DocumentCode :
2543618
Title :
Security parallels between people and pervasive devices
Author :
Weis, Stephen A.
Author_Institution :
Comput. Sci. & Artificial Intelligence Lab., Massachusetts Inst. of Technol., Cambridge, MA, USA
fYear :
2005
fDate :
8-12 March 2005
Firstpage :
105
Lastpage :
109
Abstract :
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly relevant examples of resource-constrained systems are low-cost radio frequency identification (RFID) systems. Surprisingly, the computational abilities of low-cost pervasive devices like RFID tags are similar to another pervasive, weak computing "device": people. Neither low-cost pervasive devices nor people can efficiently perform public-key or even symmetric cryptographic operations. Neither can store long random strings nor devote too much time or energy to security protocols. Both may need to authenticate themselves over a public channel to an untrusted terminal, without any outside help or external devices. Because of these similarities, pervasive security may benefit by adapting techniques from human-computer security, or vice versa. This article treats RFID tags as a model for other low-cost pervasive devices, and describes some of their practical constraints. Several parallels between the pervasive and human-computer security settings are discussed. Finally, this article highlights one particular human-computer authentication protocol, due to Hopper and Blum, that is immediately adaptable to low-cost RFID. Borrowing techniques from Hopper and Blum, or other human-computer protocols could lead to practical pervasive security protocols.
Keywords :
authorisation; cryptography; radiofrequency identification; ubiquitous computing; RFID tags; human-computer authentication protocol; human-computer security; pervasive computing; pervasive devices; pervasive security protocols; public-key cryptographic operation; radiofrequency identification; resource-constrained systems; security parallels; symmetric cryptographic operation; Authentication; Conferences; Costs; Cryptography; Pervasive computing; Product codes; Protocols; RFID tags; Radiofrequency identification; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Pervasive Computing and Communications Workshops, 2005. PerCom 2005 Workshops. Third IEEE International Conference on
Print_ISBN :
0-7695-2300-5
Type :
conf
DOI :
10.1109/PERCOMW.2005.72
Filename :
1392811
Link To Document :
بازگشت