A Bluetooth Infrastructure for Automatic Services Access in Ubiquitous and Nomadic Computing Environments

被引:0
作者
Ficco, Massimo [1 ]
D'Arienzo, Maurizio
D'Angelo, Gianni [1 ]
机构
[1] CINI, Lab ITeM Carlo Savy, I-80126 Naples, Italy
来源
MOBIWAC'07: PROCEEDINGS OF THE FIFTH ACM INTERNATIONAL WORKSHOP ON MOBILITY MANAGEMENT AND WIRELESS ACCESS | 2007年
关键词
Ubiquitous computing; authentication; context-aware; Bluetooth; wireless LAN access;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The proliferation of mobile devices and wireless technologies pave the ground to new scenarios that attract the interest of service providers and business operators. However, to let mobile users able to receive the same services independently from the context in which they operate, several open issues need to be solved. One of these issues is related to the current levels of security that often require mobile users to exchange secret credentials with the network operators or an authentication server. This constraint limits mobile users who wish to access wireless services anywhere without caring for configuration of used devices. This paper proposes a new device that enables a mobile user to access wireless services in a seamless and automatic way using a context-aware approach in ubiquitous/nomadic computing environments. This device implements a Bluetooth personal identification badge that automatically anthenticates and authorizes a mobile user to access services independently of the mobile terminal used. Any user's terminal can retrieve proper credentials in order to authenticate and gain access to different network access points. The design and implementation of a prototype of such a device is presented.
引用
收藏
页码:17 / 24
页数:8
相关论文
共 50 条
  • [41] Ad hoc Privacy Management in Ubiquitous Computing Environments
    Buennig, Christian
    Cap, Clemens H.
    2009 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN HUMAN-ORIENTED AND PERSONALIZED MECHANISM, TECHNOLOGIES, AND SERVICES, 2009, : 85 - 90
  • [42] An incentive compatible reputation mechanism for ubiquitous computing environments
    Jinshan Liu
    Valérie Issarny
    International Journal of Information Security, 2007, 6 : 297 - 311
  • [43] An incentive compatible reputation mechanism for ubiquitous computing environments
    Liu, Jinshan
    Issarny, Valerie
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2007, 6 (05) : 297 - 311
  • [44] Ubiquitous Computing for Cloud Infrastructure to Mobile Application in IoT Environment
    Seo, DongBum
    Lee, Keun-Ho
    Jeon, You-Boo
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2017, 421 : 742 - 749
  • [45] A Framework for ranking ubiquitous computing services by AHP analysis
    Izadpanah, Shaghayegh
    Vahdat-Nejad, Hamed
    Saadatfar, Hamid
    INTERNATIONAL JOURNAL OF MODELING SIMULATION AND SCIENTIFIC COMPUTING, 2018, 9 (04)
  • [46] Authenticating Ubiquitous Services: A Study of Wireless Hotspot Access
    Kindberg, Tim
    Bevan, Chris
    O'Neill, Eamonn
    Mitchell, James
    Grimmett, Jim
    Woodgate, Dawn
    UBICOMP'09: PROCEEDINGS OF THE 11TH ACM INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING, 2009, : 115 - 124
  • [47] Trust Management Using Networks of Volunteers in Ubiquitous Computing Environments
    Kim, Mijeom
    Kumar, Mohan
    Jung, Sukju
    SMART SPACES AND NEXT GENERATION WIRED/WIRELESS NETWORKING, PROCEEDINGS, 2009, 5764 : 279 - +
  • [48] User profile management on service platforms for ubiquitous computing environments
    Sutterer, Michael
    Droegehorn, Olaf
    David, Klaus
    2007 IEEE 65TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-6, 2007, : 287 - 291
  • [49] A privacy agent in context-aware ubiquitous computing environments
    Zhang, Ni
    Todd, Chris
    COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2006, 4237 : 196 - 205
  • [50] A remote display environment: An integration of mobile and ubiquitous computing environments
    Uemukai, T
    Hara, T
    Tsukamoto, M
    Nishio, S
    WCNC 2002: IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE RECORD, VOLS 1 & 2, 2002, : 618 - 624