Device authentication in wireless and pervasive environments

Georgios Kambourakis, Stefanos Gritzalis, Jong Hyuk Park

Research output: Contribution to journalArticlepeer-review

7 Scopus citations

Abstract

Security can only be guaranteed as long as the hardwaze and other key parameters, including software components, secret keys etc, of a device remain genuine and unrnodified. Under this context, device authentication must be considered as a key security issue, complementary and of equal importance to user authentication, in today’s wireless and forthcoming ubiquitous realms. This paper classifies and analyses possible major solutions proposed until now towazds solving the device authentication issue. We constructively argue on each solution presented examining its advantages and disadvantages. A qualitative comparative analysis for the device authentication schemes in question is also offered, probing its applicability for both infrastructure and ad-hoc deployments. Inter-domain device authentication, where applicable, and users’ privacy as aside-effect are investigated as well.

Original languageEnglish
Pages (from-to)399-418
Number of pages20
JournalIntelligent Automation and Soft Computing
Volume16
Issue number3
DOIs
StatePublished - Jan 2010

Keywords

  • Device authentication
  • IEEE 802.1X
  • Pervasive networks security
  • Trusted Computing Group

Fingerprint

Dive into the research topics of 'Device authentication in wireless and pervasive environments'. Together they form a unique fingerprint.

Cite this