Embedding Distance-Bounding Protocols within Intuitive Interactions

  • Laurent Bussard
  • Yves Roudier
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2802)


Although much research was conducted on devising intuitive interaction paradigms with pervasive computing devices, it has not been realized that authentication, an important need in this context, has a strong impact on the ease of use. More specifically, distance-bounding protocols are necessary in some of the most interesting scenarios in pervasive computing. This article describes a drag-and-drop interaction paradigm that enables strong authentication by embedding such a protocol within personal authentication tokens. This article also discusses how this paradigm can be used as the basis for performing user-friendly pervasive multi-party secure interactions.


Access Control Smart Card Mutual Authentication Pervasive Computing Trusted Third Party 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Brands, S., Chaum, D.: Distance-bounding protocols (extended abstract). In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344–359. Springer, Heidelberg (1994)Google Scholar
  2. 2.
    Bussard, L., Roudier, Y.: Authentication in Ubiquitous Computing. In: Ubicomp 2002,Workshop on Security in Ubiquitous Computing (September 2002)Google Scholar
  3. 3.
    Covington, M.J., Moyer, M.J., Ahamad, M.: Generalized Role-Based Access Control for Securing Future Applications. In: 23rd National Information Systems Security Conference (2000)Google Scholar
  4. 4.
    Holmquist, L.E., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M., Gellersen, H.W.: Smart- Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, p. 116. Springer, Heidelberg (2001)Google Scholar
  5. 5.
    Kagal, L., Finin, T., Joshi, A.: Trust-Based Security in Pervasive Computing Environments. IEEE Computer 24(12), 154–157 (2001)Google Scholar
  6. 6.
    Kahn, J.M., Katz, R.H., Pister, K.S.J.: Next Century Challenges: Mobile Networking for ’Smart Dust’. In: MOBICOM, pp. 271-278 (1999)Google Scholar
  7. 7.
    Kindberg, T., Zhang, K., Shankar, N.: Context authentication using constrained channels. In: Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), June 2002, pp. 14–21 (2002)Google Scholar
  8. 8.
    Langheinrich, M.: Privacy by design- principles of privacy-aware ubiquitous systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 273–291. Springer, Heidelberg (2001)Google Scholar
  9. 9.
    Meloan S.: Inside the Java Ring event,
  10. 10.
    NetworkWorking Group: Request for Comments 2693: SPKI Certificate Theory (September 1999)Google Scholar
  11. 11.
    Pfitzmann A., Köhntopp M.: Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology. In: Workshop on Design Issues in Anonymity and Unobservability (2000) Google Scholar
  12. 12.
    Richard, G.G.: Service Advertisement and Discovery: Enabling Universal Device Cooperation. IEEE Internet Computing 4(5) (September/October 2000)Google Scholar
  13. 13.
    Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad-hocWireless Networks. In: 7th International Workshop on Security Protocols Proceedings (1999)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Laurent Bussard
    • 1
  • Yves Roudier
    • 1
  1. 1.Institut Eurecom, Corporate CommunicationsSophia AntipolisFrance

Personalised recommendations