SPUC: Security protocol for ubiquitous computing

被引:0
|
作者
Yang, Fan [1 ]
Lv, Qingcong [1 ]
Cao, Qiying [1 ]
机构
[1] Donghua Univ, Dept Comp Sci & Technol, Shanghai 201620, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We present a security protocol for ubiquitous computing. It provides data authentication, and data freshness besides unobtrusiveness that is the essential property of ubiquitous computing. We creatively use both asymmetric-key and symmetric-key algorithms to make the protocol more security and suffice severe resource constraints, limited computation, memory, and communication capacities.
引用
收藏
页码:757 / 760
页数:4
相关论文
共 50 条
  • [1] Security and privacy analysis of RFID authentication protocol for ubiquitous computing
    Kim, Hyun-Seok
    Choi, Jin-Young
    [J]. PROCEEDINGS - 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1-3, 2007, : 1359 - +
  • [2] Security and privacy in ubiquitous computing
    Miri, Ali
    Benslimane, Abderrahim
    Huang, Nen-Fu
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (12) : 1417 - 1419
  • [3] Survey of Ubiquitous Computing Security
    Li, Yin
    Chen, Yong
    Zhao, Jingxin
    Yue, Xinghui
    Zheng, Chen
    Wu, Yanjun
    Wu, Gaofei
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (05): : 1054 - 1081
  • [4] The security challenges of ubiquitous computing
    Stajano, F
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS CHES 2003, PROCEEDINGS, 2003, 2779 : 1 - 1
  • [5] Security policies and trust in ubiquitous computing
    Joshi, Anupam
    Finin, Tim
    Kagal, Lalana
    Parker, Jim
    Patwardhan, Anand
    [J]. PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2008, 366 (1881): : 3769 - 3780
  • [6] Special issue on security in ubiquitous computing
    Qu, Wenyu
    Xiang, Yang
    Zhang, Yong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (11) : 1221 - 1222
  • [7] Small worlds and the security of ubiquitous computing
    Vogt, H
    [J]. SIXTH IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS MOBILE AND MULTIMEDIA NETWORKS, PROCEEDINGS, 2005, : 593 - 597
  • [8] Security aspects of ubiquitous computing in health careSicherheitsaspekte von Ubiquitous Computing im Gesundheitsbereich
    E. Weippl
    A. Holzinger
    A. M. Tjoa
    [J]. e & i Elektrotechnik und Informationstechnik, 2006, 123 (4) : 156 - 161
  • [9] Security for ubiquitous computing: Problems and proposed solution
    Hung, Le Xuan
    Phuong, Tran Van
    Giang, Pho Duc
    Zhung, Yonil
    Lee, Sungyoung
    Lee, Young-Koo
    [J]. 12TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND REAL-TIME COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2006, : 110 - 113
  • [10] The resurrecting duckling: Security issues for ubiquitous computing
    Stajano, Frank
    Anderson, Ross
    [J]. Computer, 2002, 35 (SUPPL.) : 22 - 26