DocumentCode
770339
Title
The Resurrecting Duckling: security issues for ubiquitous computing
Author
Stajano, Frank ; Anderson, Ross
Author_Institution
Lab. for Commun. Eng., Cambridge Univ., UK
Volume
35
Issue
4
fYear
2002
fDate
4/1/2002 12:00:00 AM
Firstpage
22
Lastpage
26
Abstract
Imagine the future: hundreds of embedded computers per person, all cooperating via ad hoc wireless networks. What will the security implications be? Peer-to-peer and ubiquitous computing systems involve many principals, but their network connectivity is intermittent and not guaranteed. Traditional approaches to authentication, from Kerberos to public-key certificates, are therefore unworkable, because they rely on online connectivity to an authentication or revocation server. The paper considers new solutions. It discusses the Resurrecting Duckling security policy model. The traditional taxonomy of security threats identifies three main classes which are considered: confidentiality, integrity or availability
Keywords
data integrity; data privacy; security of data; telecommunication security; Resurrecting Duckling security policy model; ad hoc wireless networks; authentication; availability; data confidentiality; data integrity; data security; embedded computers; peer-to-peer; ubiquitous computing; Authentication; Computer networks; Embedded computing; Network servers; Peer to peer computing; Pervasive computing; Public key; Security; Ubiquitous computing; Wireless networks;
fLanguage
English
Journal_Title
Computer
Publisher
ieee
ISSN
0018-9162
Type
jour
DOI
10.1109/MC.2002.1012427
Filename
1012427
Link To Document