DocumentCode
2991085
Title
Hierarchical Trustworthy Authentication for Pervasive Computing
Author
Xiao, Hannan ; Malcolm, James A. ; Christianson, Bruce ; Zhang, Ying
Author_Institution
Univ. of Hertfordshire, Hatfield
fYear
2007
fDate
6-10 Aug. 2007
Firstpage
1
Lastpage
3
Abstract
Conventional entity authentication is not enough to build a secure pervasive computing environment. Being sure that you are talking to the expected entity does not guarantee it is going to do what you expect him to do, and only that. This paper introduces a concept of "trustworthy authentication" in pervasive computing which is defined as entity authentication accompanied by an assurance of trustworthy behaviour of the authenticated entity. It discusses how to provide trustworthy authentication in pervasive computing using the example of a roaming customer wishing to print his email on a public printer. A two-level hierarchical trustworthy authentication scheme is proposed where local and higher-level authorization servers issue trustworthiness certificates after receiving trustworthiness records from the printer, signed by its users. The proposed scheme may be generalized for trustworthy authentication of security devices such as firewalls.
Keywords
message authentication; telecommunication security; ubiquitous computing; entity authentication; hierarchical trustworthy authentication; higher-level authorization servers; secure pervasive computing environment; security devices; trustworthy behaviour; Authentication; Authorization; Communication system security; Computer science; Data security; Educational institutions; Pervasive computing; Printers; Printing; Roaming;
fLanguage
English
Publisher
ieee
Conference_Titel
Mobile and Ubiquitous Systems: Networking & Services, 2007. MobiQuitous 2007. Fourth Annual International Conference on
Conference_Location
Philadelphia, PA
Print_ISBN
978-1-4244-1024-8
Electronic_ISBN
978-1-4244-1025-5
Type
conf
DOI
10.1109/MOBIQ.2007.4450993
Filename
4450993
Link To Document