TY - GEN
T1 - Trust based security auto-configuration for smart assisted living environments
AU - Hoque, Md Endadul
AU - Rahman, Farzana
AU - Ahamed, Sheikh Iqbal
AU - Liu, Lin
PY - 2009
Y1 - 2009
N2 - Recent progresses in wireless sensor networking and pervasive computing have created huge opportunities for providing elderly people with technological facilities. For elderly people, conceiving technologies for increasing their autonomy, so as to enable them to self-manage their life is of utmost importance. However, when it comes to smart home, once all appliances in a home are automated and connected through internet, it becomes essential to consider issues of security, especially security configuration. In the smart home, security has to be configured and managed by technology-unaware elderly people. One mechanism of auto security configuration in such environment can be achieved by observing the trustworthiness of smart devices. Trust-based security mechanisms allow access rights to evolve among previously unknown devices, thus minimizing security configuration. In this paper, we present a security configuration model which takes critical security decisions by determining the trustworthiness of an entity based on the sources of trust: Direct interaction and Recommendation trust.
AB - Recent progresses in wireless sensor networking and pervasive computing have created huge opportunities for providing elderly people with technological facilities. For elderly people, conceiving technologies for increasing their autonomy, so as to enable them to self-manage their life is of utmost importance. However, when it comes to smart home, once all appliances in a home are automated and connected through internet, it becomes essential to consider issues of security, especially security configuration. In the smart home, security has to be configured and managed by technology-unaware elderly people. One mechanism of auto security configuration in such environment can be achieved by observing the trustworthiness of smart devices. Trust-based security mechanisms allow access rights to evolve among previously unknown devices, thus minimizing security configuration. In this paper, we present a security configuration model which takes critical security decisions by determining the trustworthiness of an entity based on the sources of trust: Direct interaction and Recommendation trust.
KW - Assisted living
KW - Security configuration
KW - Smart home
KW - Trust
UR - http://www.scopus.com/inward/record.url?scp=74049164075&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=74049164075&partnerID=8YFLogxK
U2 - 10.1145/1655062.1655065
DO - 10.1145/1655062.1655065
M3 - Conference contribution
AN - SCOPUS:74049164075
SN - 9781605587783
T3 - Proceedings of the ACM Conference on Computer and Communications Security
SP - 7
EP - 11
BT - Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig '09, Co-located with the 16th ACM Computer and Communications Security Conference, CCS'09
T2 - 2nd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig '09, Co-located with the 16th ACM Computer and Communications Security Conference, CCS'09
Y2 - 9 November 2009 through 13 November 2009
ER -