Skip to main content

Single Sign-On and Key Establishment for Ubiquitous Smart Environments

  • Conference paper
Computational Science and Its Applications - ICCSA 2006 (ICCSA 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3983))

Included in the following conference series:

Abstract

In a smart environment, users often need to access multiple service providers. Multiple authentications and key establishments are required as these resources may reside in different security domains. Therefore we are in quest of a solution that combines multiple logins and key exchanges into one single process. Motivated by this need, we propose a scheme for single sign-on and key establishment (SSOKE) for ubiquitous smart environments. We examine the computational model and design considerations for smart environments, and address them in our scheme construction. Security and privacy considerations of our proposal are also provided.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 3GPP TS 33.102. 3G Security; Security Architecture (v6) (September 2005)

    Google Scholar 

  2. Bardram, J.: The trouble with login – on usability and computer security in ubiquitous computing. Personal and Ubiquitous Computing (July 2005)

    Google Scholar 

  3. Jeong, J., et al.: A study on the xml-based single sign-on system supporting mobile and ubiquitous service environments. In: International Conference on Embedded and Ubiquitous Computing, August 2004, pp. 903–913 (2004)

    Google Scholar 

  4. Miller, S., et al.: Kerberos authentication and authorization system. Technical report, Project Athena, Massachusetts Institute of Technology (1987)

    Google Scholar 

  5. Singh, S., et al.: Ubiquitous computing: connecting pervasive computing through semantic web. In: Information Systems and E-Business Management, Springer, Heidelberg (2005)

    Google Scholar 

  6. Walter, T., et al.: Security and trust issues in ubiquitous environments - the businessto- employee dimension. In: SAINT 2004 Workshops, pp. 696–701 (2004)

    Google Scholar 

  7. Burton Group. Burton group federated identity. Web Site (2005)

    Google Scholar 

  8. IETF RFC 1510. The Kerberos Network Authentication Service (v5) (September 1993)

    Google Scholar 

  9. Internet2, http://www.internet2.edu/

  10. Jenkin, M., Dymond, P.: One-time pads for secure communication in ubiquitous computing. In: Proceedings of IASTED (2004)

    Google Scholar 

  11. RSA Security Ireland Limited. Secure business-to-business single sign-on (b2b sso) based on federated identity management. Technical report, RSA Security Inc. (2004)

    Google Scholar 

  12. Mao, W.: Mondern Cryptography: Theory and Practice, May 2004. Prentice-Hall PTR, Upper Saddle River (2004)

    Google Scholar 

  13. OASIS SSTC. Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) (November 2002)

    Google Scholar 

  14. OASIS SSTC. Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0 (2005)

    Google Scholar 

  15. OATH. OATH Reference Architecture Version 1.0 (2005)

    Google Scholar 

  16. Liberty Alliance Project, http://www.projectliberty.org/

  17. Stajano, F., Anderson, R.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Security Protocols Workshop, pp. 172–194 (1999)

    Google Scholar 

  18. Stajano, F., Anderson, R.: The resurrecting duckling: security issues for ubiquitous computing. Computer 35(4), 22–26 (2002)

    Article  Google Scholar 

  19. Varshney, U.: Network access and security issues in ubiquitous computing. In: Workshop on Ubiquitous Computing Environment (October 2003)

    Google Scholar 

  20. Volkmer, M., Wallner, S.: A key establishment ip-core for ubiquitous computin. In: DEXA Workshops, pp. 241–245 (2005)

    Google Scholar 

  21. Weiser, M., Brown, J.S.: The coming age of calm technology. In: Beyond Calculation: The Next Firty Years of Computing, Copernicus, New York, pp. 75–85 (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chan, YY., Fleissner, S., Liu, J.K., Li, J. (2006). Single Sign-On and Key Establishment for Ubiquitous Smart Environments. In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3983. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751632_44

Download citation

  • DOI: https://doi.org/10.1007/11751632_44

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34077-5

  • Online ISBN: 978-3-540-34078-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics