Authenticating Devices in Ubiquitous Computing Environment

نویسندگان

  • Kamarularifin Abd Jalil
  • Qatrunnada Binti Abdul Rahman
چکیده

The deficient of a good authentication protocol in a ubiquitous application environment has made it a good target for adversaries. As a result, all the devices which are participating in such environment are said to be exposed to attacks such as identity impostor, man-in-the-middle attacks and also unauthorized attacks. Thus, this has created skeptical among the users and has resulted them of keeping their distance from such applications. For this reason, in this paper, we are proposing a new authentication protocol to be used in such environment. Unlike other authentication protocols which can be adopted to be used in such environment, our proposed protocol could avoid a single point of failures, implements trust level in granting access and also promotes decentralization. It is hoped that the proposed authentication protocol can reduce or eliminate the problems

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

System support for ubiquitous computing

An important issue in a ubiquitous computing world is that of future personal devices and how they communicate with their environment. This paper discusses smart digital identities that represent user’s in the digital world and are able to perform operations such as authenticating the user to other parties. Furthermore, the environment with its many different devices, operating systems and netw...

متن کامل

CBUD Micro: A Micro Benchmark for Performance Measurement and Resource Management in IaaS Clouds

Cloud computing provides processing power in form of virtual machines. This processing power can be given to very big and small devices. Similarly for providing processing power, devices with small or big processing power can be utilized. These devices can also be ubiquitous computing devices. Ubiquitous computing devices present in environment may communicate with each other. Ubiquitous comput...

متن کامل

Extending Aura with an Augmented Reality Interface

In a ubiquitous computing environment augmented reality would be an ideal choice for a display for the user. An augmented reality display assists users by adding computer generated information to their perception of reality, thus making it ideal for ubiquitous computing. Unfortunately augmented reality is technically difficult and costly to implement even when the application is designed for it...

متن کامل

Clicky: User-centric Input for Active Spaces

We present a user-centric input system that is useful for a variety of applications in ubiquitous computing environments. Users in these environments currently switch between different keyboards and mice, or other devices, to interact with all the devices present. Allowing users to select a personal input device for the space and use it to interact with all the devices in the space is a more na...

متن کامل

WComp, a Middleware for Ubiquitous Computing

Ubiquitous computing relies on computers present everywhere, at any times and in any things. Indeed with recent years advance in mobile communication technologies and the miniaturization of computer hardware, processing units are becoming invisible and a part of the environment. Middlewares for ubiquitous computing have to manage three main features specific to their environment: devices’ mobil...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012