Abstract
Ubiquitous and pervasive technologies contribute significantly to the quality of life of dependent people by providing personalized services in context aware environments. The deployment of these services within indoor and outdoor environments still require security, privacy and trust issues for dependent persons. Considering the strong links between these three issues, our challenging task was to integrate them in a common and flexible framework using contextual information. In this paper, we propose a security framework that integrates context awareness to perform authentication and access control in a very flexible and scalable model while ensuring both privacy and trust. The framework focuses on the authentication of users who request access to the resources of smart environment system through static devices (i.e. smart card, RFID, etc.), or dynamic devices (i.e. PDA, mobile phones, etc.).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Mhamed, A.: Safety, Security, Privacy and Trust in Smart Environements. In: Helal, A., Mokhtari, M., Abdulrazak, B. (eds.) The Engineering Handbook on Smart Technology for Aging, Disability and Indepen- dence. Computer Engineering Series. John Wiley & Sons, Chichester (2007), ISBN 0471711551
Covington, J.M., Sastry, M., Manohar, D.J.: Attribute-Based Authentication Model for Dynamic Mobile Environments. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol. 3934, pp. 227–242. Springer, Heidelberg (2006)
Marc, L.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 237–245. Springer, Heidelberg (2002)
Corner, M.D., Noble, B.D.: Protecting Applications with Transient Authentication. In: Proceeding of the First International Conference on Mobile Systems, Applications and Services, pp. 57–70 (2003)
Glynos, D., Kotzanikolaou, P., Douligeris, C.: Preventing Impersonation Attacks in MANET with Multi-Factor Authentication. In: Proceeding of the Third International Symposium on Modeling and Optimization in Mobile Ad-hoc, and Wireless Networks, pp. 59–64 (2005)
Jakob, B., Rasmus, K., Michael, P.: Context-aware user authentication: Supporting proximity-based login in pervasive computing. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, pp. 107–123. Springer, Heidelberg (2003)
Creese, S.J., Goldsmith, M.H., Zakiuddin, B.R.: Authentication in Pervasive Computing. In: Proceeding of the First International Conference on Security in Pervasive Computing, SPC (2003)
Qin, W., Daqing, Z., Mounir, M., Yuanchun, S., Kejun, D.: Combining User Profiles and Situation Context for Spontaneous Service Provision in Smart Assistive Environments. In: Proceeding of the 5th International Conference on Ubiquitous Intelligence and Computing, pp. 187–200 (2008)
Behzad, M., Ali, M., Ahmed, K.: A Framework for Context-Aware Authentication. In: Proceeding of 2008 IET 4th International Conference on Intelligent Environments, pp. 1–8 (2008)
Adrian, L., Chris, M.J.: Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol. 4717, pp. 73–90. Springer, Heidelberg (2007)
Abi-Char, P., Mhamed, A., El-Hassan, B., Mokhtari, M.: A Dynamic Trust- Based Context-Aware Authentication Framework With Privacy Preserving. Proceeding of International Journal of Computer and Network Security, IJCNSÂ 2 (accepted) (to appear)
Abi-Char, P., Mhamed, A., El-Hassan, B., Mokhtari, M.: Secure Authenticated and Key Agreement Protocols With Access Control for Mobile Environments. Proceeding of International Journal of Computer Science and Information Security, IJCSIS 6(2), 170–183 (2009) (Best Paper Award)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Abi-Char, P.E., Mhamed, A., El-Hassan, B., Mokhtari, M. (2010). A Flexible Privacy and Trust Based Context-Aware Secure Framework. In: Lee, Y., et al. Aging Friendly Technology for Health and Independence. ICOST 2010. Lecture Notes in Computer Science, vol 6159. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13778-5_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-13778-5_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13777-8
Online ISBN: 978-3-642-13778-5
eBook Packages: Computer ScienceComputer Science (R0)