Device Authentication In Wireless And Pervasive Environments

Georgios Kambourakis, Stefanos Gritzalis, Jong Hyuk Park
2010 Intelligent Automation and Soft Computing  
Security can only be guaranteed as long as the hardware and other key parameters, including software components, secret keys etc, of a device remain genuine and unmodified. Under this context, device authentication must be considered as a key security issue, complementary and of equal importance to user authentication, in today's wireless and forthcoming ubiquitous realms. This paper classifies and analyses possible major solutions proposed until now towards solving the device authentication
more » ... ue. We constructively argue on each solution presented examining its advantages and disadvantages. A qualitative comparative analysis for the device authentication schemes in question is also offered, probing its applicability for both infrastructure and ad-hoc deployments. Inter-domain device authentication, where applicable, and users' privacy as a side-effect are investigated as well.
doi:10.1080/10798587.2010.10643089 fatcat:3scffeggbbad3f2kqwn6z7qlti