Authenticating Devices in Ubiquitous Computing Environment
نویسندگان
چکیده
The deficient of a good authentication protocol in a ubiquitous application environment has made it a good target for adversaries. As a result, all the devices which are participating in such environment are said to be exposed to attacks such as identity impostor, man-in-the-middle attacks and also unauthorized attacks. Thus, this has created skeptical among the users and has resulted them of keeping their distance from such applications. For this reason, in this paper, we are proposing a new authentication protocol to be used in such environment. Unlike other authentication protocols which can be adopted to be used in such environment, our proposed protocol could avoid a single point of failures, implements trust level in granting access and also promotes decentralization. It is hoped that the proposed authentication protocol can reduce or eliminate the problems
منابع مشابه
System support for ubiquitous computing
An important issue in a ubiquitous computing world is that of future personal devices and how they communicate with their environment. This paper discusses smart digital identities that represent user’s in the digital world and are able to perform operations such as authenticating the user to other parties. Furthermore, the environment with its many different devices, operating systems and netw...
متن کاملCBUD Micro: A Micro Benchmark for Performance Measurement and Resource Management in IaaS Clouds
Cloud computing provides processing power in form of virtual machines. This processing power can be given to very big and small devices. Similarly for providing processing power, devices with small or big processing power can be utilized. These devices can also be ubiquitous computing devices. Ubiquitous computing devices present in environment may communicate with each other. Ubiquitous comput...
متن کاملExtending Aura with an Augmented Reality Interface
In a ubiquitous computing environment augmented reality would be an ideal choice for a display for the user. An augmented reality display assists users by adding computer generated information to their perception of reality, thus making it ideal for ubiquitous computing. Unfortunately augmented reality is technically difficult and costly to implement even when the application is designed for it...
متن کاملClicky: User-centric Input for Active Spaces
We present a user-centric input system that is useful for a variety of applications in ubiquitous computing environments. Users in these environments currently switch between different keyboards and mice, or other devices, to interact with all the devices present. Allowing users to select a personal input device for the space and use it to interact with all the devices in the space is a more na...
متن کاملWComp, a Middleware for Ubiquitous Computing
Ubiquitous computing relies on computers present everywhere, at any times and in any things. Indeed with recent years advance in mobile communication technologies and the miniaturization of computer hardware, processing units are becoming invisible and a part of the environment. Middlewares for ubiquitous computing have to manage three main features specific to their environment: devices’ mobil...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012