Secure pervasive computing without a Trusted Third Party

被引:0
作者
Pirzada, AA [1 ]
McDonald, C [1 ]
机构
[1] Univ Western Australia, Sch Comp Sci & Software Engn, Nedlands, WA 6009, Australia
来源
IEEE/ACS INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, PROCEEDINGS | 2004年
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The miniaturization of computing devices and the need for ubiquitous communication has augmented the demand for pervasive computing. Security demands that all devices in a pervasive system must be able to authenticate each other and communicate in a secure manner. This is usually achieved through a Trusted Third Party like a Public Key Infrastructure (PKI) or a Key Distribution Centre (KDC). The establishment of such an entity in such a dynamic environment is neither feasible nor pragmatic. In this paper we present a novel mechanism for authentication and key exchange that can operate seamlessly in pervasive computing environments without the presence of a Trusted Third Party. The proposed scheme has minimal computational requirements, which makes it most suitable for devices with limited resources.
引用
收藏
页码:240 / 240
页数:1
相关论文
共 3 条
[1]  
JOYE M, 1998, ACM SIGOPS OPERATING, V32, P33
[2]  
PIRZADA AA, 2004, P 27 AUSTR COMP SCI, V26, P41
[3]   An Authentication Protocol Without Trusted Third Party [J].
Shieh, Shiuh-Pyng ;
Yang, Wen-Her ;
Sun, Hun-Min .
IEEE COMMUNICATIONS LETTERS, 1997, 1 (03) :87-89