Security for Heterogeneous and Ubiquitous Environments Consisting of Resource-Limited Devices: An Approach to Authorization Using Kerberos

被引:0
作者
Astorga, Jasone [1 ]
Matias, Jon [1 ]
Saiz, Purificacion [1 ]
Jacob, Eduardo [1 ]
机构
[1] Univ Basque Country, Fac Engn, Bilbao 48013, Spain
来源
SECURITY IN EMERGING WIRELESS COMMUNICATION AND NETWORKING SYSTEMS | 2010年 / 42卷
关键词
Authorization system; Communication system security; Kerberos;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent widespread of small electronic devices with a low capacity microprocessor and wireless communication capabilities integrated, has given place to the emergence of new communication scenarios, mainly characterized by their heterogeneity and ubiquity. As an example, in the near future, it will be very common for users to access and control electrical appliances or high performance sensors in remote locations just by using their mobile phone or PDA. However, for these environments to achieve the expected success they must probe to be secure and reliable. The security algorithms and mechanisms used to date are meant for powerful workstations and not suitable for small devices with specific constraints regarding energy and processing power. Therefore, in this paper we present a lightweight authentication and authorization solution based on the Kerberos symmetric key protocol, and we propose an extension of its functionalities in order to add authorization support.
引用
收藏
页码:65 / 76
页数:12
相关论文
共 13 条
[1]  
Abadi D., 2004, Proceedings of the 30th International Conference on Very Large Data Bases Endowment, V30, P1361
[2]   Wearable security services [J].
Al-Muhtadi, J ;
Mickunas, D ;
Campbell, R .
21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, PROCEEDINGS, 2001, :266-271
[3]  
DUNKELS A, 2004, WORK IN PROGR SESS 1
[4]  
Ferraiolo D. F., 2001, ACM Transactions on Information and Systems Security, V4, P224, DOI 10.1145/501978.501980
[5]   SESAME - THE SOLUTION TO SECURITY FOR OPEN DISTRIBUTED SYSTEMS [J].
KAIJSER, P ;
PARKER, T ;
PINKAS, D .
COMPUTER COMMUNICATIONS, 1994, 17 (07) :501-518
[6]  
Kansal A, 2007, PROCEEDINGS OF THE SIXTH INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING IN SENSOR NETWORKS, P547, DOI 10.1109/IPSN.2007.4379718
[7]  
Neuman B. C., 1993, Proceedings the 13th International Conference on Distributed Computing Systems (Cat. No.93CH3282-1), P283, DOI 10.1109/ICDCS.1993.287698
[8]  
Neuman C., 2005, KERBEROS NETWORK AUT
[9]   Analyzing the energy consumption of security protocols [J].
Potlapally, NR ;
Ravi, S ;
Raghunathan, A ;
Jha, NK .
ISLPED'03: PROCEEDINGS OF THE 2003 INTERNATIONAL SYMPOSIUM ON LOW POWER ELECTRONICS AND DESIGN, 2003, :30-35
[10]  
RUANGCHAIJATUPO.N, 2001, 3 IEEE WORKSH WIR LA