Authentication in mobile distributed environment

V. Varadharajan*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

2 Citations (Scopus)

Abstract

Information and communication technology is on the threshold of a new style of computing. First, the telecommunications industry is witnessing the development of Personal Communication Systems that are 'person-specific' with person to person logical connections. Second, the computer industry is in the phase of practical implementation of distributed systems concepts. In particular, the notion of open systems is a major driving force. Use of mobile personal systems in a open distributed environment raises several issues with regard to information security and system dependability. This paper addresses one key aspect of information security in such a mobile distributed environment namely that of authentication. We consider the nature of the security threat, and how it may arise in practical situations. then we describe the characteristics of the required authentication security service to counteract this threat. In particular, we outline some of the common mechanisms that can be used to provide authentication. We illustrate these issues by considering some scenarios in the areas of mobile personal information systems and client server based distributed systems, and show how the authentication mechanisms can be used to counteract the masquerading threat.

Original languageEnglish
Title of host publicationIEE Conference Publication
Place of PublicationPiscataway, NJ
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages173-188
Number of pages16
Edition387
ISBN (Print)0852966075
Publication statusPublished - 1993
Externally publishedYes
EventProceedings of the 7th IEE European Conference on Mobile and Personal Communications - Brighton, UK
Duration: 13 Dec 199315 Dec 1993

Other

OtherProceedings of the 7th IEE European Conference on Mobile and Personal Communications
CityBrighton, UK
Period13/12/9315/12/93

Fingerprint

Dive into the research topics of 'Authentication in mobile distributed environment'. Together they form a unique fingerprint.

Cite this