Subscribe (Full Service) Search: Register (Limited Service, Free) j The ACM Digital Library k l m n Login i The Guide j k l m n Feedback The security challenges for mobile ubiquitous services Source Authors Information Security Tech. Report archive Volume 12 , Issue 3 (January 2007) table of contents Pages 162-171 Year of Publication: 2007 ISSN:1363-4127 Adrian Leung Yingli Sheng Haitham Cruickshank Publisher Additional Information: Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, UK Centre for Communication Systems Research, University of Surrey, Guildford, Surrey, GU2 7XH, UK Centre for Communication Systems Research, University of Surrey, Guildford, Surrey, GU2 7XH, UK Elsevier Advanced Technology Publications Oxford, UK, UK abstract references index terms collaborative colleagues Tools and Actions: Save this Article to a Binder DOI Bookmark: Review this Article Display Formats: BibTex EndNote ACM Ref 10.1016/j.istr.2007.05.001 ABSTRACT It is envisaged that in future mobile ubiquitous environments, users will be able to seamlessly, search, access and consume a rich offering of services and content from an array of Service/Content Providers, whilst they are on the move, anytime, anywhere. Unfortunately, this new computing paradigm also brings along new and unique security challenges. Novel security solutions are therefore required. But, in order for appropriate security solutions to be devised, all possible security threats must first be thoroughly analysed, and the corresponding security requirements be identified. In this paper, we examine the security issues germane to a mobile ubiquitous environment. We then suggest some possible solutions which may be employed to address these security issues. Open research issues are also highlighted. REFERENCES Note: OCR errors may be found in this Reference List extracted from the full text article. ACM has opted to expose the complete List rather than only correct and linked references. Arkko etal., 2004. Arkko J, Devarapalli V, Dupont F. Using IPSec to protect Mobile IPv6 signaling between mobile nodes and home agents. RFC 3776; June 2004. Balacheff etal., 2003. Trusted computing platforms: TCPA technology in context. Prentice Hall PTR. Baugher etal., 2005. Baugher M, Canetti R, Dondeti L, Lindholm F. Multicast Security (MSEC) group key management architecture. RFC 4046; April 2005. Berendt etal., 2005. Privacy in e-commerce: stated preferences vs. actual behaviour. Commun. ACM. v48 i4. 101-106. Calhoun etal., 2003. Calhoun P, Loughney J, Guttman E, Zorn G, Arkko J. Diameter base protocol. RFC 3588; Sep. 2003. De Laat etal., 2000. De Laat C, Gross G, Gommans L, Vollbrecht J, Spence D. Generic AAA architecture. RFC 2903; Aug. 2000. Devarapalli and Dupont, 2007. Devarapalli V, Dupont F. Mobile IPv6 operation with IKEv2 and the revised IPSec architecture. RFC 4877; April 2007. Engelstad etal., 2003. Authenticated access for IPv6 supported mobility. In: Proceedings of the eighth IEEE international symposium on computers and communication (ISCC'03), IEEE. Hardjono and Weis, 2004. Hardjono T, Weis B. The multicast group security architecture. RFC 3740; Mar. 2004. Hoffman, 2005. Hoffman P. Cryptographic suites for IPsec. RFC 4308; Dec. 2005. Holbrook and Cain, 2006. Holbrook H, Cain B. Source-specific multicast for IP. RFC 4607; Aug. 2006. Kang and Park, 2006. IEICE Trans. Fund. vE89-A iNo. 6. Karygiannis and Owens, 2002. Karygiannis T, Owens L. Wireless network security: 802.11, bluetooth and handheld devices. In: National institute of standards and technology; 2002. Kaufman, 2005. Kaufman C. Internet Key Exchange (IKEv2) protocol. RFC 4306; Dec. 2005. Kent, 2005a. Kent S. IP Encapsulating Security Payload (ESP). RFC 4303; Dec. 2005a. Kent, 2005b. Kent S. IP authentication header. RFC 4302; Dec. 2005b. Kent, 2005c. Kent S. Extended Sequence Number (ESN) addendum to IPsec Domain Of Interpretation (DOI) for Internet security association and Key Management Protocol (ISAKMP). RFC 4304; Dec. 2005c. Kent and Seo, 2005. Kent S, Seo K. Security architecture for the Internet protocol. RFC 4301; Dec. 2005. Koodli, 2005. Koodli R. Fast handovers for mobile IPv6. RFC 4068; July 2005. Maughan etal., 1998. Maughan D, Schertler M, Schneider M, Turner J. Internet Security Association And Key Management Protocol (ISAKMP). RFC 2408; Nov. 1998. Mitchell, 2005. In: Mitchell, C. (Ed.), Trusted computing, IEE Press. Mousavi and Quintero, 2006. Selection mechanism in Hierarchical Mobile IP. IEEE. Rigney etal., 2000. Rigney C, Willens S, Rubens A, Simpson W. Remote Authentication Dial in User Service (RADIUS). RFC 2865; June 2000. Schiller, 2005. Schiller J. Cryptographic algorithms for use in the Internet Key Exchange version 2 (IKEv2). RFC 4307; Dec. 2005. Shirey, 2000. Shirey R. Internet security glossary. RFC 2828; May 2000. Soliman etal., 2005. Soliman H, Castelluccia C, El Malki K, Bellier L. Hierarchical Mobile IPv6 Mobility Management (HMIPv6). RFC 4140; Aug. 2005. Trusted Computing Group, 2004. TCG (TCG) specification architecture overview. Apr. 2004. The Trusted Computing Group. Trusted Computing Group (TCG), 2006. TCG Trusted Network Connect TNC architecture for interoperability. May 2006. The Trusted Computing Group. Thomas and Vilhuber, 2003. Wallner etal., 1999. Wallner D, Harder E, Agee R. Key management for multicast: issues and architectures. RFC 2627; June 1999. Yan, 2002. Zero configuration networking. The Internet Protocol Journal. v5 i4. 20-26. INDEX TERMS Primary Classification: K. Computing Milieux K.6 MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS K.6.5 Security and Protection (D.4.6, K.4.2) Keywords: HMIPv6, Mobile, Security, Trusted Computing, Ubiquitous Collaborative Colleagues: Haitham Cruickshank: Adrian Leung Yingli Sheng Adrian Leung: Haitham Cruickshank Yingli Sheng Yingli Sheng: Haitham Cruickshank Adrian Leung The ACM Portal is published by the Association for Computing Machinery. Copyright © 2008 ACM, Inc. Terms of Usage Privacy Policy Code of Ethics Contact Us Useful downloads: Adobe Acrobat QuickTime Windows Media Player Real Player