Skip to main content

Instant Matchmaking: Simple and Secure Integrated Ubiquitous Computing Environments

  • Conference paper
UbiComp 2006: Ubiquitous Computing (UbiComp 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4206))

Included in the following conference series:

Abstract

Effective ubiquitous computing applications need to integrate users’ personal devices and data with the devices and resources they encounter around them. Previous work addressed this problem by simply enabling the user to take all of their data with them wherever they go. In this paper, we present a more flexible approach: the “instant matchmaker”, a personal device that allows a user to seamlessly and securely connect his local computing environment with his other personal resources, wherever they are. The matchmaker provides an intuitive user experience, while simultaneously enabling extremely fine-grained control over access to resources. We have implemented a cellphone-based matchmaker and explored its use in a secure media sharing application. The matchmaker concept, however, is general, and can be used to enable a range of appealing and secure ubicomp applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Want, R., Pering, T., Danneels, G., Kumar, M., Sundar, M., Light, J.: The personal server: Changing the way we think about ubiquitous computing. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 194–209. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  2. Pering, T., Nguyen, D.H., Light, J., Want, R.: Face-to-face media sharing using wireless mobile devices. In: Seventh IEEE International Symposium on Multimedia (ISM 2005), pp. 269–276 (2005)

    Google Scholar 

  3. Smetters, D.K., Grinter, R.E.: Moving from the design of usable security technologies to the design of useful secure applications. In: New Security Paradigms Workshop 2002. ACM Press, New York (2002)

    Google Scholar 

  4. Cheung, H.: How To: Building a BlueSniper rifle - Part 1 (2005), http://www.tomsnetworking.com/2005/03/08/how_to/

  5. The Trifinite Group: The car whisperer (2005), http://trifinite.org/trifinite_stuff_carwhisperer.html

  6. Slingbox (2006), http://www.slingbox.com

  7. Orb Networks (2006), http://www.orb.com

  8. GoToMyPC (2006), http://www.gotomypc.com

  9. Oprea, A., Balfanz, D., Durfee, G., Smetters, D.: Securing a remote terminal application with a mobile trusted device. In: Proceedings of the Annual Computer Security Applications Conference, Tucson, AZ (2004)

    Google Scholar 

  10. Corner, M.D., Noble, B.D.: Zero-interaction authentication. In: Proceedings of the eighth Annual International Conference on Mobile Computing and Networking (MOBICOM 2002), pp. 1–11. ACM Press, New York (2002)

    Chapter  Google Scholar 

  11. Bauer, L., Garriss, S., Reiter, M.K.: Distributed proving in access-control systems. In: IEEE Symposium on Security and Privacy, pp. 81–95 (2005)

    Google Scholar 

  12. Bauer, L., Garriss, S., McCune, J.M., Reiter, M.K., Rouse, J., Rutenbar, P.: Device-enabled authorization in the grey-system. In: ISC, pp. 431–445 (2005)

    Google Scholar 

  13. Balfanz, D., Dean, D., Spreitzer, M.: A security infrastructure for distributed Java applications. In: 21th IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA (2000)

    Google Scholar 

  14. Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.: The KeyNote Trust-Management System Version 2. IETF - Network Working Group, The Internet Society. RFC 2704 (1999)

    Google Scholar 

  15. DeTreville, J.: Binder, a logic-based security language. In: 2002 IEEE Symposium on Security and Privacy, Oakland, CA (2002)

    Google Scholar 

  16. Bauer, L., Schneider, M.A., Felten, E.W.: A general and flexible access-control system for the web. In: Proceedings of the 11th USENIX Security Symposium, San Francisco, CA (2002)

    Google Scholar 

  17. Abadi, M., Burrows, M., Lampson, B.: A calculus for access control in distributed systems. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 1–23. Springer, Heidelberg (1992)

    Google Scholar 

  18. Halpern, J.Y., van der Meyden, R.: A logic for SDSI’s linked local name spaces. In: Proceedings of the 12th IEEE Computer Security Foundations Workshop, Mordano, Italy, pp. 111–122 (1999)

    Google Scholar 

  19. Stajano, F., Anderson, R.J.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172–194. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  20. Balfanz, D., Smetters, D., Stewart, P., Wong, H.C.: Talking to strangers: Authentication in ad-hoc wireless networks. In: Proceedings of the 2002 Network and Distributed Systems Security Symposium (NDSS 2002), San Diego, CA, The Internet Society (2002)

    Google Scholar 

  21. Rekimoto, J., Ayatsuka, Y., Kohno, M., Oba, H.: Proximal interactions: A direct manipulation technique for wireless networking. In: INTERACT 2003 (2003)

    Google Scholar 

  22. Kohno, M., Rekimoto, J.: New generation of IP-phone enabled mobile devices. In: Paternó, F. (ed.) Mobile HCI 2002. LNCS, vol. 2411, pp. 319–329. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  23. Kindberg, T., Zhang, K.: Secure spontaneous device association. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, pp. 124–131. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  24. Kindberg, T., Zhang, K.: Validating and securing spontaneous associations between wireless devices. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol. 2851, pp. 44–53. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  25. McCune, J.M., Perrig, A., Reiter, M.K.: Seeing-is-believing: Using camera phones for human-verifiable authentication. In: Proceedings of the IEEE Symposium on Security and Privacy (2005)

    Google Scholar 

  26. Balfanz, D., Durfee, G., Grinter, R.E., Smetters, D., Stewart, P.: Network-in-a-box: How to set up a secure wireless network in under a minute. In: Proceedings of the 13th USENIX Security Symposium, San Diego, CA (2004)

    Google Scholar 

  27. Balfanz, D., Durfee, G., Smetters, D.: Making the impossible easy: Usable PKI. In: Cranor, L.F., Garfinkel, S. (eds.) Security and Usability – Designing Secure Systems that People Can Use, pp. 319–334. O’Reilly Media, Inc., Sebastopol (2005)

    Google Scholar 

  28. Dierks, T., Allen, C.: The TLS Protocol Version 1.0. IETF - Network Working Group. The Internet Society. RFC 2246 (1999)

    Google Scholar 

  29. Edwards, W.K., Newman, M.W., Sedivy, J.Z., Smith, T.F., Izadi, S.: Challenge: Recombinant computing and the Speakeasy approach. In: Proceedings of the Eighth ACM International Conference on Mobile Computing and Networking (Mobicom 2002), Atlanta, GA (2002)

    Google Scholar 

  30. Newman, M.W., Sedivy, J.Z., Edwards, W.K., Smith, T.F., Marcelo, K., Neuwirth, C.M., Hong, J.I., Izadi, S.: Designing for serendipity: Supporting end-user configuration of ubiquitous computing environments. In: Proceedings of the Conference on Designing Interactive Systems (DIS 2002), London, UK (2002)

    Google Scholar 

  31. Newman, M.W., Izadi, S., Edwards, W.K., Smith, T.F., Sedivy, J.Z.: User interfaces when and where they are needed: An infrastructure for recombinant computing. In: Proceedings of the Symposium on User Interface Software and Technology (UIST), Paris, France. ACM, New York (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Smetters, D.K., Balfanz, D., Durfee, G., Smith, T.F., Lee, KH. (2006). Instant Matchmaking: Simple and Secure Integrated Ubiquitous Computing Environments. In: Dourish, P., Friday, A. (eds) UbiComp 2006: Ubiquitous Computing. UbiComp 2006. Lecture Notes in Computer Science, vol 4206. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11853565_28

Download citation

  • DOI: https://doi.org/10.1007/11853565_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-39634-5

  • Online ISBN: 978-3-540-39635-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics