Skip to main content

Hardware Security Concept for Spontaneous Network Integration of Mobile Devices

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2060))

Abstract

In this article we introduce an architecture of a mobile device that enables safe and authenticated data-transmission in a spontaneously configured network environment. The usage of this device is illustrated by a number of examples. The hardware and software components are presented. Particular, we compare Bluetooth and Infrared (IrDA) wireless networking technology, explain the usage of biometrics recognition methods, clarify the choice of the cryptographic module and consider possible platforms for the integration of this trustworthy device into a ubiquitous environment. Subsequently a first realization of the concept will be explained. Referring to feasible possibilities of realization, different attack scenarios together with appropriate solutions are considered.

Supported by Heinz-Nixdorf Stiftung

Research supported by the SPP “Sicherheit” of the German national research agency DFG

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Nikita Borisov, Ian Goldberg, and David Wagner. Intercepting mobile communications-the insecurity of 802.11. University Berkley, 2001.

    Google Scholar 

  2. F. Buchert, W. Bütow, P. Eschoholz, A. Polonsky, F. Quintero, and D. Tavangarian. Ubiquitous Internet and Intranet Access Using WLAN. In Proceeding of the Workshop on Ubiquitous Computing, International Conference on Parallel Architecture and Compilation Techniques, Philadelphia, 2000.

    Google Scholar 

  3. Bluetooth Consortium. Specification of the Bluetooth System Version 1.0B-Core. http://www.bluetooth.com, 2000.

  4. The Infrared Data Association IrDA. http://www.irda.org.

  5. M. Jakobsson and S. Wetzel. Security Weaknesses in Bluetooth. RSA Conference 2001, 2001.

    Google Scholar 

  6. Nico Maibaum and Clemens Cap. Javacards as Ubiquitous, Mobile and Multiserve Cards. 1st Pact 2000 Workshop on ubiquitous Computing, Philadelphia, USA, 15.-19. October 2000.

    Google Scholar 

  7. Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, and Michael Waidner. Trustworthy user devices. In Günter Müller and Kai Rannenberg, editor, Multilateral Security in Communications, pages 137–156. Addison-Wesley, 1999.

    Google Scholar 

  8. Jan Rabaey and et al. PicoRadio Supports Ad Hoc Ultra-Low Power Wireless Networking. IEEE Computer, pages 42–48, July 2000.

    Google Scholar 

  9. M. Schmalisch, H. Ploog, and D. Timmermann. SECOM: Sichere Online Verschlüsselung fuer ISDN Geräte. 35. Sitzung des Arbeitskreises Technische und organisatorische Datenschutzfragen der Konferenz der Datenschutzbeauftragten des Bundes und der Länder, Rostock, September 2000.

    Google Scholar 

  10. Bruce Schneier. Angewandte Kryptographie. Addison-Wesley, 1998.

    Google Scholar 

  11. Dave Suvak. IrDa and Bluetooth: A Complementary Comparison. http://www.palowireless.com/infotooth/download.asp, 2000.

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sedov, I., Haase, M., Cap, C., Timmermann, D. (2001). Hardware Security Concept for Spontaneous Network Integration of Mobile Devices. In: Böhme, T., Unger, H. (eds) Innovative Internet Computing Systems. IICS 2001. Lecture Notes in Computer Science, vol 2060. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48206-7_16

Download citation

  • DOI: https://doi.org/10.1007/3-540-48206-7_16

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42275-4

  • Online ISBN: 978-3-540-48206-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics