Secure pervasive computing without a Trusted Third Party

6Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The miniaturization of computing devices and the need for ubiquitous communication has augmented the demand for pervasive computing. Security demands that all devices in a pervasive system must be able to authenticate each other and communicate in a secure manner. This is usually achieved through a Trusted Third Party like a Public Key Infrastructure (PKI) or a Key Distribution Centre (KDC). The establishment of such an entity in such a dynamic environment is neither feasible nor pragmatic. In this paper we present a novel mechanism for authentication and key exchange that can operate seamlessly in pervasive computing environments without the presence of a Trusted Third Party. The proposed scheme has minimal computational requirements, which makes it most suitable for devices with limited resources.

Cite

CITATION STYLE

APA

Pirzada, A. A., & McDonald, C. (2004). Secure pervasive computing without a Trusted Third Party. In Proceedings - The IEEE/ACS International Conference on Pervasive Services, ICPS2004 (p. 240). https://doi.org/10.1109/perser.2004.28

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free