Skip to main content

Using RFID-based “Touch” for Intuitive User Interaction with Smart Space Security

  • Chapter
RFID Security

Abstract

Home networks and networked consumer electronic devices are increasingly becoming a part of our everyday lives. One of the challenges in designing smart home technology is making these systems secure and, at the same time, easy-to-use for non-expert consumers. We believe that mobile devices equipped with a “touch” network interface and corresponding middleware are ideal for enabling users to intuitively setup and manage the security of their smart homes. In this chapter, we describe such a middleware for mobile phones based on Near Field Communication (NFC) technology. We propose a mobile middleware architecture called iTouchSec based on a higher level User-Interaction with Security (UI-SEC) middleware, called IntuiSec, and a lower level NFC middleware, called iTouch. We present the overall architecture, as well as the detailed design of the necessary NFC records that are exchanged over RF. Finally, we present our experience with an initial implementation of parts of the proposed middleware using actual NFC hardware and Symbian-based mobile phones.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Chapter 11-References

  1. Universal Plug-and-Play (UPnP) Forum, UPnP Device Architecture 1.0.1, December 2003

    Google Scholar 

  2. Digital Living Network Alliance (DLNA), Digital Living Network Alliance Home Networked Device Interoperability Guidelines Expanded, March 2006

    Google Scholar 

  3. M. Weisner. The computer for the 21st century. Scientific American. 265(3): 94, September 1991

    Article  Google Scholar 

  4. NFC Forum, www.nfc-forum.com

  5. 5. R. Mayrhofer and H. Gellersen. Shake Well Before Use: Authentication Based on Accelerometer Data, Proceedings of Pervasive, 2007

    Google Scholar 

  6. S. Shakhshir and D. Kalofonos. Usable Security in Smart Homes, Proceedings of the Eighth International Wireless Personal Multimedia Communications Symposium (WPMC'05), Aalborg, Denmark, 2005

    Google Scholar 

  7. Z. Antoniou and S. Varadan. iTouch: RFID middleware for boosting connectivity and intuitive user interaction in smart spaces, Nokia Research Center Technical Report (NRC-TR-2006–002), May 2006. http://research.nokia.com/tr/NRC-TR-2006–002.pdf

  8. Z. Antoniou and S. Varadan. Intuitive Mobile User Interaction in Smart Spaces via NFC-Enhanced devices, Proceedings of IEEE ICCGI'07, Guadeloupe, March 2007

    Google Scholar 

  9. D. Kalofonos. IntuiWare Security Functional Specification, Nokia Research Center Technical Report (Internal), April 2004.

    Google Scholar 

  10. S. Shakhshir and D. Kalofonos. IntuiSec: A Framework for Intuitive User Interaction with Smart Home Security, Nokia Research Center Technical Report (NRC-TR-2006–003), April 2006. http://research.nokia.com/tr/NRC-TR-2006–003.pdf

  11. D. Kalofonos and S. Shakhshir, IntuiSec: A Framework for Intuitive User Interaction with Smart Home Security Using Mobile Devices, Proceedings of IEEE PIMRC, September 2007

    Google Scholar 

  12. M. Michalakis, D. Kalofonos, and B. Shafai. An Experimental Hardware Extension Platform for Mobile Devices in Smart Spaces, Proceedings of International Conference on Pervasive Systems and Computing (PSC'06), Las Vegas, NV, 2006

    Google Scholar 

  13. C. Hurley, M. Puchol (Editor), R. Rogers, and F. Thornton. WarDriving: Drive, Detect, Defend, A Guide to Wireless Security, 1st edition, Syngress, Rockland, MA, 2004

    Google Scholar 

  14. P. Dourish, R. Grinter, J. Delgado de la Flor, and M. Joseph. Security in the wild: User strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing. 8(6): 391–401, 2004

    Article  Google Scholar 

  15. H. Nakakita, K. Yamaguchi, M. Hashimoto, T. Saito, and M. Sakurai. A study on secure wireless networks consisting of home appliances. IEEE Transactions on Consumer Electronics. 49(2): 375–381, 2003

    Article  Google Scholar 

  16. C. Ellison. Home network security. Intel Technology Journal. 6(4): 37–48, 2002

    Google Scholar 

  17. Wi-Fi Alliance (WFA), www.wi-fi.org

  18. Z. Antoniou and D. Kalofonos. NFC-based Mobile Middleware for Intuitive User Interaction with Security in Smart Homes, Proceedings of the Fifth IASTED International Conference on Communication Systems and Networks (CSN'06), Palma de Mallorca, Spain, August 2006

    Google Scholar 

  19. Z. Antoniou. A Touch is Worth A Thousand Clicks, Proceedings of IEEE International Conference on Wireless Information Networks and Systems, WINSYS part of ICETE, Portugal, August 2006

    Google Scholar 

  20. Z. Antoniou, G. Krishnamurthi, and F. Reynolds. Intuitive Service Discovery in RFID-Enhanced Networks, Proceedings of IEEE COMSWARE Conference, India, 2006

    Google Scholar 

  21. J. Riekki, T. Salminen, and I. Alakarppa. Requesting pervasive services by touching RFID tags. Pervasive Computing Magazine. 5(1): 40–46, 2006

    Article  Google Scholar 

  22. T. Pering, R. Ballagas, and R. Want. Spontaneous marriages of mobile devices and interactive spaces. Communications of the ACM. 48(9): 53–59, 2005

    Article  Google Scholar 

  23. D. Balfanz, G. Durfee, R. Grinter, D. Smetters, and P. Stewart. Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute, Proceedings of 13th USENIX Security Symposium, San Diego, CA, pp. 207–222, 2004

    Google Scholar 

  24. D. Balfanz, D. Smetters, P. Stewart, and H. Chi Wong. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks, Proceedings of the Network and Distributed Systems Security Symposium (NDSS'02), San Diego, CA, 2002

    Google Scholar 

  25. A. Schmidt, H.-W. Gellersen, M. Beigl, and O. Thade. Developing User Interfaces for Wearable Computers - Don' t Stop to Point and Click, Intelligent Interactive Assistance and Mobile Multimedia Computing (IMC'2000), Rostock-Warnem ünde, Germany, 9–10 November 2000

    Google Scholar 

  26. T. Kindberg, J. Barton, J. Morgan, G. Becker, D. Caswell, P. Debaty, G. Gopal, M. Frid, V. Krishnan, H. Morris, J. Schettino, and B. Serra. People, Places, Things: Web Presence for the Real World, Available at http://cooltown.hp.com/dev/wpapers/index.asp

  27. M. Beigl. Point & Click - Interaction in Smart Environments. In: H.-W. Gellersen, ed., Hand-held and Ubiqutious Computing, Lecture Notes in Computer Science, vol. 1707, ISBN 3–540–66550–1, pp. 311–314, Springer, Berlin, 1999

    Google Scholar 

  28. S. S. Intille, V. Lee, and C. Pinhanez. Ubiquitous Computing in the Living Room: Concept Sketches and an Implementation of a Persistent User Interface, UbiComp, 2003

    Google Scholar 

  29. T. Salminen and J. Riekki. Lightweight Middleware Architecture for Mobile Phones, http://www.mediateam.oulu.fi/publications/pdf/647.pdf

  30. D. L. de Ipina, I. Vazquez, D. Garcia, J. Fernandez, I. Garcia. A Reflective Middleware for Controlling Smart Objects from Mobile Devices, SoC-EUSAI, 2005

    Google Scholar 

  31. M. T. Goodrich, M. Sirivianos, J. Solis, G. Tsudik, E. Uzun. Loud and Clear: Human Verifiable Authentication Based on Audio, Proceedings of ICDCS 2006: 26th Conference on Distributed Computing Systems, IEEE Computer Society, Los Alamitos, CA, p. 10, 2006

    Google Scholar 

  32. J. H. Hoepman. The Emphemeral Pairing Problem, Proceedings of Eighth International Conference on Financial Cryptography, pp. 212–226, Springer, Berlin, 2004

    Google Scholar 

  33. L. M. Feeney, B. Ahlgren, A. Westerlund, and A. Dunkels. Spontnet: Experiences in Configuring and Securing Small Ad Hoc Networks, Fifth International Workshop on Networked Appliances (IWNA5), October 2002

    Google Scholar 

  34. H. Ishii and B. Ullmer. Tangible Bits: Towards Seamless Interfaces Between People, Bits, and Atoms, Proceedings of CHI'97, pp. 234–241

    Google Scholar 

  35. K. Fishkin, A. Gujar, B. Harrison, T. Moran, and R. Want. Embodied User Interfaces for Really Direct Manipulation. Communications of the ACM. 43(9): 75–80, 2000

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Antoniou, Z., Kalofonos, D., Reynolds, F. (2008). Using RFID-based “Touch” for Intuitive User Interaction with Smart Space Security. In: Kitsos, P., Zhang, Y. (eds) RFID Security. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-76481-8_11

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-76481-8_11

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-76480-1

  • Online ISBN: 978-0-387-76481-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics