首页> 外文会议>IEEE/ACS International Conference on Pervasive Services >Secure pervasive computing without a trusted third party
【24h】

Secure pervasive computing without a trusted third party

机译:没有信任的第三方,安全普适计算

获取原文

摘要

The miniaturization of computing devices and the need for ubiquitous communication has augmented the demand for pervasive computing. Security demands that all devices in a pervasive system must be able to authenticate each other and communicate in a secure manner. This is usually achieved through a trusted third party like a public key infrastructure (PKI) or a key distribution centre (KDC). The establishment of such an entity in such a dynamic environment is neither feasible nor pragmatic. In this paper we present a novel mechanism for authentication and key exchange that can operate seamlessly in pervasive computing environments without the presence of a trusted third party. The proposed scheme has minimal computational requirements, which makes it most suitable for devices with limited resources.
机译:计算设备的小型化和无处不在的通信的需求已经增强了对普遍计算的需求。安全要求普遍系统中的所有设备必须能够以安全的方式互相认证并进行通信。这通常通过可信任的第三方实现,如公钥基础设施(PKI)或密钥分发中心(KDC)。在这种动态环境中建立这种实体既不是可行的也不是务实的。在本文中,我们提出了一种用于认证和关键交换的新机制,可以在普遍的计算环境中无缝运行,而不存在可信的第三方。该方案具有最小的计算要求,这使得最适合资源有限的设备。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号