Skip to main content
Erschienen in: Soft Computing 9/2014

01.09.2014 | Focus

A soft computing based location-aware access control for smart buildings

verfasst von: José L. Hernández, M. Victoria Moreno, Antonio J. Jara, Antonio F. Skarmeta

Erschienen in: Soft Computing | Ausgabe 9/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The evolution of wireless communications and pervasive computing is transforming current physical spaces into real smart environments. These emerging scenarios are expected to be composed by a potentially huge amount of heterogeneous smart objects which can be remotely accessed by users via their mobile devices anytime, anywhere. In this paper, we propose a distributed location-aware access control mechanism and its application in the smart building context. Our approach is based on an access control engine embedded into smart objects, which are responsible to make authorization decisions by considering both user location data and access credentials. User location data are estimated using a novel indoor localization system based on magnetic field data sent by user through her personal phone. This localization system implements a combination of soft computing techniques over the data collected by smartphones. Therefore, our location-aware access control mechanism does not require any intermediate entity, providing the benefits of a decentralized approach for smart environments. From the results obtained, we can consider our proposal as a promising approach to tackle the challenging security requirements of typical pervasive environments.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Altun K, Barshan B (2010) Human activity recognition using inertial/magnetic sensor units. In: Human behavior understanding, pp 38–51. Springer, Berlin Altun K, Barshan B (2010) Human activity recognition using inertial/magnetic sensor units. In: Human behavior understanding, pp 38–51. Springer, Berlin
Zurück zum Zitat Andreu J, Angelov P (2010) Real-time human activity recognition from wireless sensors using evolving fuzzy systems. In: 2010 IEEE international conference on fuzzy systems (FUZZ). IEEE, New York, pp 1–8 Andreu J, Angelov P (2010) Real-time human activity recognition from wireless sensors using evolving fuzzy systems. In: 2010 IEEE international conference on fuzzy systems (FUZZ). IEEE, New York, pp 1–8
Zurück zum Zitat Angermann M, Frassl M, Doniec M, Julian BJ, Robertson P (2012) Characterization of the indoor magnetic field for applications in localization and mapping. In: 2012 International conference on indoor positioning and indoor navigation (IPIN). IEEE, New York, pp 1–9 Angermann M, Frassl M, Doniec M, Julian BJ, Robertson P (2012) Characterization of the indoor magnetic field for applications in localization and mapping. In: 2012 International conference on indoor positioning and indoor navigation (IPIN). IEEE, New York, pp 1–9
Zurück zum Zitat Ardagna CA, Cremonini M, Damiani E, di Vimercati SDC, Samarati P (2006) Supporting location-based conditions in access control policies. In: Proceedings of the 2006 ACM symposium on information, computer and communications security. ACM, New York, pp 212–222 Ardagna CA, Cremonini M, Damiani E, di Vimercati SDC, Samarati P (2006) Supporting location-based conditions in access control policies. In: Proceedings of the 2006 ACM symposium on information, computer and communications security. ACM, New York, pp 212–222
Zurück zum Zitat Atallah L, Lo B, King R, Yang GZ (2010) Sensor placement for activity detection using wearable accelerometers. In: 2010 International conference on body sensor networks (BSN). IEEE, New York, pp 24–29 Atallah L, Lo B, King R, Yang GZ (2010) Sensor placement for activity detection using wearable accelerometers. In: 2010 International conference on body sensor networks (BSN). IEEE, New York, pp 24–29
Zurück zum Zitat Atallah L, Lo B, King R, Yang GZ (2011) Sensor positioning for activity recognition using wearable accelerometers. IEEE Trans Biomed Circuits Syst 5(4):320–329CrossRef Atallah L, Lo B, King R, Yang GZ (2011) Sensor positioning for activity recognition using wearable accelerometers. IEEE Trans Biomed Circuits Syst 5(4):320–329CrossRef
Zurück zum Zitat Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805CrossRefMATH Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805CrossRefMATH
Zurück zum Zitat Bao L, Intille SS (2004) Activity recognition from user-annotated acceleration data. In: Pervasive computing. Springer, Berlin, pp 1–17 Bao L, Intille SS (2004) Activity recognition from user-annotated acceleration data. In: Pervasive computing. Springer, Berlin, pp 1–17
Zurück zum Zitat Boles LC, Lohmann KJ (2003) True navigation and magnetic maps in spiny lobsters. Nature 421(6918):60–63CrossRef Boles LC, Lohmann KJ (2003) True navigation and magnetic maps in spiny lobsters. Nature 421(6918):60–63CrossRef
Zurück zum Zitat Covington MJ, Long W, Srinivasan S, Dev AK, Ahamad M, Abowd GD (2001) Securing context-aware applications using environment roles. In: Proceedings of the sixth ACM symposium on access control models and technologies. ACM, New York, pp 10–20 Covington MJ, Long W, Srinivasan S, Dev AK, Ahamad M, Abowd GD (2001) Securing context-aware applications using environment roles. In: Proceedings of the sixth ACM symposium on access control models and technologies. ACM, New York, pp 10–20
Zurück zum Zitat Denning DE, MacDoran PF (1996) Location-based authentication: grounding cyberspace for better security. Comput Fraud Secur 1996(2):12–16CrossRef Denning DE, MacDoran PF (1996) Location-based authentication: grounding cyberspace for better security. Comput Fraud Secur 1996(2):12–16CrossRef
Zurück zum Zitat Ebinger P, Ramos JLH, Kikiras P, Lischka M, Wiesmaier A (2013) Privacy in smart metering ecosystems. In: Smart grid security. Springer, Berlin, pp 120–131 Ebinger P, Ramos JLH, Kikiras P, Lischka M, Wiesmaier A (2013) Privacy in smart metering ecosystems. In: Smart grid security. Springer, Berlin, pp 120–131
Zurück zum Zitat Ferraiolo D, Cugini J, Kuhn R (1995) Role-based access control (RBAC): features and motivations. In: Proceedings of 11th annual computer security application conference, pp 241–48 Ferraiolo D, Cugini J, Kuhn R (1995) Role-based access control (RBAC): features and motivations. In: Proceedings of 11th annual computer security application conference, pp 241–48
Zurück zum Zitat Friedman J, Hastie T, Tibshirani R (2000) Additive logistic regression: a statistical view of boosting (with discussion and a rejoinder by the authors). Ann Stat 28(2):337–407CrossRefMATHMathSciNet Friedman J, Hastie T, Tibshirani R (2000) Additive logistic regression: a statistical view of boosting (with discussion and a rejoinder by the authors). Ann Stat 28(2):337–407CrossRefMATHMathSciNet
Zurück zum Zitat Gao C, Yu Z, Wei Y, Russell S, Guan Y (2009) A statistical indoor localization method for supporting location-based access control. Mob Netw Appl 14(2):253–263CrossRef Gao C, Yu Z, Wei Y, Russell S, Guan Y (2009) A statistical indoor localization method for supporting location-based access control. Mob Netw Appl 14(2):253–263CrossRef
Zurück zum Zitat Garcia-Valverde T, Garcia-Sola A, Hagras H, Dooley JA, Callaghan V, Botia JA (2013) A fuzzy logic-based system for indoor localization using WiFi in ambient intelligent environments. IEEE Trans Fuzzy Syst 21(4):702–718 Garcia-Valverde T, Garcia-Sola A, Hagras H, Dooley JA, Callaghan V, Botia JA (2013) A fuzzy logic-based system for indoor localization using WiFi in ambient intelligent environments. IEEE Trans Fuzzy Syst 21(4):702–718
Zurück zum Zitat Gozick B, Subbu KP, Dantu R, Maeshiro T (2011) Magnetic maps for indoor navigation. IEEE Trans Instrum Meas 60(12):3883–3891CrossRef Gozick B, Subbu KP, Dantu R, Maeshiro T (2011) Magnetic maps for indoor navigation. IEEE Trans Instrum Meas 60(12):3883–3891CrossRef
Zurück zum Zitat Gupta SK, Mukheriee T, Venkatasubramanian K, Taylor T (2006) Proximity based access control in smart-emergency departments. In: Fourth annual IEEE international conference on pervasive computing and communications workshops, 2006. PerCom Workshops 2006. IEEE, New York Gupta SK, Mukheriee T, Venkatasubramanian K, Taylor T (2006) Proximity based access control in smart-emergency departments. In: Fourth annual IEEE international conference on pervasive computing and communications workshops, 2006. PerCom Workshops 2006. IEEE, New York
Zurück zum Zitat Győrbíró N, Fábián Á, Hományi G (2009) An activity recognition system for mobile phones. Mob Netw Appl 14(1):82–91CrossRef Győrbíró N, Fábián Á, Hományi G (2009) An activity recognition system for mobile phones. Mob Netw Appl 14(1):82–91CrossRef
Zurück zum Zitat Haverinen J, Kemppainen A (2009) Global indoor self-localization based on the ambient magnetic field. Robot Auton Syst 57(10):1028–1035CrossRef Haverinen J, Kemppainen A (2009) Global indoor self-localization based on the ambient magnetic field. Robot Auton Syst 57(10):1028–1035CrossRef
Zurück zum Zitat Hernández-Ramos J et al (2013) Distributed capability-based access control for the internet of things. J Internet Serv Inf Secur 3(3/4): 1–16 Hernández-Ramos J et al (2013) Distributed capability-based access control for the internet of things. J Internet Serv Inf Secur 3(3/4): 1–16
Zurück zum Zitat Kanungo T, Mount DM, Netanyahu NS, Piatko CD, Silverman R, Wu AY (2002) An efficient k-means clustering algorithm: Analysis and implementation. IEEE Trans Pattern Anal Mach Intell 24(7):881–892CrossRef Kanungo T, Mount DM, Netanyahu NS, Piatko CD, Silverman R, Wu AY (2002) An efficient k-means clustering algorithm: Analysis and implementation. IEEE Trans Pattern Anal Mach Intell 24(7):881–892CrossRef
Zurück zum Zitat Katzakis N, Hori M (2009) Mobile phones as 3-dof controllers: a comparative study. In: DASC’09. Eighth IEEE international conference on dependable, autonomic and secure computing, 2009. IEEE, New York, pp 345–349 Katzakis N, Hori M (2009) Mobile phones as 3-dof controllers: a comparative study. In: DASC’09. Eighth IEEE international conference on dependable, autonomic and secure computing, 2009. IEEE, New York, pp 345–349
Zurück zum Zitat Kim JE, Boulos G, Yackovich J, Barth T, Beckel C, Mosse D (2012) Seamless integration of heterogeneous devices and access control in smart homes. In: 2012 8th International conference on intelligent environments (IE). IEEE, New York, pp 206–213 Kim JE, Boulos G, Yackovich J, Barth T, Beckel C, Mosse D (2012) Seamless integration of heterogeneous devices and access control in smart homes. In: 2012 8th International conference on intelligent environments (IE). IEEE, New York, pp 206–213
Zurück zum Zitat Kunze K, Lukowicz P, Junker H, Tröster G (2005) Where am I: Recognizing on-body positions of wearable sensors. In: Location-and context-awareness, pp 264–275 Springer, Berlin Kunze K, Lukowicz P, Junker H, Tröster G (2005) Where am I: Recognizing on-body positions of wearable sensors. In: Location-and context-awareness, pp 264–275 Springer, Berlin
Zurück zum Zitat Lane ND, Miluzzo E, Lu H, Peebles D, Choudhury T, Campbell AT (2010) A survey of mobile phone sensing. IEEE Commun Mag 48(9):140–150CrossRef Lane ND, Miluzzo E, Lu H, Peebles D, Choudhury T, Campbell AT (2010) A survey of mobile phone sensing. IEEE Commun Mag 48(9):140–150CrossRef
Zurück zum Zitat Li B, Gallagher T, Dempster AG, Rizos C (2012) How feasible is the use of magnetic field alone for indoor positioning? In: 2012 International conference on indoor positioning and indoor navigation (IPIN). IEEE, New York, pp 1–9 Li B, Gallagher T, Dempster AG, Rizos C (2012) How feasible is the use of magnetic field alone for indoor positioning? In: 2012 International conference on indoor positioning and indoor navigation (IPIN). IEEE, New York, pp 1–9
Zurück zum Zitat Luna F, Estébanez C, León C, Chaves-González JM, Nebro AJ, Aler R, Segura C, Vega-Rodríguez MA, Alba E, Valls JM et al (2011) Optimization algorithms for large-scale real-world instances of the frequency assignment problem. Soft Comput 15(5):975–990 Luna F, Estébanez C, León C, Chaves-González JM, Nebro AJ, Aler R, Segura C, Vega-Rodríguez MA, Alba E, Valls JM et al (2011) Optimization algorithms for large-scale real-world instances of the frequency assignment problem. Soft Comput 15(5):975–990
Zurück zum Zitat Luoh L (2014) ZigBee-based intelligent indoor positioning system soft computing. Soft Comput 18:443–456 Luoh L (2014) ZigBee-based intelligent indoor positioning system soft computing. Soft Comput 18:443–456
Zurück zum Zitat McGregor A, Hall M, Lorier P, Brunskill J (2004) Flow clustering using machine learning techniques. In: Passive and active network measurement. Springer, Berlin, pp 205–214 McGregor A, Hall M, Lorier P, Brunskill J (2004) Flow clustering using machine learning techniques. In: Passive and active network measurement. Springer, Berlin, pp 205–214
Zurück zum Zitat Melville P, Mooney RJ (2005) Creating diversity in ensembles using artificial data. Inf Fusion 6(1):99–111CrossRef Melville P, Mooney RJ (2005) Creating diversity in ensembles using artificial data. Inf Fusion 6(1):99–111CrossRef
Zurück zum Zitat Misra P, Enge P (1999) Special issue on global positioning system. Proc IEEE 87(1):3–15CrossRef Misra P, Enge P (1999) Special issue on global positioning system. Proc IEEE 87(1):3–15CrossRef
Zurück zum Zitat Moses T et al (2005) Extensible access control markup language (XACML) version 2.0. Oasis Standard 200502 Moses T et al (2005) Extensible access control markup language (XACML) version 2.0. Oasis Standard 200502
Zurück zum Zitat Mulligan G (2007) The 6lowpan architecture. In: Proceedings of the 4th workshop on embedded networked sensors. ACM, New York, pp 78–82 Mulligan G (2007) The 6lowpan architecture. In: Proceedings of the 4th workshop on embedded networked sensors. ACM, New York, pp 78–82
Zurück zum Zitat Ni L, Liu Y, Lau Y, Patil A (2004) LANDMARC: indoor location sensing using active RFID. Wirel Netw 10(6):701–710CrossRef Ni L, Liu Y, Lau Y, Patil A (2004) LANDMARC: indoor location sensing using active RFID. Wirel Netw 10(6):701–710CrossRef
Zurück zum Zitat Ofstad A, Nicholas E, Szcodronski R, Choudhury RR (2008) AAMPL: accelerometer augmented mobile phone localization. In: Proceedings of the first ACM international workshop on mobile entity localization and tracking in GPS-less environments. ACM, New York, pp 13–18 Ofstad A, Nicholas E, Szcodronski R, Choudhury RR (2008) AAMPL: accelerometer augmented mobile phone localization. In: Proceedings of the first ACM international workshop on mobile entity localization and tracking in GPS-less environments. ACM, New York, pp 13–18
Zurück zum Zitat Oliveira LM, Rodrigues JJ, Sousa AF, Lloret J (2013a) Denial of service mitigation approach for IPv6-enabled smart object networks. Concurr Comput Pract Exp 25(1):129–142 Oliveira LM, Rodrigues JJ, Sousa AF, Lloret J (2013a) Denial of service mitigation approach for IPv6-enabled smart object networks. Concurr Comput Pract Exp 25(1):129–142
Zurück zum Zitat Oliveira LM, Rodrigues JJ, de Sousa AF, Lloret J (2013b) A network access control framework for 6LoWPAN networks. Sensors 13(1):1210–1230 Oliveira LM, Rodrigues JJ, de Sousa AF, Lloret J (2013b) A network access control framework for 6LoWPAN networks. Sensors 13(1):1210–1230
Zurück zum Zitat Ravi N, Dandekar N, Mysore P, Littman ML (2005) Activity recognition from accelerometer data. AAAI, Pittsburgh, pp 1541–1546 Ravi N, Dandekar N, Mysore P, Littman ML (2005) Activity recognition from accelerometer data. AAAI, Pittsburgh, pp 1541–1546
Zurück zum Zitat Rodriguez MD, Favela J, Martínez EA, Muñoz MA (2004) Location-aware access to hospital information and services. IEEE Trans Inf Technol Biomed 8(4):448–455CrossRef Rodriguez MD, Favela J, Martínez EA, Muñoz MA (2004) Location-aware access to hospital information and services. IEEE Trans Inf Technol Biomed 8(4):448–455CrossRef
Zurück zum Zitat Shi Y, Shi Y, Liu J (2011) A rotation based method for detecting on-body positions of mobile devices. In: Proceedings of the 13th international conference on ubiquitous computing. ACM, New York, pp 559–560 Shi Y, Shi Y, Liu J (2011) A rotation based method for detecting on-body positions of mobile devices. In: Proceedings of the 13th international conference on ubiquitous computing. ACM, New York, pp 559–560
Zurück zum Zitat Simon H (1999) Neural networks: a comprehensive foundation. Prentice Hall, Upper Saddle RiverMATH Simon H (1999) Neural networks: a comprehensive foundation. Prentice Hall, Upper Saddle RiverMATH
Zurück zum Zitat Sun M, Hill J (1993) A method for measuring mechanical work and work efficiency during human activities. J Biomech 26(3):229–241CrossRef Sun M, Hill J (1993) A method for measuring mechanical work and work efficiency during human activities. J Biomech 26(3):229–241CrossRef
Zurück zum Zitat Wang Y, Zhao J, Fukushima T (2009) Lock: a highly accurate, easy-to-use location-based access control system. In: Location and context awareness. Springer, Berlin, pp 254–270 Wang Y, Zhao J, Fukushima T (2009) Lock: a highly accurate, easy-to-use location-based access control system. In: Location and context awareness. Springer, Berlin, pp 254–270
Zurück zum Zitat Weiser M (1991) The computer for the 21st century. Sci Am 265(3):94–104CrossRef Weiser M (1991) The computer for the 21st century. Sci Am 265(3):94–104CrossRef
Zurück zum Zitat Xin-fang Z, Ming-wei F, Jun-jun W (2011) An indoor location-based access control system by RFID. In: 2011 IEEE international conference on cyber technology in automation, control, and intelligent systems (CYBER). IEEE, New York, pp 43–47 Xin-fang Z, Ming-wei F, Jun-jun W (2011) An indoor location-based access control system by RFID. In: 2011 IEEE international conference on cyber technology in automation, control, and intelligent systems (CYBER). IEEE, New York, pp 43–47
Zurück zum Zitat Yang J (2009) Toward physical activity diary: motion recognition using simple acceleration features with mobile phones. In: Proceedings of the 1st international workshop on interactive multimedia for consumer electronics. ACM, New York, pp 1–10 Yang J (2009) Toward physical activity diary: motion recognition using simple acceleration features with mobile phones. In: Proceedings of the 1st international workshop on interactive multimedia for consumer electronics. ACM, New York, pp 1–10
Zurück zum Zitat Yuan E, Tong J (2005) Attributed based access control (ABAC) for web services. In: Proceedings of the 12th IEEE international conference on web services (ICWS), Orlando, USA. IEEE, New York Yuan E, Tong J (2005) Attributed based access control (ABAC) for web services. In: Proceedings of the 12th IEEE international conference on web services (ICWS), Orlando, USA. IEEE, New York
Zurück zum Zitat Zadeh LA (1997) What is soft computing? Soft Comput 1(1):1–1s Zadeh LA (1997) What is soft computing? Soft Comput 1(1):1–1s
Metadaten
Titel
A soft computing based location-aware access control for smart buildings
verfasst von
José L. Hernández
M. Victoria Moreno
Antonio J. Jara
Antonio F. Skarmeta
Publikationsdatum
01.09.2014
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 9/2014
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-014-1278-9

Weitere Artikel der Ausgabe 9/2014

Soft Computing 9/2014 Zur Ausgabe