Abstract
In a smart environment, users often need to access multiple service providers. Multiple authentications and key establishments are required as these resources may reside in different security domains. Therefore we are in quest of a solution that combines multiple logins and key exchanges into one single process. Motivated by this need, we propose a scheme for single sign-on and key establishment (SSOKE) for ubiquitous smart environments. We examine the computational model and design considerations for smart environments, and address them in our scheme construction. Security and privacy considerations of our proposal are also provided.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
3GPP TS 33.102. 3G Security; Security Architecture (v6) (September 2005)
Bardram, J.: The trouble with login – on usability and computer security in ubiquitous computing. Personal and Ubiquitous Computing (July 2005)
Jeong, J., et al.: A study on the xml-based single sign-on system supporting mobile and ubiquitous service environments. In: International Conference on Embedded and Ubiquitous Computing, August 2004, pp. 903–913 (2004)
Miller, S., et al.: Kerberos authentication and authorization system. Technical report, Project Athena, Massachusetts Institute of Technology (1987)
Singh, S., et al.: Ubiquitous computing: connecting pervasive computing through semantic web. In: Information Systems and E-Business Management, Springer, Heidelberg (2005)
Walter, T., et al.: Security and trust issues in ubiquitous environments - the businessto- employee dimension. In: SAINT 2004 Workshops, pp. 696–701 (2004)
Burton Group. Burton group federated identity. Web Site (2005)
IETF RFC 1510. The Kerberos Network Authentication Service (v5) (September 1993)
Internet2, http://www.internet2.edu/
Jenkin, M., Dymond, P.: One-time pads for secure communication in ubiquitous computing. In: Proceedings of IASTED (2004)
RSA Security Ireland Limited. Secure business-to-business single sign-on (b2b sso) based on federated identity management. Technical report, RSA Security Inc. (2004)
Mao, W.: Mondern Cryptography: Theory and Practice, May 2004. Prentice-Hall PTR, Upper Saddle River (2004)
OASIS SSTC. Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) (November 2002)
OASIS SSTC. Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0 (2005)
OATH. OATH Reference Architecture Version 1.0 (2005)
Liberty Alliance Project, http://www.projectliberty.org/
Stajano, F., Anderson, R.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Security Protocols Workshop, pp. 172–194 (1999)
Stajano, F., Anderson, R.: The resurrecting duckling: security issues for ubiquitous computing. Computer 35(4), 22–26 (2002)
Varshney, U.: Network access and security issues in ubiquitous computing. In: Workshop on Ubiquitous Computing Environment (October 2003)
Volkmer, M., Wallner, S.: A key establishment ip-core for ubiquitous computin. In: DEXA Workshops, pp. 241–245 (2005)
Weiser, M., Brown, J.S.: The coming age of calm technology. In: Beyond Calculation: The Next Firty Years of Computing, Copernicus, New York, pp. 75–85 (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chan, YY., Fleissner, S., Liu, J.K., Li, J. (2006). Single Sign-On and Key Establishment for Ubiquitous Smart Environments. In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3983. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751632_44
Download citation
DOI: https://doi.org/10.1007/11751632_44
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34077-5
Online ISBN: 978-3-540-34078-2
eBook Packages: Computer ScienceComputer Science (R0)