skip to main content
10.1145/1397705.1397710acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article

Practical security for rural internet kiosks

Published:18 August 2008Publication History

ABSTRACT

Rural Internet kiosks typically provide weak security guarantees and therefore cannot support secure web access or transaction-oriented applications such as banking and bill payment. We present a practical, unobtrusive and easy-to-use security architecture for rural Internet kiosks that uses a combination of physical and cryptographic mechanisms to protect user data and kiosk infrastructure. Our contributions include (a) a detailed threat analysis of rural Internet kiosks, b) a security architecture for rural Internet kiosks that does not require any specialized hardware features in kiosks, and (c) an application-independent and backward-compatible security API for securely sending and receiving data between kiosks and the Internet that can operate over disconnection-tolerant links.

References

  1. N. Asokan, K. Kostianinen, P. Ginzboorg, J. Ott, and C. Luo. Towards Securing Disruption-Tolerant Networking. Technical Report NRC-TR-2007-007, Nokia Research Center, March 2007.Google ScholarGoogle Scholar
  2. D. Clarke, B. Gassend, T. Kotwal, M. Burnside, M. van Dijk, S. Devadas, and R. Rivest. The Untrusted Computer Problem and Camera-Based Authentication. In Proc. of Int'l Conference on Pervasive Computing (Pervasive 2002), pages 114--124, August 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S. Farrell, S. Symington, H. Weiss, and P. Lovell. Delay-Tolerant Networking Security Overview - draft-irtf-dtnrg-sec-overview-03. Internet Draft, July 2007.Google ScholarGoogle Scholar
  4. S. Garriss, R. Cáceres, S. Berger, R. Sailer, L. van Doorn, and Z. Zhang. Towards Trustworthy Kiosk Computing. In Proc. of 8th IEEE Workshop on Mobile Computing Systems and Applications (HotMobile'07), pages 41--45, February 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S. Guo, M. H. Falaki, E. A. Oliver, S. Ur Rahman, A. Seth, M. A. Zaharia, U. Ismail, and S. Keshav. Design and Implementation of the KioskNet System. In Proc. of IEEE/ACM International Conference on Information and Communication Technologies and Development (ICTD2007), December 2007.Google ScholarGoogle ScholarCross RefCross Ref
  6. P. Gutmann. Plug-and-Play PKI: A PKI your Mother can Use. In Proc. of 12th USENIX Security Symposium, pages 45--58, August 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. A. Kate, G. Zaverucha, and U. Hengartner. Anonymity and Security in Delay Tolerant Networks. In Proc. of 3rd Int'l Conference on Security and Privacy in Communication Networks (SecureComm 2007), September 2007.Google ScholarGoogle ScholarCross RefCross Ref
  8. A. Oprea, D. Balfanz, G. Durfee, and D. K. Smetters. Securing a Remote Terminal Application with a Mobile Trusted Device. In Proc. of 20th Annual Computer Security Applications Conference (ACSAC 2004), pages 438--447, December 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. Seth and S. Keshav. Practical Security for Disconnected Nodes. In Proc. of 1st Workshop on Secure Network Protocols (NPSec 2005), pages 31--36, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A. Seth, D. Kroeker, M. Zaharia, S. Guo, and S. Keshav. Low-cost Communication for Rural Internet Kiosks Using Mechanical Backhaul. In Proc. of 12th Int'l Conference on Mobile Computing and Networking (MOBICOM 2006), pages 334--345, September 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. R. Sharp, J. Scott, and A. R. Beresford. Secure Mobile Computing via Public Terminals. In Proc. of 4th Int'l Conference on Pervasive Computing (Pervasive 2006), pages 238--253, May 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. A. Surie, A. Perrig, M. Satyanarayanan, and D. J. Farber. Rapid Trust Establishment for Pervasive Personal Computing. IEEE Pervasive Computing, 6(4):24--30, October-December 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Telecentre.org. http://www.telecentre.org. Accessed May 2008.Google ScholarGoogle Scholar
  14. Tetherless Computing Group. http://blizzard.cs.uwaterloo.ca/tetherless. Accessed May 2008.Google ScholarGoogle Scholar
  15. Trusted Computing Group. https://www.trustedcomputinggroup.org. Accessed May 2008.Google ScholarGoogle Scholar
  16. S. Ur Rahman, U. Hengartner, U. Ismail, and S. Keshav. Securing KioskNet: A Systems Approach. Technical Report CS-2007-43, David R. Cheriton School of Computer Science, University of Waterloo, November 2007.Google ScholarGoogle Scholar

Index Terms

  1. Practical security for rural internet kiosks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        NSDR '08: Proceedings of the second ACM SIGCOMM workshop on Networked systems for developing regions
        August 2008
        56 pages
        ISBN:9781605581804
        DOI:10.1145/1397705

        Copyright © 2008 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 18 August 2008

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate8of23submissions,35%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader