PERVASIVE AUTHENTICATION AND AUTHORIZATION INFRASTRUCTURES FOR MOBILE USERS USING PERVASIVE-PKI  

Abstract

In computer science distributed systems could be more secured with a distributed trust model based on PKI. PKI provides a framework to verify the identities of each entities of given domain. Network and device heterogeneity, nomadic mobility, intermittent connectivity and, more generally, extremely dynamic operating conditions, are major challenges in the design of security infrastructures for pervasive computing. Yet, in a ubiquitous computing environment, limitations of traditional solutions for authentication and authorization can be overcome with a pervasive public key infrastructure (pervasive-PKI). This choice allows the validation of credentials of users roaming between heterogeneous networks, even when global connectivity is lost and some services are temporarily unreachable. Proof-of-concept implementations and test bed validation results demonstrate that strong security can be achieved for users and applications through the combination of traditional PKI services with a number of enhancements like dynamic and collaborative trust model, use of attribute certificates for privilege management, and modular architecture enabling nomadic mobility and enhanced with reconfiguration capabilities.infrastructure (pervasive-PKI). This infrastructure, developed as part of the UBISEC project, is able to provide authentication and access control services for users roaming between different heterogeneous networks. In this sense, the pervasive-PKI fully supports nomadic mobility, enabling secure services for users connecting through many different networking technologies (Wi-Fi, UMTS, Bluetooth, etc.), and in multiple network topologies, even when global connectivity is lost and some services are temporarily unreachable. We clearly differentiate between two modes of operation: in connected mode, on-line trusted servers are available and traditional techniques are applicable for validation of user credentials; however, in disconnected mode, the information necessary for this validation is not always available. To support the disconnected mode, we combine different solutions: an adapted privilege verifier for authorization, a new trust model for authentication, and a collaborative model to obtain unavailable information. Some of the functions traditionally performed by authentication and authorization infrastructures are integrated into user devices, providing support for credential validation in situations where central authorities are not available, like in peer-to-peer mobile ad-hoc networks (MANETs). Furthermore, the pervasive-PKI is also endowed with reconfiguration capabilities. The rest of the paper is organized as follows. Section II presents the required background, including authentication and authorization infrastructures, evidence-based computational trust management, and component-based reconfigurable architectures. Section III points out the operation scenario for the pervasive-PKI. Then present the proposed architecture for the pervasive-PKI in Section IV, highlighting the components embedded in user devices. Section V describes a proof-of-concept implementation developed for the UBISEC project. Finally, Section VI concludes the 

Authors and Affiliations

Ms. Sneha R. Kaware , Prof. Karuna G. Bagde

Keywords

Related Articles

Software based approach for Triggering 3-phase, 6-pulse, AC to DC Controlled Converter  

This paper presents the development of a software for triggering the circuit of 3-phase, 6-pulse, ac to dc controlled converter using PIC microcontroller. The microcontroller will generate six equidistant, synchron...

PAPR Reduction of an MC-CDMA system using SLM technique  

Multicarrier Code Division Multiple Access is the most promising technique for high speed data transmission. However, the MC-CDMA signals are characterized by large peak to average power ratios (PAPR), which can reduc...

A Performance Analysis of Energy Aware and Link Stability based Routing Protocols for MANET 

Energy efficient routing is be one of the most important design criterion for MANET since mobile nodes are battery powered with limited capacity and which cannot be recharged when ever needed. So, MANET routing is...

Percentage Based Trust Model with Bandwidth Reservation Technique for Privacy Preserving Routing in MANETs 

Routing in Mobile Ad-Hoc Networks are vulnerable to malicious traffic analysis, harmful attackers can mitigate paths and malicious intermediate nodes breaks security, ineffective reserve of available resources ( u...

“Identifying the Quality of Object Oriented Software System using Modularization Approach” 

Software developers develop their software with some standard specification, but important issue is how to measure the quality of software modularization. In this paper advanced set of metrics are proposed which me...

Download PDF file
  • EP ID EP162010
  • DOI -
  • Views 73
  • Downloads 0

How To Cite

Ms. Sneha R. Kaware, Prof. Karuna G. Bagde (2013). PERVASIVE AUTHENTICATION AND AUTHORIZATION INFRASTRUCTURES FOR MOBILE USERS USING PERVASIVE-PKI  . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(4), 1398-1404. https://europub.co.uk/articles/-A-162010