Access Restriction

Author Pirzada, Asad Amir ♦ Mcdonald, Chris
Source CiteSeerX
Content type Text
File Format PDF
Language English
Subject Domain (in DDC) Computer science, information & general works ♦ Data processing & computer science
Subject Keyword Ubiquitous Communication ♦ Public Key Certificate ♦ Pervasive System ♦ Explicit Authentication ♦ Trusted Third Party ♦ Minimal Computational Requirement ♦ Central Trust Authority ♦ Secure Manner ♦ Novel Mechanism ♦ Public Key ♦ Elevated Security ♦ Limited Resource ♦ Secure Pervasive Computing ♦ Public Key Infrastructure ♦ Minimal Reliance ♦ Security Scheme ♦ Digital Certificate ♦ Pervasive Computing ♦ Computational Overhead ♦ Dynamic Environment ♦ Pervasive System Id-based System ♦ Key Distribution Centre ♦ Pervasive Computing Environment ♦ Key Exchange
Description The miniaturization of computing devices and the need for ubiquitous communication has augmented the demand for pervasive computing. Security demands that all devices in a pervasive system must be able to authenticate each other and communicate in a secure manner. This is usually achieved through a Trusted Third Party like a Public Key Infrastructure (PKI) or a Key Distribution Centre (KDC). The establishment of such an entity in such a dynamic environment is neither feasible nor pragmatic. In this paper we present a novel mechanism for authentication and key exchange that can operate seamlessly in pervasive computing environments without the presence of a Trusted Third Party. The proposed scheme has minimal computational requirements, which makes it most suitable for devices with limited resources. 1. Security Scheme for Pervasive Systems ID-based systems [1] were introduced in order to avoid the explicit authentication of public keys through digital certificates. These systems aim at using the identity of a user to represent the public key. The advantage of such systems is that the public key certificates are no longer required to be maintained at a central or distributed trusted third party [2] providing elevated security and efficiency. Such schemes can be configured to perform authentication as well as key exchange without a trusted third party. We propose using the scheme by Sheih et al. [3] for pervasive computing environments because of its simplicity, lower computational overhead and minimal reliance on a central trust authority. The scheme, when configured for a pervasive system, works in three
Educational Role Student ♦ Teacher
Age Range above 22 year
Educational Use Research
Education Level UG and PG ♦ Career/Technical Study
Learning Resource Type Article
Publisher Date 2004-01-01
Publisher Institution ICPS 2004. Proceedings. The IEEE/ACS International Conference on Pervasive Services