TY - JOUR
T1 - Device authentication in wireless and pervasive environments
AU - Kambourakis, Georgios
AU - Gritzalis, Stefanos
AU - Park, Jong Hyuk
PY - 2010/1
Y1 - 2010/1
N2 - Security can only be guaranteed as long as the hardwaze and other key parameters, including software components, secret keys etc, of a device remain genuine and unrnodified. Under this context, device authentication must be considered as a key security issue, complementary and of equal importance to user authentication, in today’s wireless and forthcoming ubiquitous realms. This paper classifies and analyses possible major solutions proposed until now towazds solving the device authentication issue. We constructively argue on each solution presented examining its advantages and disadvantages. A qualitative comparative analysis for the device authentication schemes in question is also offered, probing its applicability for both infrastructure and ad-hoc deployments. Inter-domain device authentication, where applicable, and users’ privacy as aside-effect are investigated as well.
AB - Security can only be guaranteed as long as the hardwaze and other key parameters, including software components, secret keys etc, of a device remain genuine and unrnodified. Under this context, device authentication must be considered as a key security issue, complementary and of equal importance to user authentication, in today’s wireless and forthcoming ubiquitous realms. This paper classifies and analyses possible major solutions proposed until now towazds solving the device authentication issue. We constructively argue on each solution presented examining its advantages and disadvantages. A qualitative comparative analysis for the device authentication schemes in question is also offered, probing its applicability for both infrastructure and ad-hoc deployments. Inter-domain device authentication, where applicable, and users’ privacy as aside-effect are investigated as well.
KW - Device authentication
KW - IEEE 802.1X
KW - Pervasive networks security
KW - Trusted Computing Group
UR - http://www.scopus.com/inward/record.url?scp=77955283692&partnerID=8YFLogxK
U2 - 10.1080/10798587.2010.10643089
DO - 10.1080/10798587.2010.10643089
M3 - Article
AN - SCOPUS:77955283692
SN - 1079-8587
VL - 16
SP - 399
EP - 418
JO - Intelligent Automation and Soft Computing
JF - Intelligent Automation and Soft Computing
IS - 3
ER -