Skip to main content

Look Who’s Talking – Authenticating Service Access Points

  • Conference paper
Security in Pervasive Computing (SPC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3450))

Included in the following conference series:

Abstract

Pervasive computing can be divided into computing on personal wearable devices and computing in a smart infrastructure. When a wearable device communicates personal data for further processing to the infrastructure, privacy concerns arise. These concerns would be unnecessary if the behavior of services in the smart environment could be authenticated and known to be compliant to given policies. Based upon the Trusted Computing idea, we present a solution to the specific problem of service access point authentication. In contrast to previous approaches, this operating system centric approach does not only handle trusted computing enhanced applications but also deals with legacy applications providing services.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Weiser, M.: The Computer of the 21st Century (1991). Scientific American 265(3), 66–75 (1991)

    Article  Google Scholar 

  2. Langheinrich, M.: Privacy by Design – Principles of Privacy-Aware Ubiquitous Systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 273–291. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  3. Creese, S., Goldsmith, M., Roscoe, B., Zakiuddin, I.: Authentication for pervasive computing. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 116–129. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  4. Trusted Computing Group: TCG Backgrounder (2003), https://www.trustedcomputinggroup.org/downloads/TCG_Backgrounder.pdf

  5. IBM Corporation: Developer’s view of IBM PowerPC Reference Platform (2003), http://www-306.ibm.com/chips/products/powerpc/newsletter/mar2003/ppc_process_at_work.html

  6. Kinney, S.: Embedded Security Seminar: The Trusted Platform Module Specification and Integrating the Trusted Platform Module into Embedded Systems (2004), http://www.cmpevents.com/ESCe04/a.asp?option=G&V=3&id=271270

  7. Hohl, A., Zugenmaier, A.: Safeguarding Personal Data with DRM in Pervasive Computing. In: Proceedings of the Security and Privacy Workshop of the Pervasive 2004 Conference, Vienna (2004)

    Google Scholar 

  8. Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and Implementation of a TCG-based Integrity Measurement Architecture. In: 13th Usenix Security Symposium, San Diego 2004 (2004)

    Google Scholar 

  9. Haldar, V., Chandra, D., Franz, M.: Semantic Remote Attestation - A Virtual Machine Directed Approach to Trusted Computing. In: USENIX (ed.) Proceedings 3rd Virtual Machine Research and Technology Symposium VM 2004, San Jose, Berkeley, CA, USA, pp. 29–41. USENIX (2004)

    Google Scholar 

  10. Dierks, T., Allen, C.: RFC 2246: The TLS Protocol Version 1.0 (1999), http://www.ietf.org/rfc/rfc2246.txt

  11. Campadello, S., MacLaverty, T.S.R.: Security and Reliability Challenges in Component-Based Software for Consumer Devices. In: The IASTED International Conference on Software Engineering, 2004, Innsbruck, Austria (2004), http://www.nokia.com/library/files/docs/CamMacSar.pdf

  12. Lie, D., Thekkath, C.A., Horowitz, M.: Implementing an Untrusted Operating System on Trusted Hardware. In: Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP). (2003), http://www.eecg.toronto.edu/~lie/papers/lie-sosp2003.pdf

  13. Necula, G.C., Lee, P.: Safe Kernel Extensions Without Run-Time Checking. In: USENIX (ed.) 2nd Symposium on Operating Systems Design and Implementation (OSDI 1996), Seattle, WA, Berkeley, CA, USA, October 28–31, pp. 229–243. USENIX (1996)

    Google Scholar 

  14. Myers, A.C., Liskov, B.: Protecting Privacy using the Decentralized Label Model. ACM Transactions on Software Engineering and Methodology 9, 410–442 (2000)

    Article  Google Scholar 

  15. IBM Corporation: Global Security Analysis Lab: TCPA Resources (2003) http://www.research.ibm.com/gsal/tcpa/

  16. Pfitzmann, B., Riordan, J., Stueble, C., Waidner, M., Weber, A.: Die PERSEUS Systemarchitektur (2001), http://www-krypt.cs.uni-sb.de/download/papers/PfRSWW2001a.pdf

  17. Wash, R.: TCPA support on NetBSD (2004) http://www.citi.umich.edu/u/rwash/projects/trusted/netbsd.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hohl, A., Lowis, L., Zugenmaier, A. (2005). Look Who’s Talking – Authenticating Service Access Points. In: Hutter, D., Ullmann, M. (eds) Security in Pervasive Computing. SPC 2005. Lecture Notes in Computer Science, vol 3450. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-32004-3_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-32004-3_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25521-5

  • Online ISBN: 978-3-540-32004-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics