A Bluetooth Infrastructure for Automatic Services Access in Ubiquitous and Nomadic Computing Environments

被引:0
作者
Ficco, Massimo [1 ]
D'Arienzo, Maurizio
D'Angelo, Gianni [1 ]
机构
[1] CINI, Lab ITeM Carlo Savy, I-80126 Naples, Italy
来源
MOBIWAC'07: PROCEEDINGS OF THE FIFTH ACM INTERNATIONAL WORKSHOP ON MOBILITY MANAGEMENT AND WIRELESS ACCESS | 2007年
关键词
Ubiquitous computing; authentication; context-aware; Bluetooth; wireless LAN access;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The proliferation of mobile devices and wireless technologies pave the ground to new scenarios that attract the interest of service providers and business operators. However, to let mobile users able to receive the same services independently from the context in which they operate, several open issues need to be solved. One of these issues is related to the current levels of security that often require mobile users to exchange secret credentials with the network operators or an authentication server. This constraint limits mobile users who wish to access wireless services anywhere without caring for configuration of used devices. This paper proposes a new device that enables a mobile user to access wireless services in a seamless and automatic way using a context-aware approach in ubiquitous/nomadic computing environments. This device implements a Bluetooth personal identification badge that automatically anthenticates and authorizes a mobile user to access services independently of the mobile terminal used. Any user's terminal can retrieve proper credentials in order to authenticate and gain access to different network access points. The design and implementation of a prototype of such a device is presented.
引用
收藏
页码:17 / 24
页数:8
相关论文
共 18 条
[1]  
[Anonymous], 2006, P IEEE C COMP VIS PA
[2]  
*BLUET HANDH DEV, BLUET SEC WIR NETW S
[3]   Physically unclonable function-based security and privacy in RFID systems [J].
Bolotnyy, Leonid ;
Robins, Gabriel .
FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2007, :211-+
[4]   Preparing Smartcard for the future: From passive to active [J].
Chan, PK ;
Choy, CS ;
Chan, CF ;
Pun, KP .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (01) :245-250
[5]   Wireless LAN security and IEEE 802.11i [J].
Chen, JC ;
Jiang, MC ;
Liu, YW .
IEEE WIRELESS COMMUNICATIONS, 2005, 12 (01) :27-36
[6]   A context-centric security middleware for service provisioning in pervasive computing [J].
Corradi, A ;
Montanari, R ;
Tibaldi, D ;
Toninelli, A .
2005 SYMPOSIUM ON APPLICATIONS AND THE INTERNET, PROCEEDINGS, 2005, :421-429
[7]   A multiview facial analysis technique for identity authentication [J].
Gao, YS ;
Hui, SC ;
Fong, ACM .
IEEE PERVASIVE COMPUTING, 2003, 2 (01) :38-45
[8]  
HARPER S, 2004, P 37 HAW INT C SYST, P1
[9]  
*HOSTAPD, US SPAC DAEM ACC POI
[10]  
KIM HS, 2006, P INT C HYBR INF TEC, V2, P356