Abstract
Key management is fundamental to communications security, and for security in pervasive computing sound key management is particularly difficult. However, sound key management itself depends critically on sound authentication. In this paper we review current notions of entity authentication and discuss why we believe these notions are unsuitable for the pervasive domain. We then present our views on how notions of authentication should be revised to address the challenges of the pervasive domain, and some of the new research problems that will arise. We end with some brief thoughts on how our revised notions may be implemented and some of the problems that may be encountered.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Information Security Management (June 2002) (published by penton)
The Guardian Newspaper, 7th Spetember (2002)
Corner, M.D., Noble, B.D.: Zero-interaction authentication. In: The 8th ACM Conference on Mobile Computing and Networking, Atlanta, GA (September 2002)
Diffie, W., van Oorschot, P.C., Wiener, M.J.: Authentication and Authenticated Key Exchange. Design, Codes and Cryptography 2, 107–125 (1992)
Roscoe, A.W.: Intensional Specifications of Security Protocols. In: Proceedings of the 1996 IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, Los Alamitos (1996)
Zimmerman, P.: The Official PGP Users Guide. MIT Press, Cambridge (1995)
Boyd, C.: Security Architectures Using Formal Methods. IEEE Journal on Selected Areas in Communications 11(5), 694–701 (1993)
Maurer, U., Schmid, P.: A Calculus for Security Bootstrapping in Distributed Systems. Journal of Computer Security 4(1), 55–80 (1996)
Balfanz, D., Smetters, D.K., Stewart, P., Chi Wong, H.: Trusting Strangers: Authentication in Ad-hoc Wireless Networks. Network and Distributed Systems Security Symposium (2002), Available from http://www.isoc.org/isoc/conferences/ndss/02/proceedings/index.html
Stajano, F., Anderson, R.J.: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, Springer, Heidelberg (2000)
Asokan, N., Ginzboorg, P.: Key Agreement in Ad-hoc Networks. Computer Communication Review (2000), Available from http://www.semper.org/sirene/people/asokan/research/index.html
Vigna, G.: Mobile Agents and Security. LNCS (July 1998)
Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing Robust and Ubiquitous Security Support for Mobile Ad-hoc Networks. In: Proceedings of 9th International Conference on Network Protocols, IEEE Computer Society Press, Los Alamitos (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Creese, S., Goldsmith, M., Roscoe, B., Zakiuddin, I. (2004). Authentication for Pervasive Computing. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds) Security in Pervasive Computing. Lecture Notes in Computer Science, vol 2802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39881-3_12
Download citation
DOI: https://doi.org/10.1007/978-3-540-39881-3_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20887-7
Online ISBN: 978-3-540-39881-3
eBook Packages: Springer Book Archive