Publications

Security for heterogeneous and ubiquitous environments consisting of resource-limited nodes: an approach to authorization using Kerberos

Publication date: January 1, 2010

Type:Journal article
Publication details
Series: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Book title: Security in Emerging Wireless Communication and Networking Systems
Chapter: - Edition: Springer-Verlag
Volume: 42 Journal: -
Number: - Pages: 65-76
ISBN/ISSN: ISBN: 978-3-642-11526-4 admin.research.publications.city: Springer-VerlagBerlin Heidelberg
Reference: http://www.springerlink.com/content/x03513222044p738/
Abstract

Recent widespread of small electronic devices with a low capacity microprocessor and wireless communication capabilities integrated, has given place to the emergence of new communication scenarios, mainly characterized by their heterogeneity and ubiquity. As an example, in the near future, it will be very common for users to access and control electrical appliances or high performance sensors in remote locations just by using their mobile phone or PDA. However, for these environments to achieve the expected success they must probe to be secure and reliable. The security algorithms and mechanisms used to date are meant for powerful workstations and not suitable for small devices with specific constraints regarding energy and processing power. Therefore, in this paper we present a lightweight authentication and authorization solution based on the Kerberos symmetric key protocol, and we propose an extension of its functionalities in order to add authorization support.