Back to Search Start Over

An Authentication Protocol for Pervasive Computing.

Authors :
Yi Pan
Daoxu Chen
Minyi Guo
Jiannong Cao
Dongarra, Jack J.
Shiqun Li
Jianying Zhou
Xiangxue Li
Kefei Chen
Source :
Parallel & Distributed Processing & Applications (9783540297697); 2005, p553-563, 11p
Publication Year :
2005

Abstract

Authentication protocols are essential for security in many systems. However, authentication protocols are error-prone and difficult to design. In pervasive computing, the inherent characteristics such as mobility and restricted resources make it even harder to design suitable authentication protocols. In this paper we propose an authentication protocol to solve an open problem in pervasive computing, that is secure use of public information utilities without accessing a trusted third party (TTP). Our solution not only provides authentication, but also establishes a secure communication channel between the user and the service provider without the participation of TTP. The authentication protocol can be built with any secure symmetric and asymmetric cryptographic algorithm. We show the protocol can resist passive and active attacks. We also discuss how the protocol can be extended to an applicable scheme with payment support. Keywords: Authentication, Pervasive Computing Security, Public Key Infrastructure, E-Commerce. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISBNs :
9783540297697
Database :
Supplemental Index
Journal :
Parallel & Distributed Processing & Applications (9783540297697)
Publication Type :
Book
Accession number :
32965559
Full Text :
https://doi.org/10.1007/11576235_57