PERVASIVE AUTHENTICATION AND AUTHORIZATION INFRASTRUCTURES FOR MOBILE USERS USING PERVASIVE-PKI  

Abstract

In computer science distributed systems could be more secured with a distributed trust model based on PKI. PKI provides a framework to verify the identities of each entities of given domain. Network and device heterogeneity, nomadic mobility, intermittent connectivity and, more generally, extremely dynamic operating conditions, are major challenges in the design of security infrastructures for pervasive computing. Yet, in a ubiquitous computing environment, limitations of traditional solutions for authentication and authorization can be overcome with a pervasive public key infrastructure (pervasive-PKI). This choice allows the validation of credentials of users roaming between heterogeneous networks, even when global connectivity is lost and some services are temporarily unreachable. Proof-of-concept implementations and test bed validation results demonstrate that strong security can be achieved for users and applications through the combination of traditional PKI services with a number of enhancements like dynamic and collaborative trust model, use of attribute certificates for privilege management, and modular architecture enabling nomadic mobility and enhanced with reconfiguration capabilities.infrastructure (pervasive-PKI). This infrastructure, developed as part of the UBISEC project, is able to provide authentication and access control services for users roaming between different heterogeneous networks. In this sense, the pervasive-PKI fully supports nomadic mobility, enabling secure services for users connecting through many different networking technologies (Wi-Fi, UMTS, Bluetooth, etc.), and in multiple network topologies, even when global connectivity is lost and some services are temporarily unreachable. We clearly differentiate between two modes of operation: in connected mode, on-line trusted servers are available and traditional techniques are applicable for validation of user credentials; however, in disconnected mode, the information necessary for this validation is not always available. To support the disconnected mode, we combine different solutions: an adapted privilege verifier for authorization, a new trust model for authentication, and a collaborative model to obtain unavailable information. Some of the functions traditionally performed by authentication and authorization infrastructures are integrated into user devices, providing support for credential validation in situations where central authorities are not available, like in peer-to-peer mobile ad-hoc networks (MANETs). Furthermore, the pervasive-PKI is also endowed with reconfiguration capabilities. The rest of the paper is organized as follows. Section II presents the required background, including authentication and authorization infrastructures, evidence-based computational trust management, and component-based reconfigurable architectures. Section III points out the operation scenario for the pervasive-PKI. Then present the proposed architecture for the pervasive-PKI in Section IV, highlighting the components embedded in user devices. Section V describes a proof-of-concept implementation developed for the UBISEC project. Finally, Section VI concludes the 

Authors and Affiliations

Ms. Sneha R. Kaware , Prof. Karuna G. Bagde

Keywords

Related Articles

A Review of a Goal Directed Visual Perception System using Object based Top down Attention 

The tendency of the human being to apply the selective attention mechanism so as to determine about a truly intelligent perception system, which has the cognitive capability of learning and thinking about how to per...

Review on an Underwater Acoustic Networks 

For the enhancement of underwater acoustic network the current research is focus on communication between various remote instruments to improve the high-rate reliable communication, energy efficiency and robust...

Performance analysis of Meandered loop and Top loaded monopole antenna for Wireless Applications  

This paper presents the design of multiple antennas for various wireless applications. In this paper the combination of top loaded monopole antenna and meandered loop antenna that operates on frequencies of 600MHz...

A Study of Decision Support System (With reference to Indian Retail Industry) 

The retail sector was one of the first sectors to make significant investments in collecting and integrating customer data in data warehouses. Retailers have generally earned a significant return on their IT system...

Literature Survey on latest research issues in MANET

Mobile Ad-hoc Networks (MANET) is an emerging area of research. Most current work is centered with different issues. This paper discusses the issues associated with data communication with MANET, Security in MANET, Intru...

Download PDF file
  • EP ID EP162010
  • DOI -
  • Views 48
  • Downloads 0

How To Cite

Ms. Sneha R. Kaware, Prof. Karuna G. Bagde (2013). PERVASIVE AUTHENTICATION AND AUTHORIZATION INFRASTRUCTURES FOR MOBILE USERS USING PERVASIVE-PKI  . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(4), 1398-1404. https://europub.co.uk/articles/-A-162010