Title :
Security in mobile systems
Author :
Subramanyam, V. ; Joshi, A.
Author_Institution :
Dept. of Comput. Eng. & Comput. Sci., Missouri Univ., Columbia, MO, USA
Abstract :
Mobile computing has become popular over the last few years. Users need to have continuous access to information even when they are mobile, e.g., a doctor may need to constantly monitor a patient´s health or a stock broker may need periodic information about the stock market, etc. Communication in such cases is typically over wireless links and it becomes critical to ensure secure message exchange. The traditional goals of secure computing have been to achieve confidentiality, integrity, availability, legitimacy and accountability. Messages exchanged between two hosts are usually coded by using symmetric or asymmetric ciphers, which makes it difficult for them to be seen by an outsider. This paper discusses issues concerned with mobility in a network and extensions of existing security schemes.
Keywords :
data privacy; mobile computing; security of data; wireless LAN; accountability; asymmetric ciphers; data availability; data confidentiality; data integrity; information access; legitimacy; mobile computing; mobile systems security; secure message exchange; symmetric ciphers; wireless links; Authentication; Communication system security; Computer science; Computer security; Mobile communication; Mobile computing; Network servers; Patient monitoring; Protocols; Stock markets;
Conference_Titel :
Reliable Distributed Systems, 1998. Proceedings. Seventeenth IEEE Symposium on
Conference_Location :
West Lafayette, IN, USA
Print_ISBN :
0-8186-9218-9
DOI :
10.1109/RELDIS.1998.740532