%0 Journal Article %T Trust Authentication in Pervasive Computing
普适计算的信任认证 %A GUO Ya-Jun %A HONG Fan %A YE Jun-Min %A QIU Shan-Shan %A SONG Jian-Hua %A HONG Liang %A
郭亚军 %A 洪帆 %A 叶俊民 %A 邱珊珊 %A 宋建华 %A 洪亮 %J 计算机科学 %D 2006 %I %X Users can access resources and obtain services anytime and anywhere in pervasive computing environment. However, the ubiquitous and mobile environment presents a new security challenge. The resource owner and requestor do not foreknow each other. Authentication is the footstone of security. Without authentication, confidentiality, integrality and availability of a system will be affacted. It is unsuitable for pervasive computing environment which entities are strangers to use traditional identity-based authentication. In this paper, after analyzing the requirements of authentication that pervasive computing need, we indicate that authentication in pervasive computing is firstly to establish trust relationship. Then secure authentication is achieved using almost any traditional authentication key exchange protocols. The resource-constrained trust negotiation method is presented to established trust relationship among strangers. Owing to avoiding the heavy computational demands the public key cryptography operations bring about, resource-constrained trust negotiation is well-suited for resource constrained devices to negotiate trust in pervasive computing environment. %K Pervasive computing %K Resource-constrained trust negotiation %K Authentication
普适计算 %K 资源限制信任协商 %K 认证 %U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=64A12D73428C8B8DBFB978D04DFEB3C1&aid=7727106A8BD4FCA0&yid=37904DC365DD7266&vid=27746BCEEE58E9DC&iid=5D311CA918CA9A03&sid=08805F9252973BA4&eid=BB0EA31DB1B01173&journal_id=1002-137X&journal_name=计算机科学&referenced_num=1&reference_num=15