Authentication for Ubiquitous multi domain in pervasive computing using PMI

被引:0
|
作者
Lee, Deok Gyu
Moon, Jong Sik
Park, Jong Hyuk
Lee, Im Yeong
机构
[1] Soonchunhyang Univ, Div Informat Technol Engn, Asan, Choongchungnam, South Korea
[2] Korea Univ, Ctr Informat Secur Technol, Seoul 136701, South Korea
关键词
pervasive computing; Multi Domain; authentication; PMI;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Ubiquitous computer environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. Intend computing environment that can use easily as user wants and it is the smart environment that user provides context awareness that is wanting computing environment. This Ubiquitous computing contains much especially weak side in security. Masquerade attack of that crawl that is quoted to user or server among device that is around user by that discrete various computing devices exist everywhere among them become possible. Hereupon, in this paper, proposed method that has following characteristic. Present authentication model through transfer or device. Suggest two method that realize authentication through device in case of moved to method (MD: Multi Domain) that realize authentication through device in case of moved user's direct path who device differs.
引用
收藏
页码:515 / 524
页数:10
相关论文
共 50 条
  • [31] Private entity authentication for pervasive computing environments
    Zhu, Feng
    Mutka, Matt W.
    Ni, Lionel M.
    International Journal of Network Security, 2012, 14 (02) : 86 - 100
  • [32] An Efficient Mutual Authentication Protocol using Biometric Information in Ubiquitous Computing
    Jeong, Yoonsu
    Hwang, Yooncheol
    Lee, Sangho
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [33] FORTHCOMING MULTIMEDIA & INTELLIGENT SERVICES IN UBIQUITOUS AND PERVASIVE COMPUTING
    You, Ilsun
    Kim, Bonam
    Hsu, Hui-Huang
    Yoo, Seong-Moo
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2010, 16 (04): : 491 - 493
  • [34] Mobile and internet services in ubiquitous and pervasive computing environments
    You, Ilsun
    Ogiela, Marek R.
    Chen, Yuh-Shyan
    Huang, Qingfeng
    INFORMATION SCIENCES, 2013, 230 : 1 - 2
  • [35] Special Issue on Security Aspects in Pervasive and Ubiquitous Computing
    Khan, Muhammad Khurram
    Kumar, Neeraj
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2015, 18 (1-2) : 1 - 2
  • [36] Human computer interaction for Ubiquitous/Pervasive Computing mode
    Xu, Guang-You
    Tao, Lin-Mi
    Shi, Yuan-Chun
    Zhang, Xiang
    Jisuanji Xuebao/Chinese Journal of Computers, 2007, 30 (07): : 1041 - 1053
  • [37] Ubiquitous and Pervasive Computing: Architectures and Protocols for Applications Design
    Bakhouya, Mohamed
    3RD ACM WORKSHOP ON AGENT-ORIENTED SOFTWARE ENGINEERING CHALLENGES FOR UBIQUITOUS AND PERVASIVE COMPUTING - AUPC 09, 2009, : 1 - 1
  • [38] On the challenges and opportunities of pervasive and ubiquitous computing in health care
    Moderator, P
    Znati, T
    Third IEEE International Conference on Pervasive Computing and Communications, Proceedings, 2005, : 396 - 396
  • [39] A Design of Ubiquitous Learning Environment with the Support of Pervasive Computing
    Zhang, Jing
    Zhang, Liwei
    Liu, Bing
    ADVANCED DESIGN AND MANUFACTURING TECHNOLOGY III, PTS 1-4, 2013, 397-400 : 2483 - +
  • [40] Mobile cloud computing framework for a pervasive and ubiquitous environment
    Min Choi
    Jonghyuk Park
    Young-Sik Jeong
    The Journal of Supercomputing, 2013, 64 : 331 - 356