A Context-Aware Entity Recognition Scheme for Pervasive Computing

Rui He, Jianwei Niu, Jianping Hu, Jian Ma

2004

Abstract

In the future world filled with pervasive computing, almost all entities can be mobile, which means not only service requesters but also service providers are always dynamic and unpredictable. This raises two security problems. For service providers, how can they keep their security capability when they move here and there? And for service requesters, how can they be trusted by various service providers that may have different security requirements? Unfortunately, available security mechanisms, including traditional authentication and authorization approaches and exotic trust management proposals, cannot solve the both two problems very well. In this paper, we propose a context-aware entity recognition scheme, which enables service providers to use their current trust infrastructures to determine whether requesters are trustworthy or not, and also enables service requesters to be recognized through exchanging different information with service providers according to different services they request and different security level service providers require. We argue for the notion of “Trust Infrastructure”, which is an abstract of all available trusted entities that can help an entity to recognize strangers in pervasive environments and can be dynamically built when entities move about. We also argue for an attribute-based recognition information exchange scheme, which makes it possible for service requesters to be checked in terms of trustworthiness in various scenarios. Finally, we give an algorithm to compute a service requester’s trust value based on the trust infrastructure of the service provider entity..

References

  1. J-M. Seigneur, S. Farrell, C. Jensen, E. Gray, Y. Chen: "End-to-end trust in pervasive computing starts with recognition". In Proceedings of the First International Conference on Security in Pervasive Computing, Boppard, Germany, March 2003
  2. J.-M. Seigneur, S. Farrell, and C. D. Jensen, "Secure Ubiquitous computing based on entity recognition", in Ubicomp'02 Security Workshop, 2002,
  3. Yarong Tang. Decentralized Trust Management.
  4. M. Blaze, J. Feigenbaum, J. Ioannidis, and A. D. Keromytis. The Role of Trust Management in Distributed Systems Security. Chapter in Secure Internet Programming: Security Issues for Mobile and Distributed Objects, (Vitek and Jensen, eds.) SpringerVerlag, 1999.
  5. Weiser, M. The Computer for the 21st Century. Scientific American , September, 1991.
  6. David Garlan, Dan Siewiorek, Asim Smailagic, and Peter Steenkist. "Project Aura: Toward Distraction-Free Pervasive Computing", in IEE Pervasive Computing, special issue on "Integrated Pervasive Computing Environments", Volume 21, Number 2, April-June, 2002, pp. 22-31.
  7. M. Satyanarayanan, "Pervasive computing: Vision and challenges," IEEE Personal Communications, pp. 10--17, August 2001.
  8. P. Zimmermann, PGP User's Guide, MIT Press, Cambridge, 1994.
  9. Michael Lyons. Pervasive Computing: Control and Freedom in Cyberspace. 2002
  10. M. Barbeau. Mobile, Distributed, and Pervasive Computing, in: I. Stojmenovic, Chapter 27 - Handbook of Wireless Networks and Mobile Computing, John Wiley and Sons, Inc., February 2002 (ISBN: 0-471-41902-4)
  11. J. Kohl and Clifford Neuman. The kerberos network authentication service (V5). Request for Comments (Proposed Standard) RFC 1510, Internet Engineering Task Force, September 1993.
  12. IETF: Public-Key Infrastructure (X.509).
  13. IEEE Standards for Local and Metropolitan Area Networks: Port based Network Access Control, IEEE Standard 802.1x-2001, June 2001.
  14. M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In Proceedings 1996 IEEE Symposium on Security and Privacy, pages 164--173, May 1996
  15. M. Blaze, J. Feigenbaum, and A. D. Keromytis. KeyNote: Trust management for publickey infrastructures. Lecture Notes in Computer Science, 1550:59--63, 1999.
  16. A. Abdul-Rahman and S. Hailes. A Distributed Trust Model. New Security Paradigms Workshop 1997, ACM, 1997.
  17. Seigneur, J.-M., Farrell, S., and Jensen, C. D.: Secure ubiquitous computing based on entity recognition. In: Ubicomp'02 Security Workshop, Goteborg, (2002),
  18. F. Stajano and R. Anderson. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. B. Christianson, B. Crispo, and M. Roe (Eds.), Security Protocols, 7th International Workshop Proceedings, Lecture Notes in Computer Science, 1999.
  19. N. Li, J. C. Mitchell, and W. H. Winsborough. Design of a role-based trust-management framework. In “Proceedings of the 2002 IEEE Symposium on Security and Privacy”, pp. 114 - 130, 2002. IEEE Press.
  20. E. Guttman, C. Perkins, J. Veizades, and M. Day "Service Location Protocol, Version 2," IETF RFC-2165, November 1998
  21. Microsoft Corporation, "Universal Plug and Play Device Architecture", White Paper, Version 1.0, June 6, 2000.
  22. Sun Microsystems Inc.; "Jini Architecture Specification";
  23. Narendar Shankar, William A. Arbaugh. On Trust for Ubiquitous Computing . Ubicomp2002
  24. Brian Shand, et al. Trust for Ubiquitous, Transparent Collaboration. IEEE Pervasive Computing and Communication 2003.
Download


Paper Citation


in Harvard Style

He R., Niu J., Hu J. and Ma J. (2004). A Context-Aware Entity Recognition Scheme for Pervasive Computing . In Proceedings of the 1st International Workshop on Ubiquitous Computing - Volume 1: IWUC, (ICEIS 2004) ISBN 972-8865-06-6, pages 147-159. DOI: 10.5220/0002662201470159


in Bibtex Style

@conference{iwuc04,
author={Rui He and Jianwei Niu and Jianping Hu and Jian Ma},
title={A Context-Aware Entity Recognition Scheme for Pervasive Computing},
booktitle={Proceedings of the 1st International Workshop on Ubiquitous Computing - Volume 1: IWUC, (ICEIS 2004)},
year={2004},
pages={147-159},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002662201470159},
isbn={972-8865-06-6},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 1st International Workshop on Ubiquitous Computing - Volume 1: IWUC, (ICEIS 2004)
TI - A Context-Aware Entity Recognition Scheme for Pervasive Computing
SN - 972-8865-06-6
AU - He R.
AU - Niu J.
AU - Hu J.
AU - Ma J.
PY - 2004
SP - 147
EP - 159
DO - 10.5220/0002662201470159