Security in Emerging Wireless Communication and Networking Systems. First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers

Research Article

Security for Heterogeneous and Ubiquitous Environments Consisting of Resource-Limited Devices: An Approach to Authorization Using Kerberos

Download
281 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-11526-4_6,
        author={Jasone Astorga and Jon Matias and Purificacion Saiz and Eduardo Jacob},
        title={Security for Heterogeneous and Ubiquitous Environments Consisting of Resource-Limited Devices: An Approach to Authorization Using Kerberos},
        proceedings={Security in Emerging Wireless Communication and Networking Systems. First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers},
        proceedings_a={SEWCN},
        year={2012},
        month={5},
        keywords={Authorization system Communication system security Kerberos},
        doi={10.1007/978-3-642-11526-4_6}
    }
    
  • Jasone Astorga
    Jon Matias
    Purificacion Saiz
    Eduardo Jacob
    Year: 2012
    Security for Heterogeneous and Ubiquitous Environments Consisting of Resource-Limited Devices: An Approach to Authorization Using Kerberos
    SEWCN
    Springer
    DOI: 10.1007/978-3-642-11526-4_6
Jasone Astorga1,*, Jon Matias1,*, Purificacion Saiz1,*, Eduardo Jacob1,*
  • 1: University of the Basque Country
*Contact email: jasone.astorga@ehu.es, jon.matias@ehu.es, puri.saiz@ehu.es, eduardo.jacob@ehu.es

Abstract

Recent widespread of small electronic devices with a low capacity microprocessor and wireless communication capabilities integrated, has given place to the emergence of new communication scenarios, mainly characterized by their heterogeneity and ubiquity. As an example, in the near future, it will be very common for users to access and control electrical appliances or high performance sensors in remote locations just by using their mobile phone or PDA. However, for these environments to achieve the expected success they must probe to be secure and reliable. The security algorithms and mechanisms used to date are meant for powerful workstations and not suitable for small devices with specific constraints regarding energy and processing power. Therefore, in this paper we present a lightweight authentication and authorization solution based on the Kerberos symmetric key protocol, and we propose an extension of its functionalities in order to add authorization support.