Scarlet Schwiderski-Grosch, Allan Tomlinson and David B. Pearce (2005) Towards the Secure Initialisation of a Personal Distributed Environment.
Full text access: Open
The Personal Distributed Environment, or PDE, represents a new concept of a computer network that takes a user-centric view of per- sonal devices to create a purely virtual personal network. A PDE integrates all devices that are relevant to a user, regardless of their location, current role, or their specific capabilities. In this paper we present an overview of the PDE concept and describe how such an environment may be constructed. Since the user’s devices may be lo- cated in several different security domains, our focus is on the secure initialisation of the PDE and to that end, we introduce a step-by- step procedure describing how user’s devices will join the network in a secure manner.
This is a Published version This version's date is: 20/07/2005 This item is peer reviewed
https://repository.royalholloway.ac.uk/items/8cf940d6-385a-3aa3-5dc9-b05b7d9620a5/1/
Deposited by () on 13-Jul-2010 in Royal Holloway Research Online.Last modified on 10-Dec-2010
[1] R. C. Atkinson, J. Dunlop, J. Irvine, and S. Vadgama, “The PersonalDistributed Environment,” in 7th International Symposium on WirelessPersonal Multimedia Communications WPMC-04, Abano Terme, Italy,Sept. 2004.
[2] K. L. Billington and A. Tomlinson, “Mutual Authentication of B3G de-vices within Personal Distributed Environments,” in Fifth InternationalConference on 3G Mobile Communications Technologies, 3G 2004. Lon-don, UK: IEE, Oct. 2004, pp. 452–456.
[3] Bluetooth, “Specification of the Bluetooth system,” Bluetooth, Tech.Rep. v1.2, Nov. 2003. [Online]. Available: http://www.bluetooth.org/foundry/adopters/document/Bluetooth Core Specification v1.2
[4] N. Cam-Winget, R. Housley, D. Wagner, and J. Walker, “Security flawsin 802.11 data link protocols,” Communications of the ACM, vol. 46,no. 5, pp. 35–39, 2003.
[5] N. Doraswamy and D. Harkins, IPSec : The new security standard forthe Internet, intranets, and virtual private networks, 2nd ed., ser. WebInfrastructure series. Upper Saddle River, N.J: Prentice Hall, 2003.
[6] J. Dunlop, R. C. Atkinson, J. Irvine, and D. Pearce, “A Personal Distrib-uted Environment for Future mobile systems,” in Proc. 12th IST Mobileand Wireless Communications Summit. Aviero, Portugal: IST, June2003, pp. 705–709.
[7] I. Foster, C. Kesselman, J. M. Nick, and S. Tuecke, “The physiologyof the Grid - an open grid services architecture for distributed systemsintegration,” Global Grid Forum, Tech. Rep., June 2002. [Online].Available: http://www.globus.org/research/papers/ogsa.pdf
[8] I. Foster, C. Kesselman, and S. Tuecke, “The anatomy of the Grid:enabling scalable virtual organization,” The International Journalof High Performance Computing Applications, vol. 15, no. 3, pp.200–222, Aug. 2001. [Online]. Available: http://www.globus.org/research/papers/anatomy.pdf
[9] D. Garlan, D. Siewiorek, A. Smailagic, and P. Steenkiste, “Project Aura:Toward distraction-free pervasive computing,” IEEE Pervasive Comput-ing, pp. 22–31, Apr. 2002.
[10] C. Gehrmann, C. J. Mitchell, and K. Nyberg, “Manual authenticationfor wireless devices,” Cryptobytes, vol. 7, no. 1, pp. 29–37, 2004.
[11] S. K. Goo, J. M. Irvine, J. Dunlop, A. Tomlinson, and S. Schwiderski-Grosche, “Security Requirements for Mobile Service Provision via a Digi-tal Marketplace (Invited Paper),” in 11th European Wireless Conference,EW ’05, vol. 2, VDE. Nicosia, Cyprus: VDE Verlag, Apr. 2005, pp.573–581.
[12] J. Irvine, “Adam Smith Goes Mobile: Managing Services Beyond 3Gwith the Digital Marketplace (Invited Paper),” in European Wireless2002. Florence, Italy: EUREL, Feb. 2002. [Online]. Available:http://docenti.ing.unipi.it/ew2002/proceedings/QoS001.pdf
[13] ISO/IEC, “Information technology - telecommunications and informa-tion exchange between systems - local and metropolitan area networks- specific requirements - part 11: Wireless LAN medium access con-trol (MAC) and physical layer (PHY),” International Organization forStandardization (ISO), Geneva, Switzerland, ISO Standard ISO/IEC8802-11:1999, 1999.
[14] W. Mohr, “WWRF - The Wireless World Research Forum,” Electronicsand Communication Engineering Journal, vol. 14, no. 6, pp. 283–291,Dec. 2002.
[15] ——, “The Wireless World Research Forum - WWRF,”Computer Com-munications, vol. 26, pp. 2–10, Jan. 2003.
[16] P. Pangalos, K. A. Chew, N. Sattari, A. Tomlinson, R. Atkinson, H. Agh-vami, and R. Tafazolli, “The Mobile VCE Architecture for the Inter-working of Mobile and Broadcast Networks,” in 11th European WirelessConference, EW ’05, vol. 2, VDE. Nicosia, Cyprus: VDE Verlag, Apr.2005, pp. 823–828.
[17] J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson,R. Sparks, M. Handley, and E. Schooler, “SIP: Session Initiation Proto-col,” IETF, RFC 3261, June 2002.
[18] M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,”IEEE Personal Communications Magazine, vol. 8, no. 4, pp. 10–17,Apr. 2001.
[19] S. Schwiderski-Grosche, A. Tomlinson, S. K. Goo, and J. M. Irvine,“Security Challenges in the Personal Distributed Environment,” in 60thVehicular Technology Conference, VTC Fall ’04. Los Angeles, USA:IEEE, Sept. 2004.
[20] A. Tomlinson and S. Schwiderski-Grosche, “Application of Grid Securityto Personal Distributed Environments,” in First International Workshopon Grid Computing and its Application to Data Analysis GADA ’04,ser. LNCS OTM Workshops, R. Meersman, Ed., vol. 3292. Cyprus:Springer-Verlag, Oct. 2004, pp. 68–78.
[21] WWRF,“The book of visions 2001,”WWRF, IST -WSI Project Version1.1, Dec. 2001.