Open Access Open Access  Restricted Access Subscription or Fee Access

Data Security in System Socket Layer

K. Aiswarya, C. Bhuvaneswari, R.  Sowmiya

Abstract


In a nutshell, Ambient Computational Environments is the integration of computational resources into a robust, secure, and pervasive network where users can easily access and co-opt devices, services, and applications via spoken, graphical, or gesture commands. ACE is ubiquitous and accessing information and computational processing power is easy and fast, independent of the user’s location within the environment. An Ambient Computational Environment (ACE) is a set of Devices and services that allow any user to operate in the Environment without the usage of too many cumbersome devices attached to the users person. Security in such an infrastructure is a must for apparent reasons. This paper addresses the design and implementation issues related to securing an ACE, namely identification of a user and a service in the ACE and ensuring proper encrypted communications between users and services alike. A limited form of Public Key Infrastructure has been put in place in the ACE. The simulation results reveal that the proposed Authentication and secure communication is one of the best alternative in the ACE Infrastructure.


Keywords


Ambient Computational Environment (ACE), Host Resource Monitor (HRM's), Remote Connection Manager (RCM)

Full Text:

PDF

References


Kaufman, Perlman & Speciner “Network Security: Private Communication in a Public World”, Prentice Hall ISBN 0-13-061466-1

David P. Jablon, "Strong Password-Only Authenticated Key Exchange" Computer Communication Review, October 1996, Volume 26, Number 5

P. MacKenzie, “On the Security of the SPEKE Password-Authenticated Key Exchange Protocol” Bell Laboratories, Lucent Technologies

Kelsey, Schneier and Wagner “Protocol Interactions and the Chosen Protocol Attack” Security Protocols Workshop ’97, number 1361 in Lecture Notes in Computer Science, pp. 91-103.

Kurosawa, Okada, Sakano, “Security of the Center in Key Distribution Schemes” Advances in Cryptology | ASIACRYPT ’94, number 917 in Lecture Notes in Computer Science, pp. 333 - 341.

Michael Roe, “Performance of Protocols” Security Protocols Workshop ’99, number 1796 in Lecture Notes in Computer Science, pp. 140-152.

Boyd and W. Mao, “Design and Analysis of Key Exchange Protocols via Secure Channel Identification” Advances in Cryptology | ASIACRYPT ’94, number 917 in Lecture Notes in Computer Science, pp. 171 - 181.

F. Stajano and R. Anderson, “The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks” Security Protocols Workshop ’99, number 1796 in Lecture Notes in Computer Science, pp. 172-194.

R. Morris, K. Thompson, “Password Security: A Case History”, Communications of the ACM, Vol. 22, Nov. 1979, pp. 594-597.

Bruce Schneier, “Fun with Fingerprint Readers” Cryptogram Newsletter, May 15 2002. http://www.counterpane.com/crypto-gram-0205.html#5


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.