Hierarchical trustworthy authentication for pervasive computing

Xiao, Hannan, Malcolm, James A., Christianson, Bruce and Zhang, Ying ORCID: https://orcid.org/0000-0002-6669-1671 (2007) Hierarchical trustworthy authentication for pervasive computing. In: The 4th Annual International Conference on Mobile and Ubiquitous System: Computing, Networking and Services, 6-10 August 2007, Philadelphia, USA.

[thumbnail of Author-Accepted-Version.pdf]
Author-Accepted-Version.pdf - Accepted Version

Download (268kB) | Preview


Conventional entity authentication is not enough to build a secure pervasive computing environment. Being sure that you are talking to the expected entity does not guarantee it is going to do what you expect him to do, and only that. This paper introduces a concept of “trustworthy authentication” in pervasive computing which is defined as entity authentication accompanied by an assurance of trustworthy behaviour of the authenticated entity. It discusses how to provide trustworthy authentication in pervasive computing using the example of a roaming customer wishing to print his email on a public printer. A two-level hierarchical trustworthy authentication scheme is proposed where local and higher-level authorization servers issue trustworthiness certificates after receiving trustworthiness records from the printer, signed by its users. The proposed scheme may be generalized for trustworthy authentication of security devices such as firewalls.

Item Type: Conference or Workshop Item (Paper)
ISBN: 9781424410248
Identifier: 10.1109/MOBIQ.2007.4450993
Page Range: pp. 1-3
Identifier: 10.1109/MOBIQ.2007.4450993
Additional Information: © 2007 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Keywords: Pervasive Computing, Ubiquitous Computing, Trustworthy authentication, Public Key Infrastructure
Subjects: Computing > Information security > Cyber security
Computing > Information security
Related URLs:
Depositing User: Ying Zhang
Date Deposited: 16 Jul 2019 16:50
Last Modified: 28 Aug 2021 07:27
URI: https://repository.uwl.ac.uk/id/eprint/6259


Downloads per month over past year

Actions (login required)

View Item View Item