Abstract
Nowadays the concept of ”pervasive computing” is fully deployed in smart environments to bring more comfort and to allow an easy access to services for users. Due to this fact it is essential to reconsider some security service delivery in smart environments. The authentication service is tightly related to the user and must imperatively take into account his capacities, his preferences and his environment, to be efficient for dependent people. In this paper we propose a new architecture able to provide an intelligent authentication based on modelisation parameters of both the environment and the user profile which are used to build an authentication strategy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Coen, M.: Design principles for intelligent environments. In: Proceedings of the fifteenth National Conference on Artificial Intelligence (AAAAI98), Madison, WI, pp. 547–554 (1998)
Burnside, M., Clarke, D., Mills, T., Maywah, A., Devadas, S., Rivest, R.: Proxy based security protocols in networked mobile device. In: Proceedings of ACM Symposium on Applied Computing (SAC 2002), Madrid, Spain (March 2002)
Matthew, M.C.: Generalized role based access control for securing future applications. In: Proceedings of the 23rd National Information Systems Security Conference, Baltimore, MD (October 2000)
Gill, B., Viswanathan, P., Campbell, R.: Security architecture in GAIA, Technical report, UIUCDCS-R-2001-2215 UILU-ENG-2001-1720, University of Illinois at Urbana, Champaign, IL, USA (2001)
Al-Muhtadi, J.F.: An Intelligent authentication infrastructure for ubiquitous computing environments, PhD thesis, University of Illinois, Urbana-Champaign, IL, USA (2005)
Hedberg, S.R.: After desktop computing: a progress report on smart environments research. IEEE Intelligent Systems and Their Applications Magazine 15(5), 7–9 (September-October 2000)
Mhamed, A., Mokhtari, M.: Providing a new Authentication Tool for Dependant people in Pervasive Environments. In: Proc. of the IEEE International Conference on Information & Communication Technologies (ICTTA04), Damascus, Syria (April 2006)
Specht, M., Burkhardt, J.M., De La GarzaC.: De lactivit des ans confronts aux nouvelles technologies, Retraite et Socit, Technologie et Vieillissement, vol. 26/2, pp. 21–38
Neuman, B.C., Theodore, T.: Kerberos: An authentication Service for Computer Networks. IEEE Communications Magazine 32(9), 33–38 (September 1994)
Sirbu, M.A., Chung-I Chuang, J.: Distributed Authentication in Kerberos Using Public Key Cryptography, Internet Society 1997, Symposium on Network and Distributed System Security (February 1997)
Feki, M.A., Mokhtari, M.: Context awareness for pervasive assistive environment, in IDEA publisher (ed.) Ismail Khalil Ibrahim, Handbook of Research on Mobile Multimedia. Idea Group Publisher (May 22, 2006) ISBN: 1-59140
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Abdallah, M., Fred, C., Farah, A. (2007). An Authentication Architecture Dedicated to Dependent People in Smart Environments. In: Okadome, T., Yamazaki, T., Makhtari, M. (eds) Pervasive Computing for Quality of Life Enhancement. ICOST 2007. Lecture Notes in Computer Science, vol 4541. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73035-4_10
Download citation
DOI: https://doi.org/10.1007/978-3-540-73035-4_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73034-7
Online ISBN: 978-3-540-73035-4
eBook Packages: Computer ScienceComputer Science (R0)