Abstract
In this article we introduce an architecture of a mobile device that enables safe and authenticated data-transmission in a spontaneously configured network environment. The usage of this device is illustrated by a number of examples. The hardware and software components are presented. Particular, we compare Bluetooth and Infrared (IrDA) wireless networking technology, explain the usage of biometrics recognition methods, clarify the choice of the cryptographic module and consider possible platforms for the integration of this trustworthy device into a ubiquitous environment. Subsequently a first realization of the concept will be explained. Referring to feasible possibilities of realization, different attack scenarios together with appropriate solutions are considered.
Supported by Heinz-Nixdorf Stiftung
Research supported by the SPP “Sicherheit” of the German national research agency DFG
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Nikita Borisov, Ian Goldberg, and David Wagner. Intercepting mobile communications-the insecurity of 802.11. University Berkley, 2001.
F. Buchert, W. Bütow, P. Eschoholz, A. Polonsky, F. Quintero, and D. Tavangarian. Ubiquitous Internet and Intranet Access Using WLAN. In Proceeding of the Workshop on Ubiquitous Computing, International Conference on Parallel Architecture and Compilation Techniques, Philadelphia, 2000.
Bluetooth Consortium. Specification of the Bluetooth System Version 1.0B-Core. http://www.bluetooth.com, 2000.
The Infrared Data Association IrDA. http://www.irda.org.
M. Jakobsson and S. Wetzel. Security Weaknesses in Bluetooth. RSA Conference 2001, 2001.
Nico Maibaum and Clemens Cap. Javacards as Ubiquitous, Mobile and Multiserve Cards. 1st Pact 2000 Workshop on ubiquitous Computing, Philadelphia, USA, 15.-19. October 2000.
Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, and Michael Waidner. Trustworthy user devices. In Günter Müller and Kai Rannenberg, editor, Multilateral Security in Communications, pages 137–156. Addison-Wesley, 1999.
Jan Rabaey and et al. PicoRadio Supports Ad Hoc Ultra-Low Power Wireless Networking. IEEE Computer, pages 42–48, July 2000.
M. Schmalisch, H. Ploog, and D. Timmermann. SECOM: Sichere Online Verschlüsselung fuer ISDN Geräte. 35. Sitzung des Arbeitskreises Technische und organisatorische Datenschutzfragen der Konferenz der Datenschutzbeauftragten des Bundes und der Länder, Rostock, September 2000.
Bruce Schneier. Angewandte Kryptographie. Addison-Wesley, 1998.
Dave Suvak. IrDa and Bluetooth: A Complementary Comparison. http://www.palowireless.com/infotooth/download.asp, 2000.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sedov, I., Haase, M., Cap, C., Timmermann, D. (2001). Hardware Security Concept for Spontaneous Network Integration of Mobile Devices. In: Böhme, T., Unger, H. (eds) Innovative Internet Computing Systems. IICS 2001. Lecture Notes in Computer Science, vol 2060. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48206-7_16
Download citation
DOI: https://doi.org/10.1007/3-540-48206-7_16
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42275-4
Online ISBN: 978-3-540-48206-2
eBook Packages: Springer Book Archive