skip to main content
10.1145/1655062.1655065acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Trust based security auto-configuration for smart assisted living environments

Published: 09 November 2009 Publication History

Abstract

Recent progresses in wireless sensor networking and pervasive computing have created huge opportunities for providing elderly people with technological facilities. For elderly people, conceiving technologies for increasing their autonomy, so as to enable them to self-manage their life is of utmost importance. However, when it comes to smart home, once all appliances in a home are automated and connected through internet, it becomes essential to consider issues of security, especially security configuration. In the smart home, security has to be configured and managed by technology-unaware elderly people. One mechanism of auto security configuration in such environment can be achieved by observing the trustworthiness of smart devices. Trust-based security mechanisms allow access rights to evolve among previously unknown devices, thus minimizing security configuration. In this paper, we present a security configuration model which takes critical security decisions by determining the trustworthiness of an entity based on the sources of trust: Direct interaction and Recommendation trust.

References

[1]
Ahamed, S. I., Haque, M. M., Stamm, K., Khan, A. J. 2007. Wellness Assiatant: A Virtual Wellness Assistant using Pervasive Computing. In Proceedings of the 22nd Annual ACM Symposium on Applied Computing. SAC 07. ACM Press, Seoul, Korea,782--787.
[2]
Ahamed, S. I., Hoque, E., Rahman, F., and Zulkernine, M. 2008. Towards Secured Trust Bootstrapping in Pervasive Computing Environment. In Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium. HASE 2008. IEEE Computer Society Press, Nanjing, China, 89--96.
[3]
Blaze, M., Feigenbaum, J., and Lacy, J. 1996. Decentralized trust management. In Proceedings of the IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press, 96--17.
[4]
Burrows, M., Abadi, M., and Needham R. 1990. A Logic of Authentication. In ACM Transactions on Computer Systems. 8, 1. ACM Press, New York, USA, 18--36.
[5]
Cahill, V., Gray, E., Seigneur, J. M., Jensen, C., Chen, Y., Shand, B., Dimmock, N., Twigg, A., Bacon, J., English, C., Wagealla, W., Terzis, S., Nixon, P., Serugendo, G. d. M., Bryce, C., Carbone, M., Krukow, K., and Nielsen, M. 2003. Using Trust for Secure Collaboration in Uncertain Environments. In Pervasive Computing. 2, 3. IEEE Computer Society Press.
[6]
Chen, R., and Yeager, W. 2001. Poblano, A Distributed Trust Model for Peer-to-Peer Networks. Sun Microsystems.
[7]
Chu, Y. H., Feigenbaum, J., LaMacchia, B., Resnick, P., and Strauss, M. 1997. REFEREE: Trust Management for Web Applications. In World Wide Web Journal. 2, 3. O'Reilly & Associates, Inc. 127--139.
[8]
Ellison, C. M. 1999. SPKI requirements. In RFC 2692, IETF. ftp://ftp.isi.edu/in-notes/rfc2692.txt.
[9]
Haque, M., and Ahamed, S. I. 2007. An Omnipresent Formal Trust Model (FTM) for Pervasive Computing Environment. In Proc. of the 31st Annual IEEE International Computer Software and Applications Conference. COMPSAC 2007. IEEE Computer Society Press, Beijing, China, 49--56.
[10]
Jini, Sun Microsystems, Website, www.jini.org.
[11]
Josang, A. 1996. The right type of trust for distributed systems. In Proceedings of the 1996 workshop on New security paradigms. NSPW '96. ACM Press, Lake Arrowhead, California, 119--131.
[12]
JXTA, Website, www.jxta.org.
[13]
JXTA, Project JXTA: Java Programmer's Guide. 2001. Sun Microsystems, http://www.jxta.org/
[14]
Lee, R., Chen, H., Lin, C., Chang K., Chen J. 2000. Home Telecare System using Cable Television Plants-An Experimental Field Trial. In IEEE Transactions on Information Technology in Biomedicine. IEEE Computer Society Press, 37--43.
[15]
Liu, Y., Bacon, J., and Wilson-Hinds, R. 2007. On smart-care services: Studies of visually impaired users in living contexts. In Proceedings of the First International Conference on the Digital Society. ICDS'07. IEEE Computer Society Press, 32(s).
[16]
Mileo, A., Merico, D., Bisiani, R. 2008. Wireless sensor networks supporting context-aware reasoning in assisted living. In Proceedings of the 1st international conference on Pervasive Technologies Related to Assistive Environments, PETRA'08, ACM Press, 1--2.
[17]
Oppermann R., Rashev R., and Kinshuk. 1997. Adaptability and Adaptivity in Learning Systems. In Knowledge Transfer. 2. London, 173--179. ISBN 1-900427-015-X.
[18]
OSGi Service Platform Release 2 Specification. 2001. The Open Services Gateway Initiative, http://www.osgi.org/resources/docs/spr2book.pdf.
[19]
Oxford University, March 1998. Injuries of Aging Person's Report. http://www.jr2.ox.ac.uk/bandolier/band25/b25-2.html
[20]
Quercia, D., Hailes, S., and Capra, L. 2007. TRULLO -- Local Trust Bootstrapping for Ubiquitous Devices. In Proc. of the 4th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. MobiQuitous 2007. IEEE Computer Society, Philadelphia, Pennsylvania, 1--9.
[21]
Rahman, A. A. and Hailes. S. 1997. A Distributed Trust Model. In Proceedings of the 1997 New Security Paradigms Workshop. ACM Press, 48--60.
[22]
Rialle, V., Lamy, J.B., Noury, N. and Bajolle L. 2003. Telemonitoring of patients at home: a software approach. In Computer Methods and Programs in Biomedicine. 72, 3. 257-- 268.
[23]
Ruyter, B.D., Pelgrim, E. 2007. Ambient assisted--living research in carelab. In ACM Interactions (Special issue on Designing for seniors: innovations for graying times). 14, 4. ACM Press, New York, NY, USA, 30--33.
[24]
SECURE, Secure Environments for Collaboration among Ubiquitous Roaming Entities. Website, http://secure.dsg.cs.tcd.ie.
[25]
Seigneur, J.M. 2001. HOUSe-KEEPER, a vendorindependent architecture for easy management of smart homes. Technical Report, Trinity College Dublin, http://citeseer.nj.nec.com/seigneur01 housekeeper.html.
[26]
UPnP. Universal Plug and Play. Website, www.upnp.org.
[27]
Velentzas, R., Marsh, A., Min, G. 2008. Wireless Connected Home with Integrated Secure Healthcare Services for Elderly People. In Proceedings of the 1st international conference on Pervasive Technologies Related to Assistive Environments. PETRA'08, ACM Press, Greece, 1--4.
[28]
Vergados, D., Alevizos, A., Caragiozidis, M. 2008. Intelligent Services for Assisting Independent Living of Elderly People at Home. In Proceedings of the 1st international conference on Pervasive Technologies Related to Assistive Environments. PETRA'08, ACM Press, Greece, 1--4.

Cited By

View all

Index Terms

  1. Trust based security auto-configuration for smart assisted living environments

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SafeConfig '09: Proceedings of the 2nd ACM workshop on Assurable and usable security configuration
    November 2009
    88 pages
    ISBN:9781605587783
    DOI:10.1145/1655062
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 09 November 2009

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. assisted living
    2. security configuration
    3. smart home
    4. trust

    Qualifiers

    • Research-article

    Conference

    CCS '09
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 22 of 61 submissions, 36%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)4
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 13 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media