Pervasive authentication and authorization infrastructures for mobile users
نویسندگان
چکیده
Network and device heterogeneity, nomadic mobility, intermittent connectivity and, more generally, extremely dynamic operating conditions, are major challenges in the design of security infrastructures for pervasive computing. Yet, in a ubiquitous computing environment, limitations of traditional solutions for authentication and authorization can be overcome with a pervasive public key infrastructure (pervasive-PKI). This choice allows the validation of credentials of users roaming between heterogeneous networks, even when global connectivity is lost and some services are temporarily unreachable. Proof-of-concept implementations and testbed validation results demonstrate that strong security can be achieved for users and applications through the combination of traditional PKI services with a number of enhancements like: (i) dynamic and collaborative trust model, (ii) use of attribute certificates for privilege management, and (iii) modular architecture enabling nomadic mobility and enhanced with reconfiguration capabilities.
منابع مشابه
A Methodology for UICC- Based Security Services in Pervasive Fixed Mobile Convergence Systems
Nowadays, Fixed Mobile Convergence (FMC) is an emerging worldwide trend in the form of fixed and mobile telephony convergence. In this pervasive environment, security should be considered to be a more important factor than before because the security threats of heterogeneous infrastructures can happen simultaneously. Thus, UICC, the ideal and secure medium embedded on the mobile terminals, has ...
متن کاملPervasive geo-security - a lightweight triple-A approach to securing distributed geo-service infrastructures
Security has recently become a major concern in distributed geo-infrastructures for spatial data provision. Thus, a lightweight approach for securing distributed low-power environments such as geo-sensor networks is needed. The first part of this article presents a survey of current security mechanisms for authentication and authorisation. Based on this survey, a lightweight and scalable token-...
متن کاملArchitecting Adaptable Security Infrastructures for Pervasive Networks through Components
Security management in pervasive networks should be fundamentally flexible. The dynamic and heterogeneous character of these environments requires a security infrastructure which can be tailored to different operating conditions, at variable levels of granularity, during phases of design, deployment, and execution. This is possible with component-based security architecture. We illustrate the b...
متن کاملA Federated Authorization and Authentication Infrastructure for Unified Single Sign On
Currently federated authorization and authentication infrastructures are deployed to offer services to large groups of users while increasing the usability and scalability of the security architecture. Connection of domains using a variety of technologies brings new challenges and requires the utilization of standardized communication languages between these components. The presented architectu...
متن کاملSecurity Mechanisms for Mobile Agent Platforms Based on SPKI/SDSI Chains of Trust
This work defines a security scheme, based on SPKI/SDSI chains of trust, for protecting mobile agent platforms in large-scale distributed systems. The scheme is composed by a protocol of mutual authentication, a mobile agent authenticator and a mechanism for the generation of protection domain. Due to the flexibility of the SPKI/SDSI certificate delegation infrastructures used, the proposed sch...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Computers & Security
دوره 29 شماره
صفحات -
تاریخ انتشار 2010