Skip to main content
Top

2004 | OriginalPaper | Chapter

Authentication for Pervasive Computing

Authors : Sadie Creese, Michael Goldsmith, Bill Roscoe, Irfan Zakiuddin

Published in: Security in Pervasive Computing

Publisher: Springer Berlin Heidelberg

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Key management is fundamental to communications security, and for security in pervasive computing sound key management is particularly difficult. However, sound key management itself depends critically on sound authentication. In this paper we review current notions of entity authentication and discuss why we believe these notions are unsuitable for the pervasive domain. We then present our views on how notions of authentication should be revised to address the challenges of the pervasive domain, and some of the new research problems that will arise. We end with some brief thoughts on how our revised notions may be implemented and some of the problems that may be encountered.

Metadata
Title
Authentication for Pervasive Computing
Authors
Sadie Creese
Michael Goldsmith
Bill Roscoe
Irfan Zakiuddin
Copyright Year
2004
Publisher
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-540-39881-3_12

Premium Partner