skip to main content
10.1145/1244002.1244208acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

Towards secure resource sharing for impromptu collaboration in pervasive computing

Published: 11 March 2007 Publication History

Abstract

Access control in mobile and pervasive computing is a complex issue, with many aspects relating to the establishment, management, and enforcement of methods and policies that allow mobile devices to share resources with each other. Communication between mobile devices can arise spontaneously, involve the sharing of few resources between heterogeneous platforms, and only need to be maintained for a short time. Additionally, the devices often communicate with each other a single time, and have no pre-shared secret or a priori knowledge of the other device. In this paper we propose a secure solution for providing controlled access to local resources in mobile and pervasive computing environments. Our solution incorporates demonstrative verification of security credentials, a key-based capability delegation, and easy to use access control features in order to provide simple access with low maintenance costs. It is particularly designed for one-time-only communication between mobile-to-mobile or mobile-to-kiosk devices.

References

[1]
D. Agarwal, M. Lorch, M. Thompson, and M. Perry. A new security model for collaborative environments. In Proceedings of the Workshop on Advanced Collaborative Environments, June 2003.
[2]
J. Bacon and K. Moody. Toward open, secure, widely distributed services. Communications of the ACM, 45, June 2002.
[3]
D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong. Talking to strangers: Authentication in ad-hoc wireless networks. In Proceedings of Network and Distributed System Security Symposium, San Diego, CA, February 2002.
[4]
T. Braun and M. Danzeisen. Secure mobile IP communication. In Proceedings of 26th Annual IEEE Conference on Local Computer Networks, November 2001.
[5]
W. R. Claycomb and D. Shin. Using a two dimensional colorized barcode solution for authentication in pervasive computing. In Proceedings of the IEEE International Conference on Pervasive Services, Lyon, France, June 2006.
[6]
M. Covington, W. Long, S. Srinivsan, A. Dey, M. Ahamad, and G. Abowd. Secure context-aware applications using environmental roles. In Proceedings of 6th ACM Symposium on Access Control Models and Technologies, May 2001.
[7]
W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, IT-22(6), November 1976.
[8]
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. RFC 2693: SPKI certificate theory. Technical report, September 1999.
[9]
S. Fickas, G. Kortuem, D. Preuitt, J. Schneider, Z. Segall, and T. Thompson. When peer-to-peer comes face-to-face: collaborative peer-to-peer computing in mobile ad hoc networks. In Proceedings of the First International Conference on Peer-to-Peer Computing, 2001.
[10]
T. Finin, A. Joshi, and L. Kagal. Trust-based security in pervasive computing environments. IEEE Computer, 34, December 2001.
[11]
R. Ghanea-Hercock. Phobos: An agent-based user-authentication system. IEEE Intelligent Systems and Their Applications, 18(3), May 2003.
[12]
U. Hengartner and P. Steenkiste. Exploiting hierarchical identity-based encryption for access control to pervasive computing information. In Proceedings of First IEEE/CreateNet International Conference on Security and Privacy for Emerging Areas in Communication Networks, September 2005.
[13]
L. Kagal, T. Finin, and A. Joshi. Moving from security to distributed trust in ubiquitous computing environments. IEEE Computer, 34, December 2001.
[14]
L. Kagal, V. Korolev, H. Chen, A. Joshi, and T. Finin. Project centaurus: A framework for indoor services mobile services. In Proceedings of the 21st International Conference on Distributed Computing Systems, April 2001.
[15]
S. L. Keoh and E. Lupu. Towards flexible credential verification in mobile ad-hoc networks. In Proceedings of the 2nd ACM International Workshop on Principles of Mobile Computing, Toulouse, France, October 2002.
[16]
D. Shin and S. Im. Visual device identification for security services in ad-hoc wireless networks. In Proceedings of 20th International Symposium on Computer and Information Sciences, Istanbul, Turkey, October 2005.
[17]
F.-L. Wong and F. Stajano. Multi-channel protocols: Strong authentication using camera-equipped wireless devices. In Proceedings of the Thirteenth International Workshop on Security Protocols, Cambridge, England, April 2005.
[18]
G. Zhang and M. Parashar. Context-aware dynamic access control for pervasive applications. In Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference, January 2004.
[19]
K. Zhang and T. Kindberg. An authorization infrastructure for nomadic computing. In Proceedings of 7th ACM Symposium on Access Control Models and Technologies, June 2002.

Cited By

View all
  • (2011)A Policy-based Authorization Scheme for Resource Sharing in Pervasive EnvironmentsISSE 2010 Securing Electronic Business Processes10.1007/978-3-8348-9788-6_26(271-279)Online publication date: 2011
  • (2010)CARMA: Composable-Adaptive Resource Management Authorization for ubiquitous environments2010 Sixth International Conference on Information Assurance and Security10.1109/ISIAS.2010.5604070(234-239)Online publication date: Aug-2010
  • (2007)Enabling delegation for impromptu collaboration in pervasive computing2007 22nd international symposium on computer and information sciences10.1109/ISCIS.2007.4456898(1-6)Online publication date: Nov-2007

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '07: Proceedings of the 2007 ACM symposium on Applied computing
March 2007
1688 pages
ISBN:1595934804
DOI:10.1145/1244002
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 March 2007

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. access control
  2. mobile computing
  3. pervasive computing

Qualifiers

  • Article

Conference

SAC07
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2011)A Policy-based Authorization Scheme for Resource Sharing in Pervasive EnvironmentsISSE 2010 Securing Electronic Business Processes10.1007/978-3-8348-9788-6_26(271-279)Online publication date: 2011
  • (2010)CARMA: Composable-Adaptive Resource Management Authorization for ubiquitous environments2010 Sixth International Conference on Information Assurance and Security10.1109/ISIAS.2010.5604070(234-239)Online publication date: Aug-2010
  • (2007)Enabling delegation for impromptu collaboration in pervasive computing2007 22nd international symposium on computer and information sciences10.1109/ISCIS.2007.4456898(1-6)Online publication date: Nov-2007

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media