Home > Research > Publications & Outputs > A context authentication proxy for IPSec using ...

Electronic data

View graph of relations

A context authentication proxy for IPSec using spatial reference

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

A context authentication proxy for IPSec using spatial reference. / Mayrhofer, Rene.
1st International Workshop on Trustworthy Ubiquitous Computing, TwUC 2006. 2006. p. 449-462.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Mayrhofer, R 2006, A context authentication proxy for IPSec using spatial reference. in 1st International Workshop on Trustworthy Ubiquitous Computing, TwUC 2006. pp. 449-462.

APA

Mayrhofer, R. (2006). A context authentication proxy for IPSec using spatial reference. In 1st International Workshop on Trustworthy Ubiquitous Computing, TwUC 2006 (pp. 449-462)

Vancouver

Mayrhofer R. A context authentication proxy for IPSec using spatial reference. In 1st International Workshop on Trustworthy Ubiquitous Computing, TwUC 2006. 2006. p. 449-462

Author

Mayrhofer, Rene. / A context authentication proxy for IPSec using spatial reference. 1st International Workshop on Trustworthy Ubiquitous Computing, TwUC 2006. 2006. pp. 449-462

Bibtex

@inproceedings{ccb7c8419dbc4190b7ed3f0e63ad59fd,
title = "A context authentication proxy for IPSec using spatial reference",
abstract = "Spontaneous interaction in ad-hoc networks is often desirable not only between users or devices in direct contact, but also with devices that are accessible only via a wireless network. Secure communication with such devices is di#cult because of the required authentication, which is often either password- or certificate-based. An intuitive alternative is context-based authentication, where device authenticity is verified by shared context, and often by direct physical evidence. Devices that are physically separated can not experience the same context and can thus not benefit directly from context authentication. We introduce a context authentication proxy that is pre-authenticated with one of the devices and can authenticate with the other by shared context. This concept is applicable to a wide range of application scenarios, context sensing technologies, and trust models. We show its practicality in an implementation for setting up IPSec connections based on spatial reference. Our specific scenario is ad-hoc access of mobile devices to secure 802.11 WLANs using a PDA as authentication proxy.",
author = "Rene Mayrhofer",
year = "2006",
language = "English",
pages = "449--462",
booktitle = "1st International Workshop on Trustworthy Ubiquitous Computing, TwUC 2006",

}

RIS

TY - GEN

T1 - A context authentication proxy for IPSec using spatial reference

AU - Mayrhofer, Rene

PY - 2006

Y1 - 2006

N2 - Spontaneous interaction in ad-hoc networks is often desirable not only between users or devices in direct contact, but also with devices that are accessible only via a wireless network. Secure communication with such devices is di#cult because of the required authentication, which is often either password- or certificate-based. An intuitive alternative is context-based authentication, where device authenticity is verified by shared context, and often by direct physical evidence. Devices that are physically separated can not experience the same context and can thus not benefit directly from context authentication. We introduce a context authentication proxy that is pre-authenticated with one of the devices and can authenticate with the other by shared context. This concept is applicable to a wide range of application scenarios, context sensing technologies, and trust models. We show its practicality in an implementation for setting up IPSec connections based on spatial reference. Our specific scenario is ad-hoc access of mobile devices to secure 802.11 WLANs using a PDA as authentication proxy.

AB - Spontaneous interaction in ad-hoc networks is often desirable not only between users or devices in direct contact, but also with devices that are accessible only via a wireless network. Secure communication with such devices is di#cult because of the required authentication, which is often either password- or certificate-based. An intuitive alternative is context-based authentication, where device authenticity is verified by shared context, and often by direct physical evidence. Devices that are physically separated can not experience the same context and can thus not benefit directly from context authentication. We introduce a context authentication proxy that is pre-authenticated with one of the devices and can authenticate with the other by shared context. This concept is applicable to a wide range of application scenarios, context sensing technologies, and trust models. We show its practicality in an implementation for setting up IPSec connections based on spatial reference. Our specific scenario is ad-hoc access of mobile devices to secure 802.11 WLANs using a PDA as authentication proxy.

M3 - Conference contribution/Paper

SP - 449

EP - 462

BT - 1st International Workshop on Trustworthy Ubiquitous Computing, TwUC 2006

ER -