RFID Security pp 255-287 | Cite as

Using RFID-based “Touch” for Intuitive User Interaction with Smart Space Security

  • Zoe Antoniou
  • Dimitris Kalofonos
  • Franklin Reynolds


Home networks and networked consumer electronic devices are increasingly becoming a part of our everyday lives. One of the challenges in designing smart home technology is making these systems secure and, at the same time, easy-to-use for non-expert consumers. We believe that mobile devices equipped with a “touch” network interface and corresponding middleware are ideal for enabling users to intuitively setup and manage the security of their smart homes. In this chapter, we describe such a middleware for mobile phones based on Near Field Communication (NFC) technology. We propose a mobile middleware architecture called iTouchSec based on a higher level User-Interaction with Security (UI-SEC) middleware, called IntuiSec, and a lower level NFC middleware, called iTouch. We present the overall architecture, as well as the detailed design of the necessary NFC records that are exchanged over RF. Finally, we present our experience with an initial implementation of parts of the proposed middleware using actual NFC hardware and Symbian-based mobile phones.


Service Discovery Smart Home Home Network Near Field Communication Smart Space 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Chapter 11-References

  1. 1.
    Universal Plug-and-Play (UPnP) Forum, UPnP Device Architecture 1.0.1, December 2003Google Scholar
  2. 2.
    Digital Living Network Alliance (DLNA), Digital Living Network Alliance Home Networked Device Interoperability Guidelines Expanded, March 2006Google Scholar
  3. 3.
    M. Weisner. The computer for the 21st century. Scientific American. 265(3): 94, September 1991CrossRefGoogle Scholar
  4. 4.
    NFC Forum, www.nfc-forum.com
  5. 5. R. Mayrhofer and H. Gellersen. Shake Well Before Use: Authentication Based on Accelerometer Data, Proceedings of Pervasive, 2007Google Scholar
  6. 6.
    S. Shakhshir and D. Kalofonos. Usable Security in Smart Homes, Proceedings of the Eighth International Wireless Personal Multimedia Communications Symposium (WPMC'05), Aalborg, Denmark, 2005Google Scholar
  7. 7.
    Z. Antoniou and S. Varadan. iTouch: RFID middleware for boosting connectivity and intuitive user interaction in smart spaces, Nokia Research Center Technical Report (NRC-TR-2006–002), May 2006. http://research.nokia.com/tr/NRC-TR-2006–002.pdf
  8. 8.
    Z. Antoniou and S. Varadan. Intuitive Mobile User Interaction in Smart Spaces via NFC-Enhanced devices, Proceedings of IEEE ICCGI'07, Guadeloupe, March 2007Google Scholar
  9. 9.
    D. Kalofonos. IntuiWare Security Functional Specification, Nokia Research Center Technical Report (Internal), April 2004.Google Scholar
  10. 10.
    S. Shakhshir and D. Kalofonos. IntuiSec: A Framework for Intuitive User Interaction with Smart Home Security, Nokia Research Center Technical Report (NRC-TR-2006–003), April 2006. http://research.nokia.com/tr/NRC-TR-2006–003.pdf
  11. 11.
    D. Kalofonos and S. Shakhshir, IntuiSec: A Framework for Intuitive User Interaction with Smart Home Security Using Mobile Devices, Proceedings of IEEE PIMRC, September 2007Google Scholar
  12. 12.
    M. Michalakis, D. Kalofonos, and B. Shafai. An Experimental Hardware Extension Platform for Mobile Devices in Smart Spaces, Proceedings of International Conference on Pervasive Systems and Computing (PSC'06), Las Vegas, NV, 2006Google Scholar
  13. 13.
    C. Hurley, M. Puchol (Editor), R. Rogers, and F. Thornton. WarDriving: Drive, Detect, Defend, A Guide to Wireless Security, 1st edition, Syngress, Rockland, MA, 2004Google Scholar
  14. 14.
    P. Dourish, R. Grinter, J. Delgado de la Flor, and M. Joseph. Security in the wild: User strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing. 8(6): 391–401, 2004CrossRefGoogle Scholar
  15. 15.
    H. Nakakita, K. Yamaguchi, M. Hashimoto, T. Saito, and M. Sakurai. A study on secure wireless networks consisting of home appliances. IEEE Transactions on Consumer Electronics. 49(2): 375–381, 2003CrossRefGoogle Scholar
  16. 16.
    C. Ellison. Home network security. Intel Technology Journal. 6(4): 37–48, 2002Google Scholar
  17. 17.
    Wi-Fi Alliance (WFA), www.wi-fi.org
  18. 18.
    Z. Antoniou and D. Kalofonos. NFC-based Mobile Middleware for Intuitive User Interaction with Security in Smart Homes, Proceedings of the Fifth IASTED International Conference on Communication Systems and Networks (CSN'06), Palma de Mallorca, Spain, August 2006Google Scholar
  19. 19.
    Z. Antoniou. A Touch is Worth A Thousand Clicks, Proceedings of IEEE International Conference on Wireless Information Networks and Systems, WINSYS part of ICETE, Portugal, August 2006Google Scholar
  20. 20.
    Z. Antoniou, G. Krishnamurthi, and F. Reynolds. Intuitive Service Discovery in RFID-Enhanced Networks, Proceedings of IEEE COMSWARE Conference, India, 2006Google Scholar
  21. 21.
    J. Riekki, T. Salminen, and I. Alakarppa. Requesting pervasive services by touching RFID tags. Pervasive Computing Magazine. 5(1): 40–46, 2006CrossRefGoogle Scholar
  22. 22.
    T. Pering, R. Ballagas, and R. Want. Spontaneous marriages of mobile devices and interactive spaces. Communications of the ACM. 48(9): 53–59, 2005CrossRefGoogle Scholar
  23. 23.
    D. Balfanz, G. Durfee, R. Grinter, D. Smetters, and P. Stewart. Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute, Proceedings of 13th USENIX Security Symposium, San Diego, CA, pp. 207–222, 2004Google Scholar
  24. 24.
    D. Balfanz, D. Smetters, P. Stewart, and H. Chi Wong. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks, Proceedings of the Network and Distributed Systems Security Symposium (NDSS'02), San Diego, CA, 2002Google Scholar
  25. 25.
    A. Schmidt, H.-W. Gellersen, M. Beigl, and O. Thade. Developing User Interfaces for Wearable Computers - Don' t Stop to Point and Click, Intelligent Interactive Assistance and Mobile Multimedia Computing (IMC'2000), Rostock-Warnem ünde, Germany, 9–10 November 2000Google Scholar
  26. 26.
    T. Kindberg, J. Barton, J. Morgan, G. Becker, D. Caswell, P. Debaty, G. Gopal, M. Frid, V. Krishnan, H. Morris, J. Schettino, and B. Serra. People, Places, Things: Web Presence for the Real World, Available at http://cooltown.hp.com/dev/wpapers/index.asp
  27. 27.
    M. Beigl. Point & Click - Interaction in Smart Environments. In: H.-W. Gellersen, ed., Hand-held and Ubiqutious Computing, Lecture Notes in Computer Science, vol. 1707, ISBN 3–540–66550–1, pp. 311–314, Springer, Berlin, 1999Google Scholar
  28. 28.
    S. S. Intille, V. Lee, and C. Pinhanez. Ubiquitous Computing in the Living Room: Concept Sketches and an Implementation of a Persistent User Interface, UbiComp, 2003Google Scholar
  29. 29.
    T. Salminen and J. Riekki. Lightweight Middleware Architecture for Mobile Phones, http://www.mediateam.oulu.fi/publications/pdf/647.pdf
  30. 30.
    D. L. de Ipina, I. Vazquez, D. Garcia, J. Fernandez, I. Garcia. A Reflective Middleware for Controlling Smart Objects from Mobile Devices, SoC-EUSAI, 2005Google Scholar
  31. 31.
    M. T. Goodrich, M. Sirivianos, J. Solis, G. Tsudik, E. Uzun. Loud and Clear: Human Verifiable Authentication Based on Audio, Proceedings of ICDCS 2006: 26th Conference on Distributed Computing Systems, IEEE Computer Society, Los Alamitos, CA, p. 10, 2006Google Scholar
  32. 32.
    J. H. Hoepman. The Emphemeral Pairing Problem, Proceedings of Eighth International Conference on Financial Cryptography, pp. 212–226, Springer, Berlin, 2004Google Scholar
  33. 33.
    L. M. Feeney, B. Ahlgren, A. Westerlund, and A. Dunkels. Spontnet: Experiences in Configuring and Securing Small Ad Hoc Networks, Fifth International Workshop on Networked Appliances (IWNA5), October 2002Google Scholar
  34. 34.
    H. Ishii and B. Ullmer. Tangible Bits: Towards Seamless Interfaces Between People, Bits, and Atoms, Proceedings of CHI'97, pp. 234–241Google Scholar
  35. 35.
    K. Fishkin, A. Gujar, B. Harrison, T. Moran, and R. Want. Embodied User Interfaces for Really Direct Manipulation. Communications of the ACM. 43(9): 75–80, 2000CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2008

Authors and Affiliations

  • Zoe Antoniou
    • 1
  • Dimitris Kalofonos
  • Franklin Reynolds
  1. 1.Pervasive Computing GroupNokia Research Center CambridgeCambridgeUSA

Personalised recommendations