首页 | 本学科首页   官方微博 | 高级检索  
     

普适计算的信任认证
引用本文:郭亚军,洪帆,叶俊民,邱珊珊,宋建华,洪亮.普适计算的信任认证[J].计算机科学,2006,33(8):92-94.
作者姓名:郭亚军  洪帆  叶俊民  邱珊珊  宋建华  洪亮
作者单位:1. 华中师范大学计算机科学系,武汉430079;华中科技大学计算机学院,武汉430074
2. 华中科技大学计算机学院,武汉430074
3. 华中师范大学计算机科学系,武汉430079
基金项目:国家自然科学基金;湖北省自然科学基金
摘    要:在普适计算环境中,用户能够在任何时间、任何地点访问资源,获得服务。但是这种无处不在性和移动性的环境带来了新的安全问题。资源的拥有者和请求者一般互相不知道。认证是安全的基石,没有认证,系统的保密性、完整性和可用性都将受到影响。可是传统认证是基于身份的认证,不适合普适环境中对陌生实体的认证。本文在分析普适计算的认证要求后,指出了在普适计算环境中应该先在陌生的实体间建立信任关系,然后可以用几乎所有的标准密钥交换协议进行安全认证。提出了用资源限制信任协商技术在陌生人之间建立信任关系。由于它避免了大量的公钥密码操作所带来的计算负担,因此比较适合计算能力有限的设备之间建立信任关系。

关 键 词:普适计算  资源限制信任协商  认证

Trust Authentication in Pervasive Computing
GUO Ya-Jun,HONG Fan,YE Jun-Min,QIU Shan-Shan,SONG Jian-Hua,HONG Liang.Trust Authentication in Pervasive Computing[J].Computer Science,2006,33(8):92-94.
Authors:GUO Ya-Jun  HONG Fan  YE Jun-Min  QIU Shan-Shan  SONG Jian-Hua  HONG Liang
Affiliation:1.Department of Computer Science, Central China Normal University, Wuhan 430079; 2.School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074
Abstract:Users can access resources and obtain services anytime and anywhere in pervasive computing environment. However, the ubiquitous and mobile environment presents a new security challenge. The resource owner and requestor do not foreknow each other. Authentication is the footstone of security. Without authentication, confidentiality, integrality and availability of a system will be affacted. It is unsuitable for pervasive computing environment which entities are strangers to use traditional identity-based authentication. In this paper, after analyzing the requirements of authentication that pervasive computing need, we indicate that authentication in pervasive computing is firstly to establish trust relationship. Then secure authentication is achieved using almost any traditional authentication key exchange protocols. The resource-constrained trust negotiation method is presented to established trust relationship among strangers. Owing to avoiding the heavy computational demands the public key cryptography operations bring about, resource-constrained trust negotiation is well-suited for resource constrained devices to negotiate trust in pervasive computing environment.
Keywords:Pervasive computing  Resource-constrained trust negotiation  Authentication
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机科学》浏览原始摘要信息
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号