A study on authentication mechanism using robot vacuum cleaner

Hong Joo Lee, Heejun Park, Sangkyun Kim

Research output: Contribution to journalConference article

Abstract

Robot is not a new field. It has been around for decades. In fact, most people have robots in their own home, even if they don't recognize the robots as such. For example, a dishwasher automatically washes and dries your dishes, then grinds up the rinsed-off food so the organic matter doesn't clog your drains. A washing machine soaks, soaps, agitates, and rinses your clothes. Down the street, the car wash-n-wax cleans, brushes, washes, and waxes your car, all for a few dollars. One of the better known home-oriented robots is robot vacuum cleaner which has already good cleaner for assistant house keeper. In this paper, we suggest that home security system using robot vacuum cleaner. Our robot vacuum cleaner makes an additional security function using camera. But, these technologies lack in provision of the authentication architecture of customers for the accountability, confidentiality. This paper presents the architecture of authentication mechanism to deal with the specific challenges arising from these applications and to overcome the weakness of traditional architecture for the secured infrastructure of home network environment.

Original languageEnglish
Pages (from-to)122-127
Number of pages6
JournalLecture Notes in Computer Science
Volume3483
Issue numberIV
Publication statusPublished - 2005 Sep 26
EventInternational Conference on Computational Science and Its Applications - ICCSA 2005 - , Singapore
Duration: 2005 May 92005 May 12

Fingerprint

Vacuum cleaners
Authentication
Vacuum
Robot
Robots
Waxes
Railroad cars
Washing machines
Home Network
Home networks
Accountability
Soaps (detergents)
Confidentiality
Brushes
Security systems
Biological materials
Customers
Infrastructure
Camera
Cameras

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Lee, Hong Joo ; Park, Heejun ; Kim, Sangkyun. / A study on authentication mechanism using robot vacuum cleaner. In: Lecture Notes in Computer Science. 2005 ; Vol. 3483, No. IV. pp. 122-127.
@article{70f7bcc3438b4ff9ac260458afe8024c,
title = "A study on authentication mechanism using robot vacuum cleaner",
abstract = "Robot is not a new field. It has been around for decades. In fact, most people have robots in their own home, even if they don't recognize the robots as such. For example, a dishwasher automatically washes and dries your dishes, then grinds up the rinsed-off food so the organic matter doesn't clog your drains. A washing machine soaks, soaps, agitates, and rinses your clothes. Down the street, the car wash-n-wax cleans, brushes, washes, and waxes your car, all for a few dollars. One of the better known home-oriented robots is robot vacuum cleaner which has already good cleaner for assistant house keeper. In this paper, we suggest that home security system using robot vacuum cleaner. Our robot vacuum cleaner makes an additional security function using camera. But, these technologies lack in provision of the authentication architecture of customers for the accountability, confidentiality. This paper presents the architecture of authentication mechanism to deal with the specific challenges arising from these applications and to overcome the weakness of traditional architecture for the secured infrastructure of home network environment.",
author = "Lee, {Hong Joo} and Heejun Park and Sangkyun Kim",
year = "2005",
month = "9",
day = "26",
language = "English",
volume = "3483",
pages = "122--127",
journal = "Lecture Notes in Computer Science",
issn = "0302-9743",
publisher = "Springer Verlag",
number = "IV",

}

A study on authentication mechanism using robot vacuum cleaner. / Lee, Hong Joo; Park, Heejun; Kim, Sangkyun.

In: Lecture Notes in Computer Science, Vol. 3483, No. IV, 26.09.2005, p. 122-127.

Research output: Contribution to journalConference article

TY - JOUR

T1 - A study on authentication mechanism using robot vacuum cleaner

AU - Lee, Hong Joo

AU - Park, Heejun

AU - Kim, Sangkyun

PY - 2005/9/26

Y1 - 2005/9/26

N2 - Robot is not a new field. It has been around for decades. In fact, most people have robots in their own home, even if they don't recognize the robots as such. For example, a dishwasher automatically washes and dries your dishes, then grinds up the rinsed-off food so the organic matter doesn't clog your drains. A washing machine soaks, soaps, agitates, and rinses your clothes. Down the street, the car wash-n-wax cleans, brushes, washes, and waxes your car, all for a few dollars. One of the better known home-oriented robots is robot vacuum cleaner which has already good cleaner for assistant house keeper. In this paper, we suggest that home security system using robot vacuum cleaner. Our robot vacuum cleaner makes an additional security function using camera. But, these technologies lack in provision of the authentication architecture of customers for the accountability, confidentiality. This paper presents the architecture of authentication mechanism to deal with the specific challenges arising from these applications and to overcome the weakness of traditional architecture for the secured infrastructure of home network environment.

AB - Robot is not a new field. It has been around for decades. In fact, most people have robots in their own home, even if they don't recognize the robots as such. For example, a dishwasher automatically washes and dries your dishes, then grinds up the rinsed-off food so the organic matter doesn't clog your drains. A washing machine soaks, soaps, agitates, and rinses your clothes. Down the street, the car wash-n-wax cleans, brushes, washes, and waxes your car, all for a few dollars. One of the better known home-oriented robots is robot vacuum cleaner which has already good cleaner for assistant house keeper. In this paper, we suggest that home security system using robot vacuum cleaner. Our robot vacuum cleaner makes an additional security function using camera. But, these technologies lack in provision of the authentication architecture of customers for the accountability, confidentiality. This paper presents the architecture of authentication mechanism to deal with the specific challenges arising from these applications and to overcome the weakness of traditional architecture for the secured infrastructure of home network environment.

UR - http://www.scopus.com/inward/record.url?scp=24944522540&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=24944522540&partnerID=8YFLogxK

M3 - Conference article

VL - 3483

SP - 122

EP - 127

JO - Lecture Notes in Computer Science

JF - Lecture Notes in Computer Science

SN - 0302-9743

IS - IV

ER -