Title :
Designing Security Protocols Adapted to the Constraints of Mobile Environments
Author :
Kamel, M. ; Boudaoud, K. ; Lequeux, S. ; Riveill, M.
Author_Institution :
RAINBOW-I3S Lab., Univ. of Nice-Sophia Antipolis, Sophia Antipolis, France
Abstract :
Within a mobile environment, communications may necessitate different security properties depending on the sensitivity of the data exchanged. A protocol such as HTTPS that uses the Secure Socket Layer/Transport Layer Security (SSL/TLS) may offer these properties, but it is known that SSL/TLS is high-energy consuming and the properties are provided as a block, which may have an important impact on the battery life of the mobile devices. In this paper, we propose to build security protocols from software security components offering each one a security property. By externalizing the security functionalities and adapting the security level to the users´ needs, we are providing a security management architecture adapted to mobile environments. A proof of concept is provided based on the XMPP protocol.
Keywords :
mobile communication; mobile computing; protocols; security of data; telecommunication security; HTTPS; XMPP protocol; communication security; mobile environments; secure socket layer; security protocols; software security; transport layer security; SCA; secure protocols; security components; security policies;
Conference_Titel :
Embedded and Ubiquitous Computing (EUC), 2010 IEEE/IFIP 8th International Conference on
Conference_Location :
Hong Kong
Print_ISBN :
978-1-4244-9719-5
Electronic_ISBN :
978-0-7695-4322-2
DOI :
10.1109/EUC.2010.100