A Bluetooth Infrastructure for Automatic Services Access in Ubiquitous and Nomadic Computing Environments

被引:0
作者
Ficco, Massimo [1 ]
D'Arienzo, Maurizio
D'Angelo, Gianni [1 ]
机构
[1] CINI, Lab ITeM Carlo Savy, I-80126 Naples, Italy
来源
MOBIWAC'07: PROCEEDINGS OF THE FIFTH ACM INTERNATIONAL WORKSHOP ON MOBILITY MANAGEMENT AND WIRELESS ACCESS | 2007年
关键词
Ubiquitous computing; authentication; context-aware; Bluetooth; wireless LAN access;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The proliferation of mobile devices and wireless technologies pave the ground to new scenarios that attract the interest of service providers and business operators. However, to let mobile users able to receive the same services independently from the context in which they operate, several open issues need to be solved. One of these issues is related to the current levels of security that often require mobile users to exchange secret credentials with the network operators or an authentication server. This constraint limits mobile users who wish to access wireless services anywhere without caring for configuration of used devices. This paper proposes a new device that enables a mobile user to access wireless services in a seamless and automatic way using a context-aware approach in ubiquitous/nomadic computing environments. This device implements a Bluetooth personal identification badge that automatically anthenticates and authorizes a mobile user to access services independently of the mobile terminal used. Any user's terminal can retrieve proper credentials in order to authenticate and gain access to different network access points. The design and implementation of a prototype of such a device is presented.
引用
收藏
页码:17 / 24
页数:8
相关论文
共 50 条
  • [1] Centaurus: An Infrastructure for Service Management in Ubiquitous Computing Environments
    Lalana Kagal
    Vladimir Korolev
    Sasikanth Avancha
    Anupam Joshi
    Tim Finin
    Yelena Yesha
    Wireless Networks, 2002, 8 : 619 - 635
  • [2] Centaurus: An infrastructure for service management in ubiquitous computing environments
    Kagal, L
    Korolev, V
    Avancha, S
    Joshi, A
    Finin, T
    Yesha, Y
    WIRELESS NETWORKS, 2002, 8 (06) : 619 - 635
  • [3] Cooperative Evolution of Services in Ubiquitous Computing Environments
    Tacconi, David
    Miorandi, Daniele
    Carreras, Iacopo
    De Pellegrini, Francesco
    Chlamtac, Imrich
    ACM TRANSACTIONS ON AUTONOMOUS AND ADAPTIVE SYSTEMS, 2011, 6 (03)
  • [4] Context-aware active services in ubiquitous computing environments
    Moon, Aekyung
    Kim, Hyoungsun
    Kim, Hyun
    Lee, Soowon
    ETRI JOURNAL, 2007, 29 (02) : 169 - 178
  • [5] Benchmarking Bluetooth SPP Communications for Ubiquitous Computing
    Gardeazabal, Xabier
    Gamecho, Borja
    Abascal, Julio
    UBIQUITOUS COMPUTING AND AMBIENT INTELLIGENCE, UCAMI 2016, PT II, 2016, 10070 : 248 - 253
  • [6] Access control for security and privacy in ubiquitous computing environments
    Yamada, S
    Kamioka, E
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (03) : 846 - 856
  • [7] Location-based services in ubiquitous computing environments
    Satoh, Ichiro
    INTERNATIONAL JOURNAL ON DIGITAL LIBRARIES, 2006, 6 (03) : 280 - 291
  • [8] Access control using threshold cryptography for ubiquitous computing environments
    Al-Muhtadi, Jalal
    Hill, Raquel
    Al-Rwais, Sumayah
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2011, 23 (02) : 71 - 78
  • [9] Ubiquitous Accessibility: Building Access Features Directly into the Network to Allow Anyone, Anywhere Access to Ubiquitous Computing Environments
    Vanderheiden, Gregg C.
    UNIVERSAL ACCESS IN HUMAN-COMPUTER INTERACTION, PT II, PROCEEDINGS: INTELLIGENT AND UBIQUITOUS INTERACTION ENVIRONMENTS, 2009, 5615 : 432 - 437
  • [10] An Experimental Mobile Bluetooth-Based Game Development in Ubiquitous Computing
    Lai, Andy S. Y.
    Beaumont, A. J.
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL III, 2010, : 342 - 345