Skip to main content

On Device Authentication in Wireless Networks: Present Issues and Future Challenges

  • Conference paper
Trust, Privacy and Security in Digital Business (TrustBus 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4657))

Abstract

Whilst device authentication must be considered as a cardinal security issue, complementary and of equal importance to user authentication, in today’s wireless networks, only a few papers address it patchily. This paper identifies and analyses possible major solutions towards solving the device authentication problem. We discuss key issues and future challenges that characterize each solution examining its pros and cons. We also offer a short qualitative comparative analysis for the device authentication schemes in question, examining its applicability for both infrastructure and ad-hoc deployments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hartung, C., Balasalle, J., Han, R.: Node Compromise in Sensor Networks: The Need for Secure Systems, T.R. CU-CS-990-05, Department of C.S. Univ. of Colorado (January 2005)

    Google Scholar 

  2. IEEE Std. 802.11i-2004, Amendment to IEEE Std. 802.11, 1999 Edition, Amendment 6: Medium Access Control (MAC) Security Enhancements, Part 11, IEEE Press, Los Alamitos (June 2004)

    Google Scholar 

  3. IEEE 802.1X-2004 IEEE Standards for Local and metropolitan area networks - Port-Based Network Access Control (December 2004)

    Google Scholar 

  4. IEEE P802.16e/Draft12, IEEE Standard for Local and metropolitan area networks, Amendment for Physical and Medium Access Control Layers (published October 2005)

    Google Scholar 

  5. TCG, TPM Main Part 1 Design Principles Spec. Version 1.2 Revision 85 (February 2005)

    Google Scholar 

  6. TCG Mobile Trusted Module Spec., version 0.9, Revision 1, DRAFT (September 2006)

    Google Scholar 

  7. TCG, Spec. Architecture Overview, Specification Revision 1.2 (April 2004)

    Google Scholar 

  8. Bruschi, D., Cavallaro, L., Lanzi, A., Monga, M.: Attacking a Trusted Computing Platform, Improving the Security of the TCG Specification, Tech. Report RT (June 2005)

    Google Scholar 

  9. Hendricks, J., van Doorn, L.: Secure Bootstrap is Not Enough: Shoring up the Trusted Computing Base. In: Proc. of the 11th ACM SIGOPS, September 2004, ACM, New York (2004)

    Google Scholar 

  10. Jansen, W., Gavrila, S., Séveillac, C., Korolev, V.: Smart Cards and Mobile Device Authentication: An Overview and Implementation, NIST, NISTIR 7206 (July 2005)

    Google Scholar 

  11. Sastry, N., Shankar, U., Wagner, D.: Secure Verification of Location Claims. In: ACM WiSE 2003, September 19, 2003, California, USA, pp. 1–10 (2003)

    Google Scholar 

  12. Zheng, Y., He, D., Yu, W., Tang, X.: Trusted Computing-Based Security Architecture For 4G Mobile Networks. In: Proc. of PDCAT 2005, pp. 251–255 (2005)

    Google Scholar 

  13. Remley, K., et al.: Electromagnetic Signatures of WLAN Cards and Network Security. In: IEEE Int’l Symposium on Signal Processing and Information Technology, pp. 484–488 (2005)

    Google Scholar 

  14. Henrici, D., Muller, P.: Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Ident. In: IEEE PerCom, pp. 149–153, 04

    Google Scholar 

  15. Juels, A., Weis, A.: Authenticating Pervasive Devices with Human Protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 149–153. Springer, Heidelberg (2001)

    Google Scholar 

  16. Anderson, R., Kuhn, M.: Low Cost Attacks on Tamper Resistant Devices. In: Christianson, B., Lomas, M. (eds.) Security Protocols. LNCS, vol. 1361, pp. 125–136. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  17. Wen, H.-A., et al.: Provably secure authenticated key exchange protocols for low power computing clients. Computers & Security 25, 106–113 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Costas Lambrinoudakis Günther Pernul A Min Tjoa

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kambourakis, G., Gritzalis, S. (2007). On Device Authentication in Wireless Networks: Present Issues and Future Challenges. In: Lambrinoudakis, C., Pernul, G., Tjoa, A.M. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2007. Lecture Notes in Computer Science, vol 4657. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74409-2_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74409-2_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74408-5

  • Online ISBN: 978-3-540-74409-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics