Towards the Secure Initialisation of a Personal Distributed Environment

Scarlet Schwiderski-Grosch, Allan Tomlinson and David B. Pearce

(2005)

Scarlet Schwiderski-Grosch, Allan Tomlinson and David B. Pearce (2005) Towards the Secure Initialisation of a Personal Distributed Environment.

Our Full Text Deposits

Full text access: Open

Full Text - 448.01 KB

Links to Copies of this Item Held Elsewhere


Abstract

The Personal Distributed Environment, or PDE, represents a new concept of a computer network that takes a user-centric view of per- sonal devices to create a purely virtual personal network. A PDE integrates all devices that are relevant to a user, regardless of their location, current role, or their specific capabilities. In this paper we present an overview of the PDE concept and describe how such an environment may be constructed. Since the user’s devices may be lo- cated in several different security domains, our focus is on the secure initialisation of the PDE and to that end, we introduce a step-by- step procedure describing how user’s devices will join the network in a secure manner.

Information about this Version

This is a Published version
This version's date is: 20/07/2005
This item is peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/8cf940d6-385a-3aa3-5dc9-b05b7d9620a5/1/

Item TypeMonograph (Technical Report)
TitleTowards the Secure Initialisation of a Personal Distributed Environment
AuthorsSchwiderski-Grosch, Scarlet
Tomlinson, Allan
Pearce, David B.
DepartmentsFaculty of Science\Mathematics

Deposited by () on 13-Jul-2010 in Royal Holloway Research Online.Last modified on 10-Dec-2010

Notes

References

[1] R. C. Atkinson, J. Dunlop, J. Irvine, and S. Vadgama, “The Personal
Distributed Environment,” in 7th International Symposium on Wireless
Personal Multimedia Communications WPMC-04, Abano Terme, Italy,
Sept. 2004.

[2] K. L. Billington and A. Tomlinson, “Mutual Authentication of B3G de-
vices within Personal Distributed Environments,” in Fifth International
Conference on 3G Mobile Communications Technologies, 3G 2004. Lon-
don, UK: IEE, Oct. 2004, pp. 452–456.

[3] Bluetooth, “Specification of the Bluetooth system,” Bluetooth, Tech.
Rep. v1.2, Nov. 2003. [Online]. Available: http://www.bluetooth.org/
foundry/adopters/document/Bluetooth Core Specification v1.2

[4] N. Cam-Winget, R. Housley, D. Wagner, and J. Walker, “Security flaws
in 802.11 data link protocols,” Communications of the ACM, vol. 46,
no. 5, pp. 35–39, 2003.

[5] N. Doraswamy and D. Harkins, IPSec : The new security standard for
the Internet, intranets, and virtual private networks, 2nd ed., ser. Web
Infrastructure series. Upper Saddle River, N.J: Prentice Hall, 2003.

[6] J. Dunlop, R. C. Atkinson, J. Irvine, and D. Pearce, “A Personal Distrib-
uted Environment for Future mobile systems,” in Proc. 12th IST Mobile
and Wireless Communications Summit. Aviero, Portugal: IST, June
2003, pp. 705–709.

[7] I. Foster, C. Kesselman, J. M. Nick, and S. Tuecke, “The physiology
of the Grid - an open grid services architecture for distributed systems
integration,” Global Grid Forum, Tech. Rep., June 2002. [Online].
Available: http://www.globus.org/research/papers/ogsa.pdf

[8] I. Foster, C. Kesselman, and S. Tuecke, “The anatomy of the Grid:
enabling scalable virtual organization,” The International Journal
of High Performance Computing Applications, vol. 15, no. 3, pp.
200–222, Aug. 2001. [Online]. Available: http://www.globus.org/
research/papers/anatomy.pdf

[9] D. Garlan, D. Siewiorek, A. Smailagic, and P. Steenkiste, “Project Aura:
Toward distraction-free pervasive computing,” IEEE Pervasive Comput-
ing, pp. 22–31, Apr. 2002.

[10] C. Gehrmann, C. J. Mitchell, and K. Nyberg, “Manual authentication
for wireless devices,” Cryptobytes, vol. 7, no. 1, pp. 29–37, 2004.

[11] S. K. Goo, J. M. Irvine, J. Dunlop, A. Tomlinson, and S. Schwiderski-
Grosche, “Security Requirements for Mobile Service Provision via a Digi-
tal Marketplace (Invited Paper),” in 11th European Wireless Conference,
EW ’05, vol. 2, VDE. Nicosia, Cyprus: VDE Verlag, Apr. 2005, pp.
573–581.

[12] J. Irvine, “Adam Smith Goes Mobile: Managing Services Beyond 3G
with the Digital Marketplace (Invited Paper),” in European Wireless
2002. Florence, Italy: EUREL, Feb. 2002. [Online]. Available:
http://docenti.ing.unipi.it/ew2002/proceedings/QoS001.pdf

[13] ISO/IEC, “Information technology - telecommunications and informa-
tion exchange between systems - local and metropolitan area networks
- specific requirements - part 11: Wireless LAN medium access con-
trol (MAC) and physical layer (PHY),” International Organization for
Standardization (ISO), Geneva, Switzerland, ISO Standard ISO/IEC
8802-11:1999, 1999.

[14] W. Mohr, “WWRF - The Wireless World Research Forum,” Electronics
and Communication Engineering Journal, vol. 14, no. 6, pp. 283–291,
Dec. 2002.

[15] ——, “The Wireless World Research Forum - WWRF,”Computer Com-
munications, vol. 26, pp. 2–10, Jan. 2003.

[16] P. Pangalos, K. A. Chew, N. Sattari, A. Tomlinson, R. Atkinson, H. Agh-
vami, and R. Tafazolli, “The Mobile VCE Architecture for the Inter-
working of Mobile and Broadcast Networks,” in 11th European Wireless
Conference, EW ’05, vol. 2, VDE. Nicosia, Cyprus: VDE Verlag, Apr.
2005, pp. 823–828.

[17] J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson,
R. Sparks, M. Handley, and E. Schooler, “SIP: Session Initiation Proto-
col,” IETF, RFC 3261, June 2002.

[18] M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,”
IEEE Personal Communications Magazine, vol. 8, no. 4, pp. 10–17,
Apr. 2001.

[19] S. Schwiderski-Grosche, A. Tomlinson, S. K. Goo, and J. M. Irvine,
“Security Challenges in the Personal Distributed Environment,” in 60th
Vehicular Technology Conference, VTC Fall ’04. Los Angeles, USA:
IEEE, Sept. 2004.

[20] A. Tomlinson and S. Schwiderski-Grosche, “Application of Grid Security
to Personal Distributed Environments,” in First International Workshop
on Grid Computing and its Application to Data Analysis GADA ’04,
ser. LNCS OTM Workshops, R. Meersman, Ed., vol. 3292. Cyprus:
Springer-Verlag, Oct. 2004, pp. 68–78.

[21] WWRF,“The book of visions 2001,”WWRF, IST -WSI Project Version
1.1, Dec. 2001.


Details