Abstract
Pervasive computing can be divided into computing on personal wearable devices and computing in a smart infrastructure. When a wearable device communicates personal data for further processing to the infrastructure, privacy concerns arise. These concerns would be unnecessary if the behavior of services in the smart environment could be authenticated and known to be compliant to given policies. Based upon the Trusted Computing idea, we present a solution to the specific problem of service access point authentication. In contrast to previous approaches, this operating system centric approach does not only handle trusted computing enhanced applications but also deals with legacy applications providing services.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Weiser, M.: The Computer of the 21st Century (1991). Scientific American 265(3), 66–75 (1991)
Langheinrich, M.: Privacy by Design – Principles of Privacy-Aware Ubiquitous Systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 273–291. Springer, Heidelberg (2001)
Creese, S., Goldsmith, M., Roscoe, B., Zakiuddin, I.: Authentication for pervasive computing. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 116–129. Springer, Heidelberg (2004)
Trusted Computing Group: TCG Backgrounder (2003), https://www.trustedcomputinggroup.org/downloads/TCG_Backgrounder.pdf
IBM Corporation: Developer’s view of IBM PowerPC Reference Platform (2003), http://www-306.ibm.com/chips/products/powerpc/newsletter/mar2003/ppc_process_at_work.html
Kinney, S.: Embedded Security Seminar: The Trusted Platform Module Specification and Integrating the Trusted Platform Module into Embedded Systems (2004), http://www.cmpevents.com/ESCe04/a.asp?option=G&V=3&id=271270
Hohl, A., Zugenmaier, A.: Safeguarding Personal Data with DRM in Pervasive Computing. In: Proceedings of the Security and Privacy Workshop of the Pervasive 2004 Conference, Vienna (2004)
Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and Implementation of a TCG-based Integrity Measurement Architecture. In: 13th Usenix Security Symposium, San Diego 2004 (2004)
Haldar, V., Chandra, D., Franz, M.: Semantic Remote Attestation - A Virtual Machine Directed Approach to Trusted Computing. In: USENIX (ed.) Proceedings 3rd Virtual Machine Research and Technology Symposium VM 2004, San Jose, Berkeley, CA, USA, pp. 29–41. USENIX (2004)
Dierks, T., Allen, C.: RFC 2246: The TLS Protocol Version 1.0 (1999), http://www.ietf.org/rfc/rfc2246.txt
Campadello, S., MacLaverty, T.S.R.: Security and Reliability Challenges in Component-Based Software for Consumer Devices. In: The IASTED International Conference on Software Engineering, 2004, Innsbruck, Austria (2004), http://www.nokia.com/library/files/docs/CamMacSar.pdf
Lie, D., Thekkath, C.A., Horowitz, M.: Implementing an Untrusted Operating System on Trusted Hardware. In: Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP). (2003), http://www.eecg.toronto.edu/~lie/papers/lie-sosp2003.pdf
Necula, G.C., Lee, P.: Safe Kernel Extensions Without Run-Time Checking. In: USENIX (ed.) 2nd Symposium on Operating Systems Design and Implementation (OSDI 1996), Seattle, WA, Berkeley, CA, USA, October 28–31, pp. 229–243. USENIX (1996)
Myers, A.C., Liskov, B.: Protecting Privacy using the Decentralized Label Model. ACM Transactions on Software Engineering and Methodology 9, 410–442 (2000)
IBM Corporation: Global Security Analysis Lab: TCPA Resources (2003) http://www.research.ibm.com/gsal/tcpa/
Pfitzmann, B., Riordan, J., Stueble, C., Waidner, M., Weber, A.: Die PERSEUS Systemarchitektur (2001), http://www-krypt.cs.uni-sb.de/download/papers/PfRSWW2001a.pdf
Wash, R.: TCPA support on NetBSD (2004) http://www.citi.umich.edu/u/rwash/projects/trusted/netbsd.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hohl, A., Lowis, L., Zugenmaier, A. (2005). Look Who’s Talking – Authenticating Service Access Points. In: Hutter, D., Ullmann, M. (eds) Security in Pervasive Computing. SPC 2005. Lecture Notes in Computer Science, vol 3450. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-32004-3_16
Download citation
DOI: https://doi.org/10.1007/978-3-540-32004-3_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25521-5
Online ISBN: 978-3-540-32004-3
eBook Packages: Computer ScienceComputer Science (R0)