Skip to main content

Message Quality for Ambient System Security

  • Conference paper
Ad-hoc, Mobile and Wireless Networks (ADHOC-NOW 2008)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 5198))

Included in the following conference series:

Abstract

In ambient systems, a principal may be a physical object whose identity does not convey useful information for taking security decisions. Thus, establishing a trusted channel with a device depends more on the device being able to demonstrate what is does, rather than who it is. This paper proposes a security model that allows a principal to establish the intent of an adversary and to make the adversary prove its trustworthiness by furnishing proof of current and past behavior.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bryce, C.: Message quality for ambient system security. Technical Report P11896, IRISA (2008)

    Google Scholar 

  2. Bryce, C., Razafimahefa, C., Pawlak, M.: Lana: An approach to programming autonomous systems. In: Magnusson, B. (ed.) ECOOP 2002. LNCS, vol. 2374, pp. 281–298. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  3. Couderc, P., BanĂ¢tre, M.: Ambient computing applications: an experience with the SPREAD approach. In: HICSS, p. 291 (2003)

    Google Scholar 

  4. FBI/CSI. 12th annual csi/fbi computer crime and security survey (2007)

    Google Scholar 

  5. Gelernter, D.: Generative communication in Linda. ACM Transactions on Programming Languages and Systems 7(1), 80–112 (1985)

    Article  MATH  Google Scholar 

  6. Gosling, J., Joy, B., Steele, G., Bracha, G.: The Java Language Specification, 3rd edn. The Java Series. Addison-Wesley, Boston (2005)

    Google Scholar 

  7. Konstantas, D., Jones, V., Herzog, R.: Mobihealth - innovative 2.5/3G mobile services and applications for health care. In: IST Mobile & wireless telecommunications Summit 2002, Thessaloniki, Greece, June 17-19 (2002)

    Google Scholar 

  8. Mckitterick, D., Dowling, J.: State of the art review of mobile payment technology. Technical report, June 13 (2003)

    Google Scholar 

  9. MetaGroup. Spam, viruses, and content compliance: An opportunity to strategically respond to immediate tactical concerns. Technical Report 800-945-META [6382], International Computer Science Institute (January 2005)

    Google Scholar 

  10. Necula, G.C.: Proof-carrying code. In: POPL, pp. 106–119 (1997)

    Google Scholar 

  11. Pellegrino, P., Bonino, D., Corno, F.: Domotic house gateway. In: Haddad, H. (ed.) SAC, pp. 1915–1920. ACM Press, New York (2006)

    Google Scholar 

  12. Picco, G.P., Murphy, A.L., Roman, G.-C.: LIME: Linda meets mobility. In: Proceedings of the  21st  International Conference on Software Engineering, May 1999, pp. 368–377. ACM Press, New York (1999)

    Google Scholar 

  13. Poritz, J., Schunter, M., Van Herreweghen, E., Waidner, M.: Property attestation—scalable and privacy-friendly security assessment of peer computers. Technical Report RZ 3548, IBM Research (May 2004)

    Google Scholar 

  14. Rivest, R., Shamir, A., Adleman, L.: On digital signatures and public key cryptosystems. Comm. A.C.M. 21, 120–126 (1978)

    MATH  MathSciNet  Google Scholar 

  15. Sekar, R., Venkatakrishnan, V.N., Basu, S., Bhatkar, S., DuVarney, D.C.: Model-carrying code: a practical approach for safe execution of untrusted applications. In: SOSP, pp. 15–28 (2003)

    Google Scholar 

  16. Shmatikov, V., Talcott, C.L.: Reputation-based trust management. Journal of Computer Security 13(1), 167–190 (2005)

    Google Scholar 

  17. Trusted Computing Group. TPM main specification. Main Specification Version 1.2 rev. 85, Trusted Computing Group (February 2005)

    Google Scholar 

  18. Zannone, N.: A survey on trust management languages [reduced]. Technical report, August 01(2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bryce, C. (2008). Message Quality for Ambient System Security. In: Coudert, D., Simplot-Ryl, D., Stojmenovic, I. (eds) Ad-hoc, Mobile and Wireless Networks. ADHOC-NOW 2008. Lecture Notes in Computer Science, vol 5198. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85209-4_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-85209-4_35

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-85208-7

  • Online ISBN: 978-3-540-85209-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics