation of Self-Publishing Website Platforms for Universities Based on CMS , 2011, Int. J. Adv. Pervasive Ubiquitous Comput..

[21]  K. Cameron,et al.  The Laws of Identity , 2005 .

[22]  Ann Blandford,et al.  Situation awareness in emergency medical dispatch , 2004, Int. J. Hum. Comput. Stud..

[23]  Francisco Milton Mendes Neto,et al.  Designing Solutions-Based Ubiquitous and Pervasive Computing: New Issues and Trends , 2010 .

[24]  Ravi S. Sandhu,et al.  The NIST model for role-based access control: towards a unified standard , 2000, RBAC '00.

[25]  Emil C. Lupu,et al.  Tools for domain-based policy management of distributed systems , 2002, NOMS 2002. IEEE/IFIP Network Operations and Management Symposium. ' Management Solutions for the New Communications World'(Cat. No.02CH37327).

[26]  Atul Prakash,et al.  Methods and limitations of security policy reconciliation , 2006, TSEC.

[27]  Marit Hansen,et al.  User-Centric Identity Management: New Trends in Standardization and Regulation , 2007, IEEE Security & Privacy.

[28]  Qi Shi,et al.  Towards a Context-Aware Identity Management in Mobile Ad Hoc Networks (IMMANets) , 2009, 2009 International Conference on Advanced Information Networking and Applications Workshops.

[29]  Q. Shi,et al.  A Framework for User-Centred and Context-Aware Identity Management in Mobile Ad Hoc Networks (UCIM) , 2009 .

[30]  Qi Shi,et al.  Situation Awareness in Systems of Systems Ad-Hoc Environments , 2009 .

[31]  Mark Weiser,et al.  The computer for the 21st Century , 1991, IEEE Pervasive Computing.