Ubiquitous access and pervasive computing concept is almost intrinsically tied to wireless communications. Emerging next-generation wireless networks enable innovative service access in every situation. Apart from many remote services, proximity services will also be widely available. People currently rely on numerous forms of identities to access these services. The inconvenience of possessing and using these identities creates significant security vulnerability, especially from network and device point of view in wireless service access. After explaining the current identity solutions scenarios, the chapter illustrates the on-going efforts by various organizations, the requirements and frameworks to develop an innovative, easy-to-use identity management mechanism to access the future diverse service worlds. The chapter also conveys various possibilities, challenges, and research questions evolving in these areas.
Key Terms in this Chapter
Biometrics: Biometrics is the biological identification of a person which may include characteristics of structure and of action such as iris and retinal patterns; hand geometry; fingerprints; voice response to challenges; the dynamics of hand-written signatures, and so forth.
Authentication: Authentication is to prove as genuine.
Revocation of Identity: Revocation of identity is the act of recalling or annulling the identity.
Circle of Trust: Circle of trust is a trust relationship through agreement among various service providers.
Pervasive Computing: Pervasive computing is the use of computing devices everywhere and these devices communicate with each other over wireless networks without any interactions required by the user.
Federation: Federation is the joining together to form a union through agreement.
PIN: Personal identification number.
IDP: Identity providers.
Ubiquitous: Ubiquitous is being or seeming to be everywhere at the same time.
Proximity Service: Proximity services are those available close to the users.
Life cycle: Life cycle is the progression through a series of different stages of development.
Smart Card: Smart card is a card containing a computer chip that enables the holder to perform various operations requiring data stored on chip.
EAP-TLS and EAP-AKA: EAP-TLS and EAP-AKA are authentication frameworks frequently used in wireless networks.
Single Sign-On (SSO): SSO on is the ability for users to log on once to a network and be able to access all authorized resources within the domain.
SP: Service providers.
Personalization: Personalization is when something is customized or tailored for the user, taking into consideration that person’s habits and preferences.