Advertisement

When Context Is Better Than Identity: Authentication by Context Using Empirical Channels

  • Bangdao Chen
  • Long Hoang Nguyen
  • Andrew William Roscoe
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7114)

Abstract

In mobile computing applications the traditional name-based concept of identity is both difficult to support and frequently inappropriate. The natural alternative is to use the context in which parties sit to identify them. We discuss this issue and the ways in which Human Interactive Security Protocols (HISPs) can play a role in enabling this.

Keywords

Social Network Mobile Phone Security Protocol Human Evaluation Mobile Payment 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    A. Rice. A Continued Commitment to Security, http://blog.facebook.com/blog.php?post=486790652130
  2. 2.
    Adamic, L.A.: The Small World Web. In: Abiteboul, S., Vercoustre, A.-M. (eds.) ECDL 1999. LNCS, vol. 1696, pp. 443–852. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  3. 3.
    Albert, R., Jeong, H., Barabasi, A.: Diameter of the world-wide web. Nature 401, 130–131 (1999)CrossRefGoogle Scholar
  4. 4.
    Christianson, B., Harbison, W.: Why isn’t trust transitive? In: Lomas, M. (ed.) Security Protocols 1996. LNCS, vol. 1189, pp. 171–176. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  5. 5.
    Dey, A.K.: Understanding and using context. Personal Ubiquitous Comput. 5, 4–7 (2001)CrossRefGoogle Scholar
  6. 6.
    Dolev, D., Yao, A.: On the security of public key protocols. IEEE Transactions on Information Theory 29(2), 198–208 (1983)MathSciNetCrossRefzbMATHGoogle Scholar
  7. 7.
    Golbeck, J., Hendler, J.: Accuracy of metrics for inferring trust and reputation in semantic web-based social networks. In: Motta, E., Shadbolt, N.R., Stutt, A., Gibbins, N. (eds.) EKAW 2004. LNCS (LNAI), vol. 3257, pp. 116–131. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  8. 8.
    Kindberg, T., Zhang, K., Shankar, N.: Context authentication using constrained channels. In: Proceedings of Fourth IEEE Workshop on Mobile Computing Systems and Applications, 2002, pp. 14–21 (2002)Google Scholar
  9. 9.
    Nguyen, L.H., Roscoe, A.W.: Efficient group authentication protocol based on human interaction. In: Proceedings of the Workshop on Foundation of Computer Security and Automated Reasoning Protocol Security Analysis (FCS-ARSPA), pp. 9–33 (2006)Google Scholar
  10. 10.
    Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172–182. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  11. 11.
    Vaudenay, S.: Secure communications over insecure channels based on short authenticated strings. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 309–326. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  12. 12.
    Wong, F.-L., Stajano, F.: Multi-Channel Protocols. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2005. LNCS, vol. 4631, pp. 112–127. Springer, Heidelberg (2007)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Bangdao Chen
    • 1
  • Long Hoang Nguyen
    • 1
  • Andrew William Roscoe
    • 1
  1. 1.Computer Science DepartmentOxford UniversityOxfordUK

Personalised recommendations