Ticket based service access for the mobile user

Traditional mechanisms for service access, by mobile hosts across muhiple service domains, rely on the concept of a home location and cross domain authentication using roaming agreements. The reasons for requiring a home location are considered and it is argued that with recent developmenrs in elecn-onic payment schemes an alternative is possible. In an environment with many service providers, a wide range of services, and a diverse user population, roaming agreements based on a home location provide a far from ideal solution. An allernative “homeless” mechanism based on the notion of tickets is proposed. The requirements and impacts of such a scheme are considered. The proposed scheme is described and anaiysed to show robusrness against specific problems. A description of a protogpe implemenration is included, together with ideas for firm-e work.

[1]  Jennifer Widom,et al.  Efficient and flexible location management techniques for wireless communication systems , 1996, MobiCom '96.

[2]  M. Rahnema,et al.  Overview of the GSM system and protocol architecture , 1993, IEEE Communications Magazine.

[3]  Charles E. Perkins,et al.  IP Mobility Support , 1996, RFC.

[4]  D. Everett Cowry shell to smart card [electronic cash] , 1997 .

[5]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[6]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[7]  Markus G. Kuhn,et al.  Tamper resistance: a cautionary note , 1996 .

[8]  Marvin Theimer,et al.  Customizing Mobile Applications , 1993, Symposium on Mobile and Location-Independent Computing.

[9]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[10]  Tomasz Imielinski,et al.  Mobile wireless computing: challenges in data management , 1994, CACM.

[11]  Bill N. Schilit,et al.  An overview of the PARCTAB ubiquitous computing experiment , 1995, IEEE Wirel. Commun..

[12]  Theodore Y. Ts'o,et al.  Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.

[13]  Stuart K. Williams,et al.  The IrDA platform , 1998 .

[14]  D.G.W. Birch,et al.  Closing the loop-payment on demand for interactive services , 1995 .