Skip to main content

Embedding Distance-Bounding Protocols within Intuitive Interactions

  • Conference paper
Security in Pervasive Computing

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2802))

Abstract

Although much research was conducted on devising intuitive interaction paradigms with pervasive computing devices, it has not been realized that authentication, an important need in this context, has a strong impact on the ease of use. More specifically, distance-bounding protocols are necessary in some of the most interesting scenarios in pervasive computing. This article describes a drag-and-drop interaction paradigm that enables strong authentication by embedding such a protocol within personal authentication tokens. This article also discusses how this paradigm can be used as the basis for performing user-friendly pervasive multi-party secure interactions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Brands, S., Chaum, D.: Distance-bounding protocols (extended abstract). In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344–359. Springer, Heidelberg (1994)

    Google Scholar 

  2. Bussard, L., Roudier, Y.: Authentication in Ubiquitous Computing. In: Ubicomp 2002,Workshop on Security in Ubiquitous Computing (September 2002)

    Google Scholar 

  3. Covington, M.J., Moyer, M.J., Ahamad, M.: Generalized Role-Based Access Control for Securing Future Applications. In: 23rd National Information Systems Security Conference (2000)

    Google Scholar 

  4. Holmquist, L.E., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M., Gellersen, H.W.: Smart- Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, p. 116. Springer, Heidelberg (2001)

    Google Scholar 

  5. Kagal, L., Finin, T., Joshi, A.: Trust-Based Security in Pervasive Computing Environments. IEEE Computer 24(12), 154–157 (2001)

    Google Scholar 

  6. Kahn, J.M., Katz, R.H., Pister, K.S.J.: Next Century Challenges: Mobile Networking for ’Smart Dust’. In: MOBICOM, pp. 271-278 (1999)

    Google Scholar 

  7. Kindberg, T., Zhang, K., Shankar, N.: Context authentication using constrained channels. In: Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), June 2002, pp. 14–21 (2002)

    Google Scholar 

  8. Langheinrich, M.: Privacy by design- principles of privacy-aware ubiquitous systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 273–291. Springer, Heidelberg (2001)

    Google Scholar 

  9. Meloan S.: Inside the Java Ring event, http://java.sun.com/features/1998/07/ringproject.html

  10. NetworkWorking Group: Request for Comments 2693: SPKI Certificate Theory (September 1999)

    Google Scholar 

  11. Pfitzmann A., Köhntopp M.: Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology. In: Workshop on Design Issues in Anonymity and Unobservability (2000)

    Google Scholar 

  12. Richard, G.G.: Service Advertisement and Discovery: Enabling Universal Device Cooperation. IEEE Internet Computing 4(5) (September/October 2000)

    Google Scholar 

  13. Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad-hocWireless Networks. In: 7th International Workshop on Security Protocols Proceedings (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bussard, L., Roudier, Y. (2004). Embedding Distance-Bounding Protocols within Intuitive Interactions. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds) Security in Pervasive Computing. Lecture Notes in Computer Science, vol 2802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39881-3_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-39881-3_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20887-7

  • Online ISBN: 978-3-540-39881-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics