Activity-based security scheme for ubiquitous environments

Le Xuan Hung, J. Hassan, A. S. Riaz, S. M.K. Raazi, Y. Weiwei, N. T. Canh, P. T.H. Truc, Sungyoung Lee, Heejo Lee, Yuseung Son, Miguel Fernandes, Miso Kim, Yonil Zhung

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)


Bardram recently introduced a new concept of activity-based computing as a way of thinking about supporting human activities in ubiquitous environments. In such environments where users are using a multitude of heterogeneous computing devices, the need for supporting users at the activity level becomes essential. However, without considering basic security issues, it could be rife with vulnerabilities. Security services, like authentication and access control, have to not only guarantee security, privacy, and confidentiality for ubiquitous computing resources, but also support user activities equipped with various devices. In this paper, we present an activity-based security scheme. The proposed scheme aims to enhance security services on mobile devices and facilitate user activities. We also integrate off-the-shell security services like MD5, TEA, Diffie-Hellman key agreement protocol so that it makes the scheme more robust and practically usable. The implementation and sample scenario have shown the requirement satisfactory of the scheme.

Original languageEnglish
Title of host publication2008 IEEE International Performance Computing and Communications Conference, IPCCC 2008
Number of pages7
Publication statusPublished - 2008
Event2008 IEEE International Performance Computing and Communications Conference, IPCCC 2008 - Austin, TX, United States
Duration: 2008 Dec 72008 Dec 9

Publication series

NameConference Proceedings of the IEEE International Performance, Computing, and Communications Conference


Other2008 IEEE International Performance Computing and Communications Conference, IPCCC 2008
Country/TerritoryUnited States
CityAustin, TX


  • Access control
  • Activity-based computing
  • Authentication
  • Security
  • Ubiuiquitous computing

ASJC Scopus subject areas

  • General Engineering


Dive into the research topics of 'Activity-based security scheme for ubiquitous environments'. Together they form a unique fingerprint.

Cite this