Pervasive authentication and authorization infrastructures for mobile users

نویسندگان

  • Jordi Forné
  • M. Francisca Hinarejos
  • Andrés Marín López
  • Florina Almenárez Mendoza
  • Javier López
  • José A. Montenegro
  • Marc Lacoste
  • Daniel Díaz Sánchez
چکیده

Network and device heterogeneity, nomadic mobility, intermittent connectivity and, more generally, extremely dynamic operating conditions, are major challenges in the design of security infrastructures for pervasive computing. Yet, in a ubiquitous computing environment, limitations of traditional solutions for authentication and authorization can be overcome with a pervasive public key infrastructure (pervasive-PKI). This choice allows the validation of credentials of users roaming between heterogeneous networks, even when global connectivity is lost and some services are temporarily unreachable. Proof-of-concept implementations and testbed validation results demonstrate that strong security can be achieved for users and applications through the combination of traditional PKI services with a number of enhancements like: (i) dynamic and collaborative trust model, (ii) use of attribute certificates for privilege management, and (iii) modular architecture enabling nomadic mobility and enhanced with reconfiguration capabilities.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Methodology for UICC- Based Security Services in Pervasive Fixed Mobile Convergence Systems

Nowadays, Fixed Mobile Convergence (FMC) is an emerging worldwide trend in the form of fixed and mobile telephony convergence. In this pervasive environment, security should be considered to be a more important factor than before because the security threats of heterogeneous infrastructures can happen simultaneously. Thus, UICC, the ideal and secure medium embedded on the mobile terminals, has ...

متن کامل

Pervasive geo-security - a lightweight triple-A approach to securing distributed geo-service infrastructures

Security has recently become a major concern in distributed geo-infrastructures for spatial data provision. Thus, a lightweight approach for securing distributed low-power environments such as geo-sensor networks is needed. The first part of this article presents a survey of current security mechanisms for authentication and authorisation. Based on this survey, a lightweight and scalable token-...

متن کامل

Architecting Adaptable Security Infrastructures for Pervasive Networks through Components

Security management in pervasive networks should be fundamentally flexible. The dynamic and heterogeneous character of these environments requires a security infrastructure which can be tailored to different operating conditions, at variable levels of granularity, during phases of design, deployment, and execution. This is possible with component-based security architecture. We illustrate the b...

متن کامل

A Federated Authorization and Authentication Infrastructure for Unified Single Sign On

Currently federated authorization and authentication infrastructures are deployed to offer services to large groups of users while increasing the usability and scalability of the security architecture. Connection of domains using a variety of technologies brings new challenges and requires the utilization of standardized communication languages between these components. The presented architectu...

متن کامل

Security Mechanisms for Mobile Agent Platforms Based on SPKI/SDSI Chains of Trust

This work defines a security scheme, based on SPKI/SDSI chains of trust, for protecting mobile agent platforms in large-scale distributed systems. The scheme is composed by a protocol of mutual authentication, a mobile agent authenticator and a mechanism for the generation of protection domain. Due to the flexibility of the SPKI/SDSI certificate delegation infrastructures used, the proposed sch...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computers & Security

دوره 29  شماره 

صفحات  -

تاریخ انتشار 2010