Date Added: Jul 2010
Mobile users are increasing fast in numbers, new types of services and applications become available, and new mobile systems (e.g., for intelligent transportation) emerge. Meanwhile, the need for securing communication in such large scale, highly dynamic systems grows. But the organizational complexity and operational costs make traditional security solutions hard to deploy at the rate new mobile applications are rolled out. The challenge that lies ahead is how to provide versatile security compatible with the large deployed mobile networking infrastructure. The authors propose a novel approach to establish cryptographic keys. The basic observation is that users are often very mobile and, as they interact with the infrastructure, each of them can leave a unique trace behind.