The Community for Technology Leaders
Proceedings. The IEEE/ACS International Conference on Pervasive Services (2004)
Beirut, Lebanon
July 23, 2004 to July 23, 2004
ISBN: 0-7803-8577-2
pp: 240
A.A. Pirzada , Sch. of Comput. Sci. & Software Eng., Western Australia Univ., Australia
C. McDonald , Sch. of Comput. Sci. & Software Eng., Western Australia Univ., Australia
ABSTRACT
The miniaturization of computing devices and the need for ubiquitous communication has augmented the demand for pervasive computing. Security demands that all devices in a pervasive system must be able to authenticate each other and communicate in a secure manner. This is usually achieved through a trusted third party like a public key infrastructure (PKI) or a key distribution centre (KDC). The establishment of such an entity in such a dynamic environment is neither feasible nor pragmatic. In this paper we present a novel mechanism for authentication and key exchange that can operate seamlessly in pervasive computing environments without the presence of a trusted third party. The proposed scheme has minimal computational requirements, which makes it most suitable for devices with limited resources.
INDEX TERMS
ubiquitous computing, authorisation, telecommunication security
CITATION

A. Pirzada and C. McDonald, "Secure pervasive computing without a trusted third party," Proceedings. The IEEE/ACS International Conference on Pervasive Services(PERSER), Beirut, Lebanon, , pp. 240.
doi:10.1109/PERSER.2004.1356812
84 ms
(Ver 3.3 (11022016))