An authentication protocol for pervasive computing

Shiqun Li, Jianying Zhou, Xiangxue Li, Kefei Chen

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Authentication protocols are essential for security in many systems. However, authentication protocols are error-prone and difficult to design. In pervasive computing, the inherent characteristics such as mobility and restricted resources make it even harder to design suitable authentication protocols. In this paper we propose an authentication protocol to solve an open problem in pervasive computing, that is secure use of public information utilities without accessing a trusted third party (TTP). Our solution not only provides authentication, but also establishes a secure communication channel between the user and the service provider without the participation of TTP. The authentication protocol can be built with any secure symmetric and asymmetric cryptographic algorithm. We show the protocol can resist passive and active attacks. We also discuss how the protocol can be extended to an applicable scheme with payment support.

Original languageEnglish
Title of host publicationParallel and Distributed Processing and Applications - Third International Symposium, ISPA 2005, Proceedings
PublisherSpringer Verlag
Pages553-563
Number of pages11
ISBN (Print)3540297693, 9783540297697
DOIs
StatePublished - 2005
Externally publishedYes
Event3rd International Symposium on Parallel and Distributed Processing and Applications, ISPA 2005 - Nanjing, China
Duration: 2 Nov 20055 Nov 2005

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3758 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference3rd International Symposium on Parallel and Distributed Processing and Applications, ISPA 2005
Country/TerritoryChina
CityNanjing
Period2/11/055/11/05

Keywords

  • Authentication
  • El-Commerce
  • Pervasive Computing Security
  • Public Key Infrastructure

Fingerprint

Dive into the research topics of 'An authentication protocol for pervasive computing'. Together they form a unique fingerprint.

Cite this