DocumentCode :
1566371
Title :
Applications of delegation schemes for securing future reconfigurable terminals
Author :
Chan Yeob Yeun ; Kalogridis, Georgios ; Clemo, Gary
Author_Institution :
Toshiba Telecommun. Res. Lab., Toshiba Res. Eur., Bristol, UK
Volume :
3
fYear :
2003
Firstpage :
1536
Abstract :
The main goal of this paper is to address applications of secure mobile delegation for future reconfigurable terminals. Additionally, a general overview will be given on distributed reconfigurable mobile terminals in a personal area network (PAN) context. The PAN may include a number of mobile devices, which need to exchange information with each other and with their users; technologies such as Bluetooth, IrDA and WLAN could be employed. Thus, secure data transfer will be needed for properties such as confidentiality, integrity, authentication, and non-repudiation of data. However, the ability of a device to reconfigure raises a number of security issues that will need to be addressed in order to realize the potential of the reconfigurable domain. A highly distributed environment suggests the requirement for security delegation techniques. Additionally, threats increase from malicious software such as viruses, Trojan horses and worms. One can employ secure mobile delegation for securing software upgrades in reconfigurable terminals, from high-level applications and system software, such as ring tones, down to lower-layer baseband modules. With our novel delegation schemes we show that it is possible to maintain end-to-end accountability and at the same time have compact and lightweight cascade characteristics. This has been further enhanced with our innovative security mechanism that can be automatically optimized in various environments These characteristics make our protocols suitable for ubiquitous environment as well as for diverse personalized services and future reconfigurable terminals.
Keywords :
data communication; mobile agents; mobile radio; optimisation; personal communication networks; protocols; security of data; telecommunication computing; telecommunication security; telecommunication services; Bluetooth; IrDA; WLAN; data transfer security; delegation scheme; end-to-end accountability; information exchange; innovative security mechanism; lightweight cascade characteristic; malicious software; mobile delegation security; mobile devices; personal area network; protocols; reconfigurable mobile terminals; security delegation techniques; Application software; Authentication; Bluetooth; Computer viruses; Data security; Information security; Invasive software; Personal area networks; System software; Wireless LAN;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Vehicular Technology Conference, 2003. VTC 2003-Spring. The 57th IEEE Semiannual
ISSN :
1090-3038
Print_ISBN :
0-7803-7757-5
Type :
conf
DOI :
10.1109/VETECS.2003.1207078
Filename :
1207078
Link To Document :
بازگشت