Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments

  • Philip Robinson
  • Michael Beigl
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2802)


The issue we have focused on in the broad area of security for Pervasive Computing is maintaining trust in an interactive environment. Our solution is based on the premise that computers and implicit interaction mechanisms must function in accordance with the explicit parameters of physical human-human interaction. Otherwise, this results in imbalances between the physical and virtual worlds, which leads to ”windows of vulnerability”. Our solution presented requires an infrastructure of pervasive and context sensing technology, to provide entity mapping, policy and trust management services. We also investigate generating cryptographic keys using the context available The underlying technology is based on the Smart-Its context sensing, computation and communications platform.


Virtual World Mobile Agent Ubiquitous Computing Pervasive Computing Interactive Context 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Abowd, G.D., Dey, A.K., Brown, P.J., Davies, N., Smith, M., Steggles, P.: Towards a better understanding of context and context-awareness. In: Gellersen, H.-W. (ed.) (panel statements) Handheld and Ubiquitous Computing, pp. 304–307. Springer, Berlin (1999)CrossRefGoogle Scholar
  2. 2.
    Anderson, R.J.: Security Engineering: A Guide to Building Dependable Distributed Systems, p. 38. Wiley, Chichester (2001)Google Scholar
  3. 3.
    Arbaugh, W.A., Fithen, W.L., McHugh, J.: Windows of Vulnerability: A Case Study Analysis. IEEE Computer, 52-59 (December 2000)Google Scholar
  4. 4.
    Beigl, M., Gellersen, H.W., Schmidt, A.: MediaCups: Experience with Design and Use of Computer Augmented Everyday Artefacts. Computer Networks, Special Issue on Pervasive Computing 35(4), 401–409 (2001)Google Scholar
  5. 5.
    Brown, P., Burleson, W., Lamming, M., Rahlff, O.W., Romano, G., Scholtz, J., Snowdon, D.: Context-awareness: some compelling applications (December 2001), Retrieved from (February 2003),
  6. 6.
    Covington, M.J., Long, W., Srinivasan, S., Dey, D., Ahamad, M., Abowd, A.: Securing Context-Aware Applications Using Environment Roles. In: SACMAT 2001, ACM, New York (copyright 2001)Google Scholar
  7. 7.
    Dourish, P., Bellotti, V.: Awareness and Coordination in Shared Work spaces. In: Proceedings of CSCW 1992, pp. 107-114 (1992)Google Scholar
  8. 8.
    Hendry, M.: Smart Card Security and Applications. Artech House (1997)Google Scholar
  9. 9.
    Holmquist, L.E., Falk, J., Wigstroem, J.: Supporting group collaboration with interpersonal awareness devices. Personal Technologies 3, 13–21 (1999)CrossRefGoogle Scholar
  10. 10.
    Holmquist, L.E., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M., Gellersen, H.: Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, p. 116. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  11. 11.
    HuBaux, J.P., Buttyan, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: Proc. ACM MOBICOM (October 2001)Google Scholar
  12. 12.
    Hupfeld, F., Beigl, M.: Spatially aware local communication in the RAUM system. In: Scholten, H.J., van Sinderen, M. (eds.) IDMS 2000. LNCS, vol. 1905, pp. 285–296. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  13. 13.
    Jendricke, U., Kreutzer, M., Zugenmaier, A.: Pervasive Privacy with Identity Management. In: Workshop on Security in Ubiquitous Compiting, UBICOMP 2002 (September 2002)Google Scholar
  14. 14.
    Jiang, X., Hong, J.I., Landay, J.A.: Socially-Based Modeling of Privacy in Ubiquitous Computing. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 176–193. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  15. 15.
    Kagal, L., Finin, T., Joshi, A.: Trust-Based Security in Pervasive Computing Environments. IEEE Computer (December 2001)Google Scholar
  16. 16.
    Kim, Y., Perrig, A., Tsudik, G.: Communication-efficient group key agreement. In: Proceedings of IFIP SEC (2001)Google Scholar
  17. 17.
    Kindberg, T., Zhang, K.: Context authentication using constrained channels. HP Labs Tech. report HPL-2001-84 (2001)Google Scholar
  18. 18.
    Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security support for mobile ad-hoc networks. In: Proc. IEEE ICNP, pp. 251–260 (2001)Google Scholar
  19. 19.
    Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 237–245. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  20. 20.
    Langheinrich, M., Mattern, F., Romer, K., Vogt, H.: First Steps Towards an Event–Based Infrastructure for Smart Things. In: Ubiquitous Computing Workshop, PACT (2000)Google Scholar
  21. 21.
    Monrose, F., Reiter, M.K., Li, Q., Lopresti, D.P., Shih, C.: Toward Speech-Generated Cryptographic Keys on Resource Constrained Devices. In: Proceedings of 11th USENIX Security Symposium (2002)Google Scholar
  22. 22.
    Noble, B.D., Corner, M.D.: The case for transient authentication. Presented at the 10th ACM SIGOPS European Workshop (September 2002)Google Scholar
  23. 23.
    Norman, D.A.: The Invisible Computer. MIT Press, Cambridge (1999)Google Scholar
  24. 24.
    Orr, R.J., Abowd, G.D.: The Smart Floor: A Mechanism for Natural User Identification and Tracking, Georgia Institute of Technology (2000)Google Scholar
  25. 25.
    Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for web transactions. DIMACS Technical Report, 97(15) (April 1997)Google Scholar
  26. 26.
    Schmidt, A.: Implicit Human-Computer Interaction through Context, Personal Technologies, pp. 191-199 (June 2000)Google Scholar
  27. 27.
    Schmidt, A., Beigl, M.: New Challenges of Ubiquitous Computing and Augmented Reality. In: 5th CaberNet Radicals Workshop, Valadares, NR. Porto, Portugal, July 5-8 (1998)Google Scholar
  28. 28.
    Sloman, M., Lupu, E.: Policy Specification for Programmable Networks. In: Covaci, S. (ed.) IWAN 1999. LNCS, vol. 1653, pp. 73–85. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  29. 29.
    Stadler, M.: Publicly verifiable secret sharing. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 191–199. Springer, Heidelberg (1996)Google Scholar
  30. 30.
    Strasser, M., Rothermel, K.: System Mechanisms for Partial Rollback of Mobile Agent Execution. In: Proceedings of the 20th International Conference on Distributed Computing Systems (ICDCS 2000), pp. 20–28. IEEE Computer Society, Los Alamitos (2000)CrossRefGoogle Scholar
  31. 31.
    Want, R., Fishkin, K.P., Gujar, A., Harrison, B.L.: Bridging Physical and Virtual Worlds with Electronic Tags. In: Proceedings of CHI 1999, ACM Press, New York (1999)Google Scholar
  32. 32.
    Weiser, M.: Some Computer Science Issues for Ubiquitous Computing. In: PARC 1993 (1993)Google Scholar
  33. 33.
    Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network 13, 24–30 (1999)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Philip Robinson
    • 1
  • Michael Beigl
    • 1
  1. 1.Telecooperation Office, Institut für TelematikUniversität Karlsruhe 

Personalised recommendations