electronic international standard serial number (EISSN)
Wireless, mobile, and context-awareness applications are considered to be the epitome of pervasive computing, but they bring with them the inherent security challenges of mobile ad-hoc networking. Mobile ad-hoc networks are mainly formed by mobile users, which can belong to different trust domains, in order to leverage the wealth of pervasive resources and available capabilities. The use of digital certificates is suitable for pervasive networking because of its decentralized and dynamic nature. Nevertheless, the validation of such certificates can become a more complex and costly process than it is in fixed-infrastructure networks. This is because pervasive networks face challenges such as environments that change with a certain degree of randomness, ad-hoc interactions with foreign devices, temporal disconnections that make it difficult to access updated and required information, and limited devices running costly processes.
certificate validation efficiency; pkix; pervasive networks; trust management; decision engine; ad hoc networks; wireless; protocol; mobile; environment