Pervasive Authentication and Authorization Infrastructures for Mobile Users

TitlePervasive Authentication and Authorization Infrastructures for Mobile Users
Publication TypeJournal Article
Year of Publication2010
AuthorsJ. Forne, F. Hinajeros, A. Marin, F. Almenarez, J. Lopez, J. A. Montenegro, M. Lacoste, and D. Diaz
JournalComputer and Security
Volume29
Pagination501-514
Publisherelsevier
ISSN Number0167-4048
Abstract

Network and device heterogeneity, nomadic mobility, intermittent connectivity and, more generally, extremely dynamic operating conditions, are major challenges in the design of security infrastructures for pervasive computing. Yet, in a ubiquitous computing environment, limitations of traditional solutions for authentication and authorization can be overcome with a pervasive public key infrastructure (pervasive-PKI). This choice allows the validation of credentials of users roaming between heterogeneous networks, even when global connectivity is lost and some services are temporarily unreachable. Proof-of-concept implementations and testbed validation results demonstrate that strong security can be achieved for users and applications through the combination of traditional PKI services with a number of enhancements like: (i) dynamic and collaborative trust model, (ii) use of attribute certificates for privilege management, and (iii) modular architecture enabling nomadic mobility and enhanced with reconfiguration capabilities.

DOI10.1016/j.cose.2009.09.001
Citation KeyJordiForne2009
Paper File: 
https://www.nics.uma.es/sites/default/files/papers/JordiForne2009.pdf

Supported by