Authentication for Pervasive Computing

  • Sadie Creese
  • Michael Goldsmith
  • Bill Roscoe
  • Irfan Zakiuddin
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2802)


Key management is fundamental to communications security, and for security in pervasive computing sound key management is particularly difficult. However, sound key management itself depends critically on sound authentication. In this paper we review current notions of entity authentication and discuss why we believe these notions are unsuitable for the pervasive domain. We then present our views on how notions of authentication should be revised to address the challenges of the pervasive domain, and some of the new research problems that will arise. We end with some brief thoughts on how our revised notions may be implemented and some of the problems that may be encountered.


Mesh Network Shared Secret Security Requirement Ubiquitous Computing Pervasive Computing 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Information Security Management (June 2002) (published by penton)Google Scholar
  2. 2.
    The Guardian Newspaper, 7th Spetember (2002)Google Scholar
  3. 3.
  4. 4.
  5. 5.
    Corner, M.D., Noble, B.D.: Zero-interaction authentication. In: The 8th ACM Conference on Mobile Computing and Networking, Atlanta, GA (September 2002)Google Scholar
  6. 6.
    Diffie, W., van Oorschot, P.C., Wiener, M.J.: Authentication and Authenticated Key Exchange. Design, Codes and Cryptography 2, 107–125 (1992)CrossRefGoogle Scholar
  7. 7.
    Roscoe, A.W.: Intensional Specifications of Security Protocols. In: Proceedings of the 1996 IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, Los Alamitos (1996)Google Scholar
  8. 8.
    Zimmerman, P.: The Official PGP Users Guide. MIT Press, Cambridge (1995)Google Scholar
  9. 9.
    Boyd, C.: Security Architectures Using Formal Methods. IEEE Journal on Selected Areas in Communications 11(5), 694–701 (1993)CrossRefGoogle Scholar
  10. 10.
    Maurer, U., Schmid, P.: A Calculus for Security Bootstrapping in Distributed Systems. Journal of Computer Security 4(1), 55–80 (1996)Google Scholar
  11. 11.
    Balfanz, D., Smetters, D.K., Stewart, P., Chi Wong, H.: Trusting Strangers: Authentication in Ad-hoc Wireless Networks. Network and Distributed Systems Security Symposium (2002), Available from
  12. 12.
    Stajano, F., Anderson, R.J.: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, Springer, Heidelberg (2000)Google Scholar
  13. 13.
    Asokan, N., Ginzboorg, P.: Key Agreement in Ad-hoc Networks. Computer Communication Review (2000), Available from
  14. 14.
  15. 15.
    Vigna, G.: Mobile Agents and Security. LNCS (July 1998)Google Scholar
  16. 16.
    Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing Robust and Ubiquitous Security Support for Mobile Ad-hoc Networks. In: Proceedings of 9th International Conference on Network Protocols, IEEE Computer Society Press, Los Alamitos (2001)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Sadie Creese
    • 1
  • Michael Goldsmith
    • 3
    • 4
  • Bill Roscoe
    • 2
    • 3
  • Irfan Zakiuddin
    • 1
  1. 1.QinetiQ Trusted Information ManagementMalvernUK
  2. 2.Oxford University Computing Laboratory 
  3. 3.Formal Systems (Europe) Ltd 
  4. 4.Worcester CollegeUniversity of Oxford 

Personalised recommendations