Skip to main content

Authentication for Pervasive Computing

  • Conference paper
Security in Pervasive Computing

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2802))

Abstract

Key management is fundamental to communications security, and for security in pervasive computing sound key management is particularly difficult. However, sound key management itself depends critically on sound authentication. In this paper we review current notions of entity authentication and discuss why we believe these notions are unsuitable for the pervasive domain. We then present our views on how notions of authentication should be revised to address the challenges of the pervasive domain, and some of the new research problems that will arise. We end with some brief thoughts on how our revised notions may be implemented and some of the problems that may be encountered.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Information Security Management (June 2002) (published by penton)

    Google Scholar 

  2. The Guardian Newspaper, 7th Spetember (2002)

    Google Scholar 

  3. http://www.crhc.uiuc.edu/nhv/wise/

  4. http://www.pampas.eu.org/

  5. Corner, M.D., Noble, B.D.: Zero-interaction authentication. In: The 8th ACM Conference on Mobile Computing and Networking, Atlanta, GA (September 2002)

    Google Scholar 

  6. Diffie, W., van Oorschot, P.C., Wiener, M.J.: Authentication and Authenticated Key Exchange. Design, Codes and Cryptography 2, 107–125 (1992)

    Article  Google Scholar 

  7. Roscoe, A.W.: Intensional Specifications of Security Protocols. In: Proceedings of the 1996 IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, Los Alamitos (1996)

    Google Scholar 

  8. Zimmerman, P.: The Official PGP Users Guide. MIT Press, Cambridge (1995)

    Google Scholar 

  9. Boyd, C.: Security Architectures Using Formal Methods. IEEE Journal on Selected Areas in Communications 11(5), 694–701 (1993)

    Article  Google Scholar 

  10. Maurer, U., Schmid, P.: A Calculus for Security Bootstrapping in Distributed Systems. Journal of Computer Security 4(1), 55–80 (1996)

    Google Scholar 

  11. Balfanz, D., Smetters, D.K., Stewart, P., Chi Wong, H.: Trusting Strangers: Authentication in Ad-hoc Wireless Networks. Network and Distributed Systems Security Symposium (2002), Available from http://www.isoc.org/isoc/conferences/ndss/02/proceedings/index.html

  12. Stajano, F., Anderson, R.J.: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, Springer, Heidelberg (2000)

    Google Scholar 

  13. Asokan, N., Ginzboorg, P.: Key Agreement in Ad-hoc Networks. Computer Communication Review (2000), Available from http://www.semper.org/sirene/people/asokan/research/index.html

  14. http://www.dti-mi.org.uk/newweb/fiducia.htm

  15. Vigna, G.: Mobile Agents and Security. LNCS (July 1998)

    Google Scholar 

  16. Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing Robust and Ubiquitous Security Support for Mobile Ad-hoc Networks. In: Proceedings of 9th International Conference on Network Protocols, IEEE Computer Society Press, Los Alamitos (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Creese, S., Goldsmith, M., Roscoe, B., Zakiuddin, I. (2004). Authentication for Pervasive Computing. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds) Security in Pervasive Computing. Lecture Notes in Computer Science, vol 2802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39881-3_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-39881-3_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20887-7

  • Online ISBN: 978-3-540-39881-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics