Abstract
In ubiquitous computing environments, the computer technology will recede into the background of our lives for its ultimate goal, invisibility. For ensuring security and privacy in those environments, both human beings and surrounding devices should be authenticated under the interaction methods that are used for ubiquitous services. However, the invisibility of devices, the adaptiveness of interactions, and the varying performance of devices will make it difficult to achieve it. In this paper, we reconsider authentication for ubiquitous computing environments and propose a conceptual framework for resolving the difficulties.
This research was supported by the MIC (Ministry of Information and Communication), Korea, under the ITRC (Information Technology Research Center) support program supervised by the IITA (Institute of Information Technology Advancement) (IITA-2006-C1090-0603-0028).
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Beresford, A., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing, pp. 46–55, (January-March 2003)
Bign, J., Duc, B., Smeraldi, F., Fischer, S., Makarov, A.: Multi-modal person authentication. In: Proc. of Face Recognition: From Theory to Applications (NATO-ASI Workshop) (1997)
Buennemeyer, T.K., Marchany, R.C., Tront, J.G.: Ubiquitous Security: Privacy versus Protection. In: Proc. of the 2006 International Conf. on Pervasive Systems and Computing, pp. 71–77, (June 2006)
Bussard, L., Roudier, Y.: Authentication in Ubiquitous Computing (Extended Abstract), http://citeseer.ist.psu.edu/547343.html
IEEE P1363-2, Standard specifications for password-based public key cryptographic techniques (December 2002), available from http://grouper.ieee.org/groups/1363/
Juels, A., Rivest, R., Szyldo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: Proc. of ACM Conference on Computer and Communications Security, pp. 103–111 (2003)
Kagal, L., Finin, T., Joshi, A.: Moving from Security to Distributed Trust in Ubiquitous Computing Environments. IEEE Computer (December 2001)
Koreman, J., Morris, A.C., Jassim, S., Sellahewa, H., Chollet, G., Aversano, G., Salicetti, S., Allano, L.: Multi-modal biometric authentication on the SecurePhone PDA. In: Proc. of MMUA workshop on Mult-Modal User Authentication, (May 2006)
Lim, C., Kwon, T.: Strong and robust RFID authentication enabling perfect ownership transfer, Information and Communications Security. In: Gorrieri, R., Wehrheim, H. (eds.) FMOODS 2006. LNCS, vol. 4037, pp. 1–20. Springer, Heidelberg (2006)
Matsumoto, M., Takagi, Y.: Mutual Authentication Method for Ubiquitous Service Environments. In: Proc. of IEEE Global Telecommunications Conf (GLOBECOM 2003), vol. 3, pp. 1389–1393 (December 2003)
Priyantha, N., Chakraborty, A., Balakrishnan, H.: The Cricket location-support system. Mobile Computing and Networking, pp. 32–43 (2000)
Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ubiquitous Computing. IEEE Computer 35(4) Part Supplementary, 22–26 (2002)
Thian, N., Bengio, S.: Why Do Multi-Stream, Multi-Band and Multi-Modal Approaches Work on Biometric User Authentication Tasks? IDIAP research report. In: Proceeding of 2004 Internation Conf. on Acoustics, Speech, and Signal Processing (ICASSP 2004), vol. 5, pp. 893–896, (May 2004)
Weiser, M.: Some Computer Science Issues in Ubiquitous Computing. ACM SIGMOBILE Mobile Computing and Communications Review 3(3), 12–21 (July 1999)
Crossbow technology, Inc. http://www.xbow.com
ZigBee Specification Ver. 1.0 (2005), http://www.zigbee.org
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kwon, T., Park, Sh., Shin, S. (2007). Multi-modal Authentication for Ubiquitous Computing Environments. In: Stephanidis, C. (eds) Universal Access in Human-Computer Interaction. Ambient Interaction. UAHCI 2007. Lecture Notes in Computer Science, vol 4555. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73281-5_12
Download citation
DOI: https://doi.org/10.1007/978-3-540-73281-5_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73280-8
Online ISBN: 978-3-540-73281-5
eBook Packages: Computer ScienceComputer Science (R0)