Authentication for Pervasive Computing [chapter]

Sadie Creese, Michael Goldsmith, Bill Roscoe, Irfan Zakiuddin
2004 Lecture Notes in Computer Science  
Key management is fundamental to communications security, and for security in pervasive computing sound key management is particularly difficult. However, sound key management itself depends critically on sound authentication. In this paper we review current notions of entity authentication and discuss why we believe these notions are unsuitable for the pervasive domain. We then present our views on how notions of authentication should be revised to address the challenges of the pervasive
more » ... , and some of the new research problems that will arise. We end with some brief thoughts on how our revised notions may be implemented and some of the problems that may be encountered.
doi:10.1007/978-3-540-39881-3_12 fatcat:hhculyaqvncidkrlq6pefl7xee