Advertisement

Architecture Framework for Device Single Sign On in Personal Area Networks

  • Appadodharana Chandershekarapuram
  • Dimitrios Vogiatzis
  • Spyridon Vassilaras
  • Gregory S. Yovanof
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4278)

Abstract

This paper addresses the Single Sign On (SSO) issue in personal Area Networks (PANs) comprising of heterogeneous handheld devices. Architectures for service SSO solutions at the enterprise level are already in the market and some standards for such solutions exist. In this paper however we introduce the notion of device level SSO. By device SSO, we refer to the process of logging on to one device and then subsequently being authorized for other devices on a need only basis, without the user being prompted for his credentials or requiring any further manual interaction. Device SSO secures the authentication process in a PAN and alleviates the users from the burden of handling and managing the credentials of each device in the PAN. While borrowing elements from the enterprise level SSO standards, our architecture has been custom-tailored to the characteristics and inherent features of a PAN environment. Client server and peer-to-peer SSO schemes have been designed to fit both PAN star and mesh architectures. The proposed scheme is an application layer solution that is independent of the device platform and the underlying radio link. A sample prototype application has been developed as a proof of concept that runs on laptops and PDAs communicating over Bluetooth links.

Keywords

Authentication Protocol Mutual Authentication Single Sign Architecture Framework Personal Device 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Kelly, M.: Is Single Sign on a Security Risk?, Version 1.2e, © SANS Institute, GIAC Certified Student Practical (June 2002) Google Scholar
  2. 2.
    Pashalidis, A., Mitchell, C.J.: A Taxonomy of single sign-on systems. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  3. 3.
    Ortiz, E.: A Survey of J2ME Today (October 2004)Google Scholar
  4. 4.
    Liberty Alliance Specifications, www.projectliberty.org
  5. 5.
    Kormann, D.P., Rubin, A.D.: Risks of the Passport Single Sign on Protocol, Computer Networks, vol. 33, pp. 51–58. Elsevier Science Press, Amsterdam (2000)Google Scholar
  6. 6.
    Pashalidis, A., Mitchell, C.: Using GSM/UMTS for Single Sign-On. In: Proceedings of SympoTIC 2003 Joint IST Workshop on Mobile Future Symposium on Trends in Communications, Bratislava, Slovakia, October 2003, pp. 138–145. IEEE Press, Los Alamitos (2003)CrossRefGoogle Scholar
  7. 7.
    Pashalidis, A., Mitchell, C.J.: Single Sign-On using Trusted Platforms, Information Security. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol. 2851, pp. 54–68. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  8. 8.
  9. 9.
    Jeong, J., Shin, D., Shin, D.: An XML-based Single Sign-On Scheme Supporting Mobile and Home Network Service Environments. IEEE Transactions on Consumer Electronics 50(4), 1081–1086 (2004)CrossRefGoogle Scholar
  10. 10.
    Josephson, W., Sirer, E.G., Schneider, F.B.: Peer-to-Peer Authentication with a Distributed Single Sign-On Service. In: Voelker, G.M., Shenker, S. (eds.) IPTPS 2004. LNCS, vol. 3279, pp. 250–258. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  11. 11.
    Gehrmann, C., Nyberg, K., Mitchell, C.J.: Manual authentication for wireless devices. Cryptobytes 7(1), 29–37 (2004)Google Scholar
  12. 12.
    Schneier, B.: Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd edn. John Wiley & Sons, Inc., Chichester (1996)MATHGoogle Scholar
  13. 13.
  14. 14.
    RFC 1510, The Kerberos Network Authentication Service (V5), www.ietf.org/rfc/rfc1510.txt

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Appadodharana Chandershekarapuram
    • 1
  • Dimitrios Vogiatzis
    • 1
  • Spyridon Vassilaras
    • 1
  • Gregory S. Yovanof
    • 1
  1. 1.Athens Information Technology 

Personalised recommendations