|
计算机科学 2006
Trust Authentication in Pervasive Computing
|
Abstract:
Users can access resources and obtain services anytime and anywhere in pervasive computing environment. However, the ubiquitous and mobile environment presents a new security challenge. The resource owner and requestor do not foreknow each other. Authentication is the footstone of security. Without authentication, confidentiality, integrality and availability of a system will be affacted. It is unsuitable for pervasive computing environment which entities are strangers to use traditional identity-based authentication. In this paper, after analyzing the requirements of authentication that pervasive computing need, we indicate that authentication in pervasive computing is firstly to establish trust relationship. Then secure authentication is achieved using almost any traditional authentication key exchange protocols. The resource-constrained trust negotiation method is presented to established trust relationship among strangers. Owing to avoiding the heavy computational demands the public key cryptography operations bring about, resource-constrained trust negotiation is well-suited for resource constrained devices to negotiate trust in pervasive computing environment.