i n k

advertisement
Subscribe (Full Service)
Search:
Register (Limited Service, Free)
j The ACM Digital Library
k
l
m
n
Login
i The Guide
j
k
l
m
n
Feedback
The security challenges for mobile ubiquitous services
Source
Authors
Information Security Tech. Report archive
Volume 12 , Issue 3 (January 2007) table of contents
Pages 162-171
Year of Publication: 2007
ISSN:1363-4127
Adrian Leung
Yingli Sheng
Haitham
Cruickshank
Publisher
Additional
Information:
Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, UK
Centre for Communication Systems Research, University of Surrey, Guildford, Surrey, GU2 7XH,
UK
Centre for Communication Systems Research, University of Surrey, Guildford, Surrey, GU2 7XH,
UK
Elsevier Advanced Technology Publications Oxford, UK, UK
abstract references index terms collaborative colleagues
Tools and Actions:
Save this Article to a Binder
DOI Bookmark:
Review this Article
Display Formats: BibTex EndNote ACM Ref
10.1016/j.istr.2007.05.001
ABSTRACT
It is envisaged that in future mobile ubiquitous environments, users will be able to
seamlessly, search, access and consume a rich offering of services and content from an
array of Service/Content Providers, whilst they are on the move, anytime, anywhere.
Unfortunately, this new computing paradigm also brings along new and unique security
challenges. Novel security solutions are therefore required. But, in order for appropriate
security solutions to be devised, all possible security threats must first be thoroughly
analysed, and the corresponding security requirements be identified. In this paper, we
examine the security issues germane to a mobile ubiquitous environment. We then suggest
some possible solutions which may be employed to address these security issues. Open
research issues are also highlighted.
REFERENCES
Note: OCR errors may be found in this Reference List extracted from the full text article.
ACM has opted to expose the complete List rather than only correct and linked references.
Arkko etal., 2004.
Arkko J, Devarapalli V, Dupont F. Using IPSec to protect Mobile IPv6 signaling
between mobile nodes and home agents. RFC 3776; June 2004.
Balacheff etal., 2003.
Trusted computing platforms: TCPA technology in context. Prentice Hall PTR.
Baugher etal., 2005.
Baugher M, Canetti R, Dondeti L, Lindholm F. Multicast Security (MSEC) group key
management architecture. RFC 4046; April 2005.
Berendt etal., 2005.
Privacy in e-commerce: stated preferences vs. actual behaviour. Commun. ACM. v48
i4. 101-106.
Calhoun etal., 2003.
Calhoun P, Loughney J, Guttman E, Zorn G, Arkko J. Diameter base protocol. RFC
3588; Sep. 2003.
De Laat etal., 2000.
De Laat C, Gross G, Gommans L, Vollbrecht J, Spence D. Generic AAA architecture.
RFC 2903; Aug. 2000.
Devarapalli and
Dupont, 2007.
Devarapalli V, Dupont F. Mobile IPv6 operation with IKEv2 and the revised IPSec
architecture. RFC 4877; April 2007.
Engelstad etal., 2003.
Authenticated access for IPv6 supported mobility. In: Proceedings of the eighth IEEE
international symposium on computers and communication (ISCC'03), IEEE.
Hardjono and Weis,
2004.
Hardjono T, Weis B. The multicast group security architecture. RFC 3740; Mar. 2004.
Hoffman, 2005.
Hoffman P. Cryptographic suites for IPsec. RFC 4308; Dec. 2005.
Holbrook and Cain,
2006.
Holbrook H, Cain B. Source-specific multicast for IP. RFC 4607; Aug. 2006.
Kang and Park, 2006.
IEICE Trans. Fund. vE89-A iNo. 6.
Karygiannis and
Owens, 2002.
Karygiannis T, Owens L. Wireless network security: 802.11, bluetooth and handheld
devices. In: National institute of standards and technology; 2002.
Kaufman, 2005.
Kaufman C. Internet Key Exchange (IKEv2) protocol. RFC 4306; Dec. 2005.
Kent, 2005a.
Kent S. IP Encapsulating Security Payload (ESP). RFC 4303; Dec. 2005a.
Kent, 2005b.
Kent S. IP authentication header. RFC 4302; Dec. 2005b.
Kent, 2005c.
Kent S. Extended Sequence Number (ESN) addendum to IPsec Domain Of
Interpretation (DOI) for Internet security association and Key Management Protocol
(ISAKMP). RFC 4304; Dec. 2005c.
Kent and Seo, 2005.
Kent S, Seo K. Security architecture for the Internet protocol. RFC 4301; Dec. 2005.
Koodli, 2005.
Koodli R. Fast handovers for mobile IPv6. RFC 4068; July 2005.
Maughan etal., 1998.
Maughan D, Schertler M, Schneider M, Turner J. Internet Security Association And
Key Management Protocol (ISAKMP). RFC 2408; Nov. 1998.
Mitchell, 2005.
In: Mitchell, C. (Ed.), Trusted computing, IEE Press.
Mousavi and Quintero,
2006.
Selection mechanism in Hierarchical Mobile IP. IEEE.
Rigney etal., 2000.
Rigney C, Willens S, Rubens A, Simpson W. Remote Authentication Dial in User
Service (RADIUS). RFC 2865; June 2000.
Schiller, 2005.
Schiller J. Cryptographic algorithms for use in the Internet Key Exchange version 2
(IKEv2). RFC 4307; Dec. 2005.
Shirey, 2000.
Shirey R. Internet security glossary. RFC 2828; May 2000.
Soliman etal., 2005.
Soliman H, Castelluccia C, El Malki K, Bellier L. Hierarchical Mobile IPv6 Mobility
Management (HMIPv6). RFC 4140; Aug. 2005.
Trusted Computing
Group, 2004.
TCG (TCG) specification architecture overview. Apr. 2004. The Trusted Computing
Group.
Trusted Computing
Group (TCG), 2006.
TCG Trusted Network Connect TNC architecture for interoperability. May 2006. The
Trusted Computing Group.
Thomas and Vilhuber,
2003.
Wallner etal., 1999.
Wallner D, Harder E, Agee R. Key management for multicast: issues and
architectures. RFC 2627; June 1999.
Yan, 2002.
Zero configuration networking. The Internet Protocol Journal. v5 i4. 20-26.
INDEX TERMS
Primary Classification:
K. Computing Milieux
K.6 MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS
K.6.5 Security and Protection (D.4.6, K.4.2)
Keywords:
HMIPv6, Mobile, Security, Trusted Computing, Ubiquitous
Collaborative Colleagues:
Haitham Cruickshank:
Adrian Leung
Yingli Sheng
Adrian Leung:
Haitham Cruickshank
Yingli Sheng
Yingli Sheng:
Haitham Cruickshank
Adrian Leung
The ACM Portal is published by the Association for Computing Machinery. Copyright © 2008 ACM, Inc.
Terms of Usage Privacy Policy Code of Ethics Contact Us
Useful downloads:
Adobe Acrobat
QuickTime
Windows Media Player
Real Player
Download