A Design of Context aware Smart Home Safety Management using by Networked RFID and Sensor

  • Byunggil Lee
  • Howon Kim
Conference paper
Part of the IFIP — The International Federation for Information Processing book series (IFIPAICT, volume 256)


Recently home intelligent service is extended to context aware and situation aware automation service by using ubiquitous technology. In this paper, we focused on user’s context based intelligent security management for home safety application using RFID and WSN(Wireless Sensor Network). We propose a context aware home safety application model. The proposed context service support security and privacy control by using user’s situation aware security management. It will be a practical application of RFID and sensor network for ubiquitous home safety environment. The proposed system has lots of advantages in user safety and energy efficiency.


Sensor Network Wireless Sensor Network Access Control Context Policy Security Management 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. [1]
    Siio, I., Hayasaka, T., “Putting information to things : RFID tags and their application”, IPSJ Magazine ,Vol. 40, No.8, pp. 846–850, Aug. 1999.Google Scholar
  2. [2]
    EPCglobal. “The EPCglobal Network:Overview of Design, Benefits and Security”, http://www.epcgiobalinc.org/ Sep. 2004.Google Scholar
  3. [3]
    G. Avoine and Ph. Oechslin, “A scalable and provable secure hash based RFID protocol”, International Workshop on Pervasive Computing and Comunications Security, PerSec 2005 ,pp. 110–114. IEEE, 2005.Google Scholar
  4. [4]
    Sanjay E. Sarma, et al., “RFID Systems and Security and Privacy Implications”, CHES 2002, Lecture Notes in Computer Science 2523, pp. 454–469. 2002.Google Scholar
  5. [5]
    EPCglobla Inc. http://www.epcglobalinc.org/.Google Scholar
  6. [6]
    B.G. Lee, H.W. Kim, “A Design of Privacy Conscious RFID System Using Customizing Privacy Policy Based Access Control”, Lecture Notes in Computer Science Vol. 3823, pp. 673–682, Nov. 2005.Google Scholar
  7. [7]
    G.D. Abowd, M. Ebling, G. Hunt, H. Lei, and H.W. Gellersen, “Context-Aware Computing,” PERVASIVE computing. JULY-SEPTEMBER 2002, pp. 22–23.Google Scholar
  8. [8]
    Chemishkian, S., “Building smart services for smart home”, Networked Appliances, p.p 215–224, January 2002Google Scholar
  9. [9]
    Jiang, L., Liu, D., Yang, B., “SMART HOME RESEARCH”, Machine Learning and Cybernetics, p.p 659–663 vol. 2, August 2004Google Scholar
  10. [10]
    Mostefaoui, G.K.., “Context-A ware Computing: A Guide for the Pervasive Computing Community”, Pervasive Services, p.p 39–48, July 2004Google Scholar
  11. [11]
    Wullems, C., Looi, M., Clark, A., “Towards context-aware security: an authorization architecture for intranet environments”, Pervasive Computing and Communications, p.p 132–137, March 2004.Google Scholar
  12. [12]
    Covington, M. J., Fogia, P., Zhiyuan, Z., Ahamad, M., “A Context-Aware Security Architecture for Emerging Applications”, Annual Computer Security Applications Conference, p.p 249–258, December 2002.Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2008

Authors and Affiliations

  • Byunggil Lee
    • 1
  • Howon Kim
    • 1
  1. 1.Electronics and Telecommunications Research InstituteKorea

Personalised recommendations