DocumentCode :
1455509
Title :
Identity and Security
Author :
Bellovin, Steven M.
Author_Institution :
Columbia Univ., New York, NY, USA
Volume :
8
Issue :
2
fYear :
2010
Firstpage :
88
Lastpage :
88
Abstract :
A strong identification system presupposes a strong notion of identity. The Internet, though, is multilayered; identity is different at each layer. My computer has three different MAC addresses and several IP addresses, including many IP addresses and logins for different instant message systems. If I switch computers, locations, or employers, several of these would change. Am I no longer myself? Sophistry, some would say; those could all be temporarily bound to my "real" identity. In that case, we already have pretty strong identification, in the combination of time stamp, IP address, and log files. Most online misbehavior comes from hacked machines; in turns, these machines have been hacked because of buggy code. Strong authentication is useful in many circumstances, but the bad guys don\´t have to go through the authentication system-they simply go around it. A strongly encrypted, strongly authenticated connection between a hacked machine and another target still lets the bad guys in, whereas identification does nothing but mislead the good guys. In other words, identification will be useful only when we don\´t need it because we\´ve solved the computer security problem.
Keywords :
Internet; computer crime; computer network security; IP addresses; Internet; MAC addresses; computer security problem; hacked machines; identification system; instant message systems; log files; online misbehavior; time stamp; Authentication; Computer security; Cryptography; Internet; Message systems; Switches; Internet security; identification; privacy;
fLanguage :
English
Journal_Title :
Security & Privacy, IEEE
Publisher :
ieee
ISSN :
1540-7993
Type :
jour
DOI :
10.1109/MSP.2010.71
Filename :
5439538
Link To Document :
بازگشت