• DocumentCode
    770339
  • Title

    The Resurrecting Duckling: security issues for ubiquitous computing

  • Author

    Stajano, Frank ; Anderson, Ross

  • Author_Institution
    Lab. for Commun. Eng., Cambridge Univ., UK
  • Volume
    35
  • Issue
    4
  • fYear
    2002
  • fDate
    4/1/2002 12:00:00 AM
  • Firstpage
    22
  • Lastpage
    26
  • Abstract
    Imagine the future: hundreds of embedded computers per person, all cooperating via ad hoc wireless networks. What will the security implications be? Peer-to-peer and ubiquitous computing systems involve many principals, but their network connectivity is intermittent and not guaranteed. Traditional approaches to authentication, from Kerberos to public-key certificates, are therefore unworkable, because they rely on online connectivity to an authentication or revocation server. The paper considers new solutions. It discusses the Resurrecting Duckling security policy model. The traditional taxonomy of security threats identifies three main classes which are considered: confidentiality, integrity or availability
  • Keywords
    data integrity; data privacy; security of data; telecommunication security; Resurrecting Duckling security policy model; ad hoc wireless networks; authentication; availability; data confidentiality; data integrity; data security; embedded computers; peer-to-peer; ubiquitous computing; Authentication; Computer networks; Embedded computing; Network servers; Peer to peer computing; Pervasive computing; Public key; Security; Ubiquitous computing; Wireless networks;
  • fLanguage
    English
  • Journal_Title
    Computer
  • Publisher
    ieee
  • ISSN
    0018-9162
  • Type

    jour

  • DOI
    10.1109/MC.2002.1012427
  • Filename
    1012427