Share on Facebook Tweet on Twitter Share on LinkedIn Share by email
Exploiting Context Histories in Setting up an e-Home

Johannes Helander


Turning a home into a seamlessly integrated, yet secure environment, without excessive cost, presents a number of challenges. This paper attempts to draw various solutions together. What must be done for security, can also be exploited in making configuration less tedious.

The home environment is augmented by low-cost invisible computers that let everyday objects communicate and integrate. Embedded XML web services are used as a generic substrate for exchanging information between all classes of devices: simple light switches to complex personal computers. Solid cryptography and a touch based trust establishment protocol allow setting up a secure home completely independently. Finally the human interaction context history is used to heuristically determine how the different devices should interact.


Publication typeInproceedings
Published inFirst International Workshop on Exploiting Context Histories in Smart Environments (in conjunction with Pervasive 2005)
> Publications > Exploiting Context Histories in Setting up an e-Home