A Bluetooth Infrastructure for Automatic Services Access in Ubiquitous and Nomadic Computing Environments

被引:0
作者
Ficco, Massimo [1 ]
D'Arienzo, Maurizio
D'Angelo, Gianni [1 ]
机构
[1] CINI, Lab ITeM Carlo Savy, I-80126 Naples, Italy
来源
MOBIWAC'07: PROCEEDINGS OF THE FIFTH ACM INTERNATIONAL WORKSHOP ON MOBILITY MANAGEMENT AND WIRELESS ACCESS | 2007年
关键词
Ubiquitous computing; authentication; context-aware; Bluetooth; wireless LAN access;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The proliferation of mobile devices and wireless technologies pave the ground to new scenarios that attract the interest of service providers and business operators. However, to let mobile users able to receive the same services independently from the context in which they operate, several open issues need to be solved. One of these issues is related to the current levels of security that often require mobile users to exchange secret credentials with the network operators or an authentication server. This constraint limits mobile users who wish to access wireless services anywhere without caring for configuration of used devices. This paper proposes a new device that enables a mobile user to access wireless services in a seamless and automatic way using a context-aware approach in ubiquitous/nomadic computing environments. This device implements a Bluetooth personal identification badge that automatically anthenticates and authorizes a mobile user to access services independently of the mobile terminal used. Any user's terminal can retrieve proper credentials in order to authenticate and gain access to different network access points. The design and implementation of a prototype of such a device is presented.
引用
收藏
页码:17 / 24
页数:8
相关论文
共 50 条
  • [31] Open Services - Need To Restrict Access in Bluetooth
    Suri, Pushpa
    Rani, Sona
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (05): : 190 - 192
  • [32] Personalized Service Discovery in Ubiquitous Computing Environments
    Park, Kyung-Lang
    Yoon, Uram H.
    Kim, Shin-Dug
    IEEE PERVASIVE COMPUTING, 2009, 8 (01) : 58 - 65
  • [33] Routing through the mist: Privacy preserving communication in ubiquitous computing environments
    Al-Muhtadi, J
    Campbell, R
    Kapadia, A
    Mickunas, MD
    Yi, S
    22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2002, : 74 - 83
  • [34] A flexible, privacy-preserving authentication framework for ubiquitous computing environments
    Al-Muhtadi, J
    Ranganathan, A
    Campbell, R
    Mickunas, MD
    22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOP, PROCEEDINGS, 2002, : 771 - 776
  • [35] A Multipurpose Key Agreement Scheme in Ubiquitous Computing Environments
    Chang, Chin-Chen
    Lin, Iuon-Chang
    Wu, Chia-Chi
    MOBILE INFORMATION SYSTEMS, 2015, 2015
  • [36] Towards the modeling of personal privacy in ubiquitous computing environments
    Babbitt, Ryan
    Wong, Johnny
    Chang, Carl
    COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL II, PROCEEDINGS, 2007, : 695 - +
  • [37] Design requirements for ubiquitous computing environments for healthcare professionals
    Bång, M
    Larsson, A
    Eriksson, H
    MEDINFO 2004: PROCEEDINGS OF THE 11TH WORLD CONGRESS ON MEDICAL INFORMATICS, PT 1 AND 2, 2004, 107 : 1416 - 1420
  • [38] Designing Intelligent User Interface for Ubiquitous Computing Environments
    Roibas, Anxo Cereijo
    Krueger, Antonio
    2007 INTERNATIONAL CONFERENCE ON INTELLIGENT USER INTERFACES, 2007, : 12 - 12
  • [39] Immersiveness of Ubiquitous Computing Environments Prototypes: A Case Study
    Abade, Tiago
    Campos, Jose C.
    Moreira, Rui
    Silva, Carlos C. L.
    Silva, Jose Luis
    DISTRIBUTED, AMBIENT, AND PERVASIVE INTERACTIONS, 2015, 9189 : 237 - 248
  • [40] Continuum: A Service-Based Software Infrastructure for Ubiquitous Computing
    Costa, Cristiano
    Kellermann, Felipe
    Antunes, Rodolfo
    Cavalheiro, Luciano
    Yamin, Adenauer
    Geyer, Claudio
    2009 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), VOLS 1 AND 2, 2009, : 336 - +