Research Article
Security for Heterogeneous and Ubiquitous Environments Consisting of Resource-Limited Devices: An Approach to Authorization Using Kerberos
@INPROCEEDINGS{10.1007/978-3-642-11526-4_6, author={Jasone Astorga and Jon Matias and Purificacion Saiz and Eduardo Jacob}, title={Security for Heterogeneous and Ubiquitous Environments Consisting of Resource-Limited Devices: An Approach to Authorization Using Kerberos}, proceedings={Security in Emerging Wireless Communication and Networking Systems. First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers}, proceedings_a={SEWCN}, year={2012}, month={5}, keywords={Authorization system Communication system security Kerberos}, doi={10.1007/978-3-642-11526-4_6} }
- Jasone Astorga
Jon Matias
Purificacion Saiz
Eduardo Jacob
Year: 2012
Security for Heterogeneous and Ubiquitous Environments Consisting of Resource-Limited Devices: An Approach to Authorization Using Kerberos
SEWCN
Springer
DOI: 10.1007/978-3-642-11526-4_6
Abstract
Recent widespread of small electronic devices with a low capacity microprocessor and wireless communication capabilities integrated, has given place to the emergence of new communication scenarios, mainly characterized by their heterogeneity and ubiquity. As an example, in the near future, it will be very common for users to access and control electrical appliances or high performance sensors in remote locations just by using their mobile phone or PDA. However, for these environments to achieve the expected success they must probe to be secure and reliable. The security algorithms and mechanisms used to date are meant for powerful workstations and not suitable for small devices with specific constraints regarding energy and processing power. Therefore, in this paper we present a lightweight authentication and authorization solution based on the Kerberos symmetric key protocol, and we propose an extension of its functionalities in order to add authorization support.