Activity-based security scheme for ubiquitous environments

Le Xuan Hung, J. Hassan, A. S. Riaz, S. M K Raazi, Y. Weiwei, N. T. Canh, P. T H Truc, Sungyoung Lee, Heejo Lee, Yuseung Son, Miguel Fernandes, Miso Kim, Yonil Zhung

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

Bardram recently introduced a new concept of activity-based computing as a way of thinking about supporting human activities in ubiquitous environments. In such environments where users are using a multitude of heterogeneous computing devices, the need for supporting users at the activity level becomes essential. However, without considering basic security issues, it could be rife with vulnerabilities. Security services, like authentication and access control, have to not only guarantee security, privacy, and confidentiality for ubiquitous computing resources, but also support user activities equipped with various devices. In this paper, we present an activity-based security scheme. The proposed scheme aims to enhance security services on mobile devices and facilitate user activities. We also integrate off-the-shell security services like MD5, TEA, Diffie-Hellman key agreement protocol so that it makes the scheme more robust and practically usable. The implementation and sample scenario have shown the requirement satisfactory of the scheme.

Original languageEnglish
Title of host publicationConference Proceedings of the IEEE International Performance, Computing, and Communications Conference
Pages475-481
Number of pages7
DOIs
Publication statusPublished - 2008 Dec 1
Event2008 IEEE International Performance Computing and Communications Conference, IPCCC 2008 - Austin, TX, United States
Duration: 2008 Dec 72008 Dec 9

Other

Other2008 IEEE International Performance Computing and Communications Conference, IPCCC 2008
CountryUnited States
CityAustin, TX
Period08/12/708/12/9

Fingerprint

Ubiquitous computing
Access control
Mobile devices
Authentication
Network protocols

Keywords

  • Access control
  • Activity-based computing
  • Authentication
  • Security
  • Ubiuiquitous computing

ASJC Scopus subject areas

  • Engineering(all)

Cite this

Hung, L. X., Hassan, J., Riaz, A. S., Raazi, S. M. K., Weiwei, Y., Canh, N. T., ... Zhung, Y. (2008). Activity-based security scheme for ubiquitous environments. In Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference (pp. 475-481). [4745102] https://doi.org/10.1109/PCCC.2008.4745102

Activity-based security scheme for ubiquitous environments. / Hung, Le Xuan; Hassan, J.; Riaz, A. S.; Raazi, S. M K; Weiwei, Y.; Canh, N. T.; Truc, P. T H; Lee, Sungyoung; Lee, Heejo; Son, Yuseung; Fernandes, Miguel; Kim, Miso; Zhung, Yonil.

Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference. 2008. p. 475-481 4745102.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hung, LX, Hassan, J, Riaz, AS, Raazi, SMK, Weiwei, Y, Canh, NT, Truc, PTH, Lee, S, Lee, H, Son, Y, Fernandes, M, Kim, M & Zhung, Y 2008, Activity-based security scheme for ubiquitous environments. in Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference., 4745102, pp. 475-481, 2008 IEEE International Performance Computing and Communications Conference, IPCCC 2008, Austin, TX, United States, 08/12/7. https://doi.org/10.1109/PCCC.2008.4745102
Hung LX, Hassan J, Riaz AS, Raazi SMK, Weiwei Y, Canh NT et al. Activity-based security scheme for ubiquitous environments. In Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference. 2008. p. 475-481. 4745102 https://doi.org/10.1109/PCCC.2008.4745102
Hung, Le Xuan ; Hassan, J. ; Riaz, A. S. ; Raazi, S. M K ; Weiwei, Y. ; Canh, N. T. ; Truc, P. T H ; Lee, Sungyoung ; Lee, Heejo ; Son, Yuseung ; Fernandes, Miguel ; Kim, Miso ; Zhung, Yonil. / Activity-based security scheme for ubiquitous environments. Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference. 2008. pp. 475-481
@inproceedings{59812b843e104bb387a3ec9318c7023c,
title = "Activity-based security scheme for ubiquitous environments",
abstract = "Bardram recently introduced a new concept of activity-based computing as a way of thinking about supporting human activities in ubiquitous environments. In such environments where users are using a multitude of heterogeneous computing devices, the need for supporting users at the activity level becomes essential. However, without considering basic security issues, it could be rife with vulnerabilities. Security services, like authentication and access control, have to not only guarantee security, privacy, and confidentiality for ubiquitous computing resources, but also support user activities equipped with various devices. In this paper, we present an activity-based security scheme. The proposed scheme aims to enhance security services on mobile devices and facilitate user activities. We also integrate off-the-shell security services like MD5, TEA, Diffie-Hellman key agreement protocol so that it makes the scheme more robust and practically usable. The implementation and sample scenario have shown the requirement satisfactory of the scheme.",
keywords = "Access control, Activity-based computing, Authentication, Security, Ubiuiquitous computing",
author = "Hung, {Le Xuan} and J. Hassan and Riaz, {A. S.} and Raazi, {S. M K} and Y. Weiwei and Canh, {N. T.} and Truc, {P. T H} and Sungyoung Lee and Heejo Lee and Yuseung Son and Miguel Fernandes and Miso Kim and Yonil Zhung",
year = "2008",
month = "12",
day = "1",
doi = "10.1109/PCCC.2008.4745102",
language = "English",
isbn = "9781424433674",
pages = "475--481",
booktitle = "Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference",

}

TY - GEN

T1 - Activity-based security scheme for ubiquitous environments

AU - Hung, Le Xuan

AU - Hassan, J.

AU - Riaz, A. S.

AU - Raazi, S. M K

AU - Weiwei, Y.

AU - Canh, N. T.

AU - Truc, P. T H

AU - Lee, Sungyoung

AU - Lee, Heejo

AU - Son, Yuseung

AU - Fernandes, Miguel

AU - Kim, Miso

AU - Zhung, Yonil

PY - 2008/12/1

Y1 - 2008/12/1

N2 - Bardram recently introduced a new concept of activity-based computing as a way of thinking about supporting human activities in ubiquitous environments. In such environments where users are using a multitude of heterogeneous computing devices, the need for supporting users at the activity level becomes essential. However, without considering basic security issues, it could be rife with vulnerabilities. Security services, like authentication and access control, have to not only guarantee security, privacy, and confidentiality for ubiquitous computing resources, but also support user activities equipped with various devices. In this paper, we present an activity-based security scheme. The proposed scheme aims to enhance security services on mobile devices and facilitate user activities. We also integrate off-the-shell security services like MD5, TEA, Diffie-Hellman key agreement protocol so that it makes the scheme more robust and practically usable. The implementation and sample scenario have shown the requirement satisfactory of the scheme.

AB - Bardram recently introduced a new concept of activity-based computing as a way of thinking about supporting human activities in ubiquitous environments. In such environments where users are using a multitude of heterogeneous computing devices, the need for supporting users at the activity level becomes essential. However, without considering basic security issues, it could be rife with vulnerabilities. Security services, like authentication and access control, have to not only guarantee security, privacy, and confidentiality for ubiquitous computing resources, but also support user activities equipped with various devices. In this paper, we present an activity-based security scheme. The proposed scheme aims to enhance security services on mobile devices and facilitate user activities. We also integrate off-the-shell security services like MD5, TEA, Diffie-Hellman key agreement protocol so that it makes the scheme more robust and practically usable. The implementation and sample scenario have shown the requirement satisfactory of the scheme.

KW - Access control

KW - Activity-based computing

KW - Authentication

KW - Security

KW - Ubiuiquitous computing

UR - http://www.scopus.com/inward/record.url?scp=63049139246&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=63049139246&partnerID=8YFLogxK

U2 - 10.1109/PCCC.2008.4745102

DO - 10.1109/PCCC.2008.4745102

M3 - Conference contribution

AN - SCOPUS:63049139246

SN - 9781424433674

SP - 475

EP - 481

BT - Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference

ER -