The master key: A private authentication approach for pervasive computing environments

被引:0
|
作者
Zhu, Feng [1 ]
Mutka, Matt W. [1 ]
Ni, Lionel M. [2 ]
机构
[1] Michigan State Univ, Dept Comp Sci & Engr, E Lansing, MI 48824 USA
[2] Hong Kong Univ Sci & Technol, Dept Comp Sci, Kowloon, Hong Kong, Peoples R China
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose a novel entity authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital forms of access tokens for entity authentication. The Master Key discovers and selects proper tokens for its owner. With an emphasis on usability, the Master Key secures authentication, protects privacy information from outsiders and insiders, and supports various claimant-verifier relations. We analyze privacy and security properties of our approach and protocols, and we investigate the overhead. Performance measurements show that our protocols are efficient.
引用
收藏
页码:212 / +
页数:2
相关论文
共 50 条
  • [1] Active Authentication for pervasive computing environments
    Matsumiya, K
    Aoki, S
    Murase, M
    Tokuda, H
    [J]. SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 28 - 41
  • [2] Practical deniable authentication for pervasive computing environments
    Li, Fagen
    Hong, Jiaojiao
    Omala, Anyembe Andrew
    [J]. WIRELESS NETWORKS, 2018, 24 (01) : 139 - 149
  • [3] Practical deniable authentication for pervasive computing environments
    Fagen Li
    Jiaojiao Hong
    Anyembe Andrew Omala
    [J]. Wireless Networks, 2018, 24 : 139 - 149
  • [4] Private and Secure Service Discovery via Progressive Approach in Pervasive Computing Environments
    Durga, S.
    Salaja, S.
    [J]. ICCN: 2008 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING, 2008, : 71 - 77
  • [5] Authentication-based access control approach for enhancing security in pervasive computing environments
    Gnaneshwari, G. R.
    Hema, M. S.
    Lingareddy, S. C.
    [J]. INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2023, 19 (02) : 211 - 232
  • [6] Secure and Private Service Discovery in Pervasive Computing Environments
    Zhu, Feng
    Zhu, Wei
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2009, 3 (03) : 107 - 122
  • [7] Authentication for pervasive computing
    Creese, S
    Goldsmith, M
    Roscoe, B
    Zakiuddin, I
    [J]. SECURITY IN PERVASIVE COMPUTING, 2004, 2802 : 116 - 129
  • [8] A Pervasive Computing Approach in Medical Emergency Environments
    Thierry, J.
    Hafner, C.
    Grasser, S.
    [J]. 11TH MEDITERRANEAN CONFERENCE ON MEDICAL AND BIOLOGICAL ENGINEERING AND COMPUTING 2007, VOLS 1 AND 2, 2007, 16 (1-2): : 1058 - 1061
  • [9] Authentication and key distribution methods in mobile computing environments
    Zhang, B
    Wu, JX
    [J]. 2003 INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND MOBILE COMPUTING, PROCEEDINGS, 2003, : 353 - 356
  • [10] Fair authentication in pervasive computing
    Li, Jun
    Christianson, Bruce
    Loomes, Martin
    [J]. SECURE MOBILE AD-HOC NETWORKS AND SENSORS, 2006, 4074 : 132 - 143