Skip to main content

PryGuard: A Secure Distributed Authentication Protocol for Pervasive Computing Environment

  • Conference paper
  • 1043 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 6703))

Abstract

Handheld devices have become so commonplace nowadays that they are an integral part of our everyday life. Proliferation of these mobile handheld devices equipped with wide range of capabilities has bolstered widespread popularity of pervasive computing applications. In such applications many devices interact with each other by forming ad hoc wireless networks. The necessity of such unavoidable inter-device dependency along with volatile nature of connectivity and the lack of a fixed infrastructure for authentication and authorization, devices are susceptible and vulnerable to malicious active and passive snoopers. If a device registers a malicious device as its valid neighbor, the security and privacy of entire system might be jeopardized. Such sensitivity to malevolent activity necessitates the need for a robust mechanism to maintain a list of valid devices that will help to prevent malicious devices from authenticating successfully. In this paper, we present the feasibility of using a decentralized protocol in order to prevent malicious devices from participating illicitly into the ad hoc networks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hopper, N., Blum, M.: A secure human computer authentication scheme., Carnegie Mellon Univ., Pittsburgh, PA, Tech. Rep. CMU-CS-00-139 (2000)

    Google Scholar 

  2. Hopper, N.J., Blum, M.: Secure human identification protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 52–66. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  3. Weiser, M.: Some computer problems in ubiquitous computing. Communications of the ACM 36(7), 75–84 (1993)

    Article  Google Scholar 

  4. Eronen, P., Nikander, P.: Decentralized Jini security. In: Proceedings of the Network. Distributed. System Security Symposium, San Diego, CA (February 2001)

    Google Scholar 

  5. Hewlett Packard CoolTown (2008), http://cooltown.hp.com

  6. UC Berkeley. The Ninja Project: Enabling internet scale services from arbitrarily small devices (2008), http://ninja.cs.berkeley.edu

  7. Balazinska, M., Balakrishnan, H., Karger, D.: INS/Twine: A scalable peer-to-peer architecture for intentional resource discovery. In: Proceedings of the International Conference on Pervasive Computing, Zurich, Switzerland (2002)

    Google Scholar 

  8. Adjie-Winoto, W., Schwartz, E., Balakrishnan, H., Lilley, J.: The design and implementation of an intentional naming system. In: Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP 1999), Kiawah Island, SC (1999)

    Google Scholar 

  9. Nidd, M.: Service discovery in DEAPspace. IEEE Pers. Communications 8(4), 39–45 (2001)

    Article  Google Scholar 

  10. Guttman, E., Perkins, C., Veizades, J.: Service location protocol. Version 2, http://www.ietf.org/rfc/rfc2608.txt

  11. The Salutation Consortium, Inc. Salutation architecture specification (1999), http://ftp.salutation.org/salute/sa20e1a21.ps

  12. Czerwinski, S., Zhao, B.Y., Hodes, T., Joseph, A., Katz, R.: An architecture for a secure service discovery service. In: Procedings of the 5th Annual International Conference on Mobile Computing Networks (MobiCom 1999), Seattle, WA (1999)

    Google Scholar 

  13. Popovski, P., Kozlova, T., Gavrilovska, L., Prasad, R.: Device discovery in short-range wireless ad hoc networks. IEEE Networks 3, 1361–1365 (2002)

    Google Scholar 

  14. Zaruba, G.V., Gupta, V.: Simplified Bluetooth device discovery— Analysis and simulation. In: Proceedings of the 37th Hawaii International Conference on Systems Sciences, pp. 307–315 (January 2004)

    Google Scholar 

  15. Ferraguto, F., Mambrini, G., Panconesi, A., Petrioli, C.: A newapproach to device discovery and scatternet formation in Bluetooth networks. In: Proceedings of the 18th International Parallel Distributed Process. Symposium, pp. 221–228 (April 2004)

    Google Scholar 

  16. Zaruba, G.V., Chlamtac, I.: Accelerating Bluetooth inquiry for personal area networks. In: Proceedings of IEEE Global Telecommunication Conference, vol. 2, pp. 702–706 (December 2003)

    Google Scholar 

  17. Sohrabi, K., Gao, J., Ailawadhi, V., Pottie, G.J.: Protocols for selforganization of a wireless sensor network. Proceedings of IEEE Pers. Communication 7(5), 16–27 (2000)

    Article  Google Scholar 

  18. Universal Plug and Play Forum. About universal plug and playtechnology (2008), http://www.upnp.org/about/default.asp#technology

  19. Universal Plug and Play. Understanding universal plug and play: A white paper (June 2000), http://upnp.org/resources/whitepapers.asp

  20. Sun Microsystems. Jini network technology (2008), http://www.sun.com/jini

  21. Sun Microsystems. The community resource for Jini technology (2008), http://www.jini.org

  22. Dobrev, P., Famolari, D., Kurzke, C., Miller, B.: Device and service discovery in home networks with OSGI. Proceedings of IEEE Communications Magazine 40(8), 86–92 (2002)

    Article  Google Scholar 

  23. Satyanarayanan, M.: Fundamental challenges in mobile computing. In: Proceedings of 15th ACM Symposium on Principles of Distributed Computing, pp. 1–7 (May 1996)

    Google Scholar 

  24. Weis, S.A.: Security parallels between people and pervasive devices. In: Proceedings of 3rd IEEE International Conference on Pervasive Computing Communications Workshops, pp. 105–109 (2005)

    Google Scholar 

  25. Juels, A., Weis, S.A.: Authenticating pervasive devices with human protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 293–308. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  26. Sharmin, M., Ahmed, S., Ahamed, S.I.: An adaptive lightweight trust reliant secure resource discovery for pervasive computing environments. In: Proc. of PerCom 2006, Pisa, Italy, pp. 258–263 (2006)

    Google Scholar 

  27. Haque, M., Ahamed, S.I.: An Impregnable Lightweight Device Discovery (ILDD) Model for the Pervasive Computing Environment of Enterprise Applications. IEEE Transactions on Systems, Man, and Cybernetics 38(3), 334–346 (2008)

    Article  Google Scholar 

  28. Sharmin, M., Ahmed, S., Ahamed, S.I.: MARKS (middleware adaptability for resource discovery, knowledge usability and self-healing) in pervasive computing environments. In: Proc. of 3rd Int. Conf. Inf. Technol.: New Gen, pp. 306–313 (April 2006)

    Google Scholar 

  29. Ahmed, S., Sharmin, M., Ahamed, S.I.: Knowledge usability and its characteristics for pervasive computing. In: Proc. 2005 Int. Conf. pervasive Syst. Computing (PSC 2005), Las Vegas, NV, pp. 206–209 (2005)

    Google Scholar 

  30. Sharmin, M., Ahmed, S., Ahamed, S.I.: SAFE-RD (Secure, adaptive, fault tolerant, and efficient resource discovery). in pervasive computing environments. In: Proc. IEEE Int. Conf. Inf. Technol (ITCC 2005), Las Vegas, NV, pp. 271–276 (2005)

    Google Scholar 

  31. Ahmed, S., Sharmin, M., Ahamed, S.I.: GETS (Generic, efficient, transparent and secured) self-healing service for pervasive computing application. Proceedings of International Journal of Network Security 4(3), 271–281 (2007)

    Google Scholar 

  32. Carminati, B., Ferrari, E., Hung, P.C.K.: Web services composition: A security perspective. In: Proceedings of the 21st Int. Conference on Data Engineering (ICDE 2005), Japan, April 8–9 (2005)

    Google Scholar 

  33. Martin, M.V., Hung, P.C.K.: Toward a security policy for VoIP applications. In: Proceedings of the 18th Annual Can. Conf. Electr. Comput. Eng (CCECE 2005), Saskatoon, SK, Canada (May 2005)

    Google Scholar 

  34. Aleksy, M., Schader, M., Tapper, C.: Interoperability and interchangeability of middleware components in a three-tier CORBA-environmentstate of the art. In: Proc. 3rd Int. Conf. Enterprise Distrib. Object Comput (EDOC 1999), pp. 204–213 (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hasan, C., Adibuzzaman, M., Kawsar, F., Haque, M., Ahamed, S.I. (2011). PryGuard: A Secure Distributed Authentication Protocol for Pervasive Computing Environment. In: Mehrotra, K.G., Mohan, C.K., Oh, J.C., Varshney, P.K., Ali, M. (eds) Modern Approaches in Applied Intelligence. IEA/AIE 2011. Lecture Notes in Computer Science(), vol 6703. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21822-4_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21822-4_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21821-7

  • Online ISBN: 978-3-642-21822-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics