Title :
The Resurrecting Duckling: security issues for ubiquitous computing
Author :
Stajano, Frank ; Anderson, Ross
Author_Institution :
Lab. for Commun. Eng., Cambridge Univ., UK
fDate :
4/1/2002 12:00:00 AM
Abstract :
Imagine the future: hundreds of embedded computers per person, all cooperating via ad hoc wireless networks. What will the security implications be? Peer-to-peer and ubiquitous computing systems involve many principals, but their network connectivity is intermittent and not guaranteed. Traditional approaches to authentication, from Kerberos to public-key certificates, are therefore unworkable, because they rely on online connectivity to an authentication or revocation server. The paper considers new solutions. It discusses the Resurrecting Duckling security policy model. The traditional taxonomy of security threats identifies three main classes which are considered: confidentiality, integrity or availability
Keywords :
data integrity; data privacy; security of data; telecommunication security; Resurrecting Duckling security policy model; ad hoc wireless networks; authentication; availability; data confidentiality; data integrity; data security; embedded computers; peer-to-peer; ubiquitous computing; Authentication; Computer networks; Embedded computing; Network servers; Peer to peer computing; Pervasive computing; Public key; Security; Ubiquitous computing; Wireless networks;
DOI :
10.1109/MC.2002.1012427