Abstract
Handheld devices have become so commonplace nowadays that they are an integral part of our everyday life. Proliferation of these mobile handheld devices equipped with wide range of capabilities has bolstered widespread popularity of pervasive computing applications. In such applications many devices interact with each other by forming ad hoc wireless networks. The necessity of such unavoidable inter-device dependency along with volatile nature of connectivity and the lack of a fixed infrastructure for authentication and authorization, devices are susceptible and vulnerable to malicious active and passive snoopers. If a device registers a malicious device as its valid neighbor, the security and privacy of entire system might be jeopardized. Such sensitivity to malevolent activity necessitates the need for a robust mechanism to maintain a list of valid devices that will help to prevent malicious devices from authenticating successfully. In this paper, we present the feasibility of using a decentralized protocol in order to prevent malicious devices from participating illicitly into the ad hoc networks.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Hopper, N., Blum, M.: A secure human computer authentication scheme., Carnegie Mellon Univ., Pittsburgh, PA, Tech. Rep. CMU-CS-00-139 (2000)
Hopper, N.J., Blum, M.: Secure human identification protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 52–66. Springer, Heidelberg (2001)
Weiser, M.: Some computer problems in ubiquitous computing. Communications of the ACM 36(7), 75–84 (1993)
Eronen, P., Nikander, P.: Decentralized Jini security. In: Proceedings of the Network. Distributed. System Security Symposium, San Diego, CA (February 2001)
Hewlett Packard CoolTown (2008), http://cooltown.hp.com
UC Berkeley. The Ninja Project: Enabling internet scale services from arbitrarily small devices (2008), http://ninja.cs.berkeley.edu
Balazinska, M., Balakrishnan, H., Karger, D.: INS/Twine: A scalable peer-to-peer architecture for intentional resource discovery. In: Proceedings of the International Conference on Pervasive Computing, Zurich, Switzerland (2002)
Adjie-Winoto, W., Schwartz, E., Balakrishnan, H., Lilley, J.: The design and implementation of an intentional naming system. In: Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP 1999), Kiawah Island, SC (1999)
Nidd, M.: Service discovery in DEAPspace. IEEE Pers. Communications 8(4), 39–45 (2001)
Guttman, E., Perkins, C., Veizades, J.: Service location protocol. Version 2, http://www.ietf.org/rfc/rfc2608.txt
The Salutation Consortium, Inc. Salutation architecture specification (1999), http://ftp.salutation.org/salute/sa20e1a21.ps
Czerwinski, S., Zhao, B.Y., Hodes, T., Joseph, A., Katz, R.: An architecture for a secure service discovery service. In: Procedings of the 5th Annual International Conference on Mobile Computing Networks (MobiCom 1999), Seattle, WA (1999)
Popovski, P., Kozlova, T., Gavrilovska, L., Prasad, R.: Device discovery in short-range wireless ad hoc networks. IEEE Networks 3, 1361–1365 (2002)
Zaruba, G.V., Gupta, V.: Simplified Bluetooth device discovery— Analysis and simulation. In: Proceedings of the 37th Hawaii International Conference on Systems Sciences, pp. 307–315 (January 2004)
Ferraguto, F., Mambrini, G., Panconesi, A., Petrioli, C.: A newapproach to device discovery and scatternet formation in Bluetooth networks. In: Proceedings of the 18th International Parallel Distributed Process. Symposium, pp. 221–228 (April 2004)
Zaruba, G.V., Chlamtac, I.: Accelerating Bluetooth inquiry for personal area networks. In: Proceedings of IEEE Global Telecommunication Conference, vol. 2, pp. 702–706 (December 2003)
Sohrabi, K., Gao, J., Ailawadhi, V., Pottie, G.J.: Protocols for selforganization of a wireless sensor network. Proceedings of IEEE Pers. Communication 7(5), 16–27 (2000)
Universal Plug and Play Forum. About universal plug and playtechnology (2008), http://www.upnp.org/about/default.asp#technology
Universal Plug and Play. Understanding universal plug and play: A white paper (June 2000), http://upnp.org/resources/whitepapers.asp
Sun Microsystems. Jini network technology (2008), http://www.sun.com/jini
Sun Microsystems. The community resource for Jini technology (2008), http://www.jini.org
Dobrev, P., Famolari, D., Kurzke, C., Miller, B.: Device and service discovery in home networks with OSGI. Proceedings of IEEE Communications Magazine 40(8), 86–92 (2002)
Satyanarayanan, M.: Fundamental challenges in mobile computing. In: Proceedings of 15th ACM Symposium on Principles of Distributed Computing, pp. 1–7 (May 1996)
Weis, S.A.: Security parallels between people and pervasive devices. In: Proceedings of 3rd IEEE International Conference on Pervasive Computing Communications Workshops, pp. 105–109 (2005)
Juels, A., Weis, S.A.: Authenticating pervasive devices with human protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 293–308. Springer, Heidelberg (2005)
Sharmin, M., Ahmed, S., Ahamed, S.I.: An adaptive lightweight trust reliant secure resource discovery for pervasive computing environments. In: Proc. of PerCom 2006, Pisa, Italy, pp. 258–263 (2006)
Haque, M., Ahamed, S.I.: An Impregnable Lightweight Device Discovery (ILDD) Model for the Pervasive Computing Environment of Enterprise Applications. IEEE Transactions on Systems, Man, and Cybernetics 38(3), 334–346 (2008)
Sharmin, M., Ahmed, S., Ahamed, S.I.: MARKS (middleware adaptability for resource discovery, knowledge usability and self-healing) in pervasive computing environments. In: Proc. of 3rd Int. Conf. Inf. Technol.: New Gen, pp. 306–313 (April 2006)
Ahmed, S., Sharmin, M., Ahamed, S.I.: Knowledge usability and its characteristics for pervasive computing. In: Proc. 2005 Int. Conf. pervasive Syst. Computing (PSC 2005), Las Vegas, NV, pp. 206–209 (2005)
Sharmin, M., Ahmed, S., Ahamed, S.I.: SAFE-RD (Secure, adaptive, fault tolerant, and efficient resource discovery). in pervasive computing environments. In: Proc. IEEE Int. Conf. Inf. Technol (ITCC 2005), Las Vegas, NV, pp. 271–276 (2005)
Ahmed, S., Sharmin, M., Ahamed, S.I.: GETS (Generic, efficient, transparent and secured) self-healing service for pervasive computing application. Proceedings of International Journal of Network Security 4(3), 271–281 (2007)
Carminati, B., Ferrari, E., Hung, P.C.K.: Web services composition: A security perspective. In: Proceedings of the 21st Int. Conference on Data Engineering (ICDE 2005), Japan, April 8–9 (2005)
Martin, M.V., Hung, P.C.K.: Toward a security policy for VoIP applications. In: Proceedings of the 18th Annual Can. Conf. Electr. Comput. Eng (CCECE 2005), Saskatoon, SK, Canada (May 2005)
Aleksy, M., Schader, M., Tapper, C.: Interoperability and interchangeability of middleware components in a three-tier CORBA-environmentstate of the art. In: Proc. 3rd Int. Conf. Enterprise Distrib. Object Comput (EDOC 1999), pp. 204–213 (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hasan, C., Adibuzzaman, M., Kawsar, F., Haque, M., Ahamed, S.I. (2011). PryGuard: A Secure Distributed Authentication Protocol for Pervasive Computing Environment. In: Mehrotra, K.G., Mohan, C.K., Oh, J.C., Varshney, P.K., Ali, M. (eds) Modern Approaches in Applied Intelligence. IEA/AIE 2011. Lecture Notes in Computer Science(), vol 6703. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21822-4_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-21822-4_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21821-7
Online ISBN: 978-3-642-21822-4
eBook Packages: Computer ScienceComputer Science (R0)