Authentication for Ubiquitous multi domain in pervasive computing using PMI

被引:0
|
作者
Lee, Deok Gyu
Moon, Jong Sik
Park, Jong Hyuk
Lee, Im Yeong
机构
[1] Soonchunhyang Univ, Div Informat Technol Engn, Asan, Choongchungnam, South Korea
[2] Korea Univ, Ctr Informat Secur Technol, Seoul 136701, South Korea
关键词
pervasive computing; Multi Domain; authentication; PMI;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Ubiquitous computer environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. Intend computing environment that can use easily as user wants and it is the smart environment that user provides context awareness that is wanting computing environment. This Ubiquitous computing contains much especially weak side in security. Masquerade attack of that crawl that is quoted to user or server among device that is around user by that discrete various computing devices exist everywhere among them become possible. Hereupon, in this paper, proposed method that has following characteristic. Present authentication model through transfer or device. Suggest two method that realize authentication through device in case of moved to method (MD: Multi Domain) that realize authentication through device in case of moved user's direct path who device differs.
引用
收藏
页码:515 / 524
页数:10
相关论文
共 50 条
  • [21] The first summer school on ubiquitous and pervasive computing
    Beresford, A
    Kalló, CK
    Kretschmer, U
    Mattern, F
    Muehlenbrock, M
    IEEE PERVASIVE COMPUTING, 2003, 2 (01) : 84 - 88
  • [22] Anonymity authentication and measure in ubiquitous computing
    Guo Yajun
    Yan Huifang
    Li Rong
    INTERNATIONAL SYMPOSIUM ON ADVANCES IN COMPUTER AND SENSOR NETWORKS AND SYSTEMS, PROCEEDINGS: IN CELEBRATION OF 60TH BIRTHDAY OF PROF. S. SITHARAMA IYENGAR FOR HIS CONTRIBUTIONS TO THE SCIENCE OF COMPUTING, 2008, : 63 - 68
  • [23] Anonymity Authentication and Measure in Ubiquitous Computing
    Guo Yajun
    Yan Huifang
    Li Rong
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2009, 5 (01): : 21 - 21
  • [24] Ubiquitous computing: Connecting Pervasive computing through Semantic Web
    Singh S.
    Puradkar S.
    Lee Y.
    Information Systems and e-Business Management, 2006, 4 (4) : 421 - 439
  • [25] Smart Environment Authentication: Multi-Domain Authentication, Authorization, Security Policy for Pervasive Network
    Lee, Deok Gyu
    Kim, Geon Woo
    Han, Jong Wook
    Jeong, Young-Sik
    Park, Doo Soon
    INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 99 - 104
  • [26] Identity-Based Inter-domain Authentication Scheme in Pervasive Computing Environments
    Huo, Shi-Wei
    Luo, Chang-Yuan
    Xin, Hong-Zhi
    INTELLIGENT COMPUTING AND INFORMATION SCIENCE, PT II, 2011, 135 : 314 - 320
  • [27] Using a two dimensional colorized barcode solution for authentication in pervasive computing
    Claycomb, William
    Shin, Dongwan
    INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, PROCEEDINGS, 2006, : 173 - +
  • [28] Practical deniable authentication for pervasive computing environments
    Li, Fagen
    Hong, Jiaojiao
    Omala, Anyembe Andrew
    WIRELESS NETWORKS, 2018, 24 (01) : 139 - 149
  • [29] Research on use of distributed authentication in pervasive computing
    Liu, Hui
    Zhang, Cai-Ming
    2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 571 - +
  • [30] Practical deniable authentication for pervasive computing environments
    Fagen Li
    Jiaojiao Hong
    Anyembe Andrew Omala
    Wireless Networks, 2018, 24 : 139 - 149