Abstract
Whilst device authentication must be considered as a cardinal security issue, complementary and of equal importance to user authentication, in today’s wireless networks, only a few papers address it patchily. This paper identifies and analyses possible major solutions towards solving the device authentication problem. We discuss key issues and future challenges that characterize each solution examining its pros and cons. We also offer a short qualitative comparative analysis for the device authentication schemes in question, examining its applicability for both infrastructure and ad-hoc deployments.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Hartung, C., Balasalle, J., Han, R.: Node Compromise in Sensor Networks: The Need for Secure Systems, T.R. CU-CS-990-05, Department of C.S. Univ. of Colorado (January 2005)
IEEE Std. 802.11i-2004, Amendment to IEEE Std. 802.11, 1999 Edition, Amendment 6: Medium Access Control (MAC) Security Enhancements, Part 11, IEEE Press, Los Alamitos (June 2004)
IEEE 802.1X-2004 IEEE Standards for Local and metropolitan area networks - Port-Based Network Access Control (December 2004)
IEEE P802.16e/Draft12, IEEE Standard for Local and metropolitan area networks, Amendment for Physical and Medium Access Control Layers (published October 2005)
TCG, TPM Main Part 1 Design Principles Spec. Version 1.2 Revision 85 (February 2005)
TCG Mobile Trusted Module Spec., version 0.9, Revision 1, DRAFT (September 2006)
TCG, Spec. Architecture Overview, Specification Revision 1.2 (April 2004)
Bruschi, D., Cavallaro, L., Lanzi, A., Monga, M.: Attacking a Trusted Computing Platform, Improving the Security of the TCG Specification, Tech. Report RT (June 2005)
Hendricks, J., van Doorn, L.: Secure Bootstrap is Not Enough: Shoring up the Trusted Computing Base. In: Proc. of the 11th ACM SIGOPS, September 2004, ACM, New York (2004)
Jansen, W., Gavrila, S., Séveillac, C., Korolev, V.: Smart Cards and Mobile Device Authentication: An Overview and Implementation, NIST, NISTIR 7206 (July 2005)
Sastry, N., Shankar, U., Wagner, D.: Secure Verification of Location Claims. In: ACM WiSE 2003, September 19, 2003, California, USA, pp. 1–10 (2003)
Zheng, Y., He, D., Yu, W., Tang, X.: Trusted Computing-Based Security Architecture For 4G Mobile Networks. In: Proc. of PDCAT 2005, pp. 251–255 (2005)
Remley, K., et al.: Electromagnetic Signatures of WLAN Cards and Network Security. In: IEEE Int’l Symposium on Signal Processing and Information Technology, pp. 484–488 (2005)
Henrici, D., Muller, P.: Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Ident. In: IEEE PerCom, pp. 149–153, 04
Juels, A., Weis, A.: Authenticating Pervasive Devices with Human Protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 149–153. Springer, Heidelberg (2001)
Anderson, R., Kuhn, M.: Low Cost Attacks on Tamper Resistant Devices. In: Christianson, B., Lomas, M. (eds.) Security Protocols. LNCS, vol. 1361, pp. 125–136. Springer, Heidelberg (1997)
Wen, H.-A., et al.: Provably secure authenticated key exchange protocols for low power computing clients. Computers & Security 25, 106–113 (2006)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kambourakis, G., Gritzalis, S. (2007). On Device Authentication in Wireless Networks: Present Issues and Future Challenges. In: Lambrinoudakis, C., Pernul, G., Tjoa, A.M. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2007. Lecture Notes in Computer Science, vol 4657. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74409-2_16
Download citation
DOI: https://doi.org/10.1007/978-3-540-74409-2_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74408-5
Online ISBN: 978-3-540-74409-2
eBook Packages: Computer ScienceComputer Science (R0)