Authentication for Ubiquitous multi domain in pervasive computing using PMI

被引:0
|
作者
Lee, Deok Gyu
Moon, Jong Sik
Park, Jong Hyuk
Lee, Im Yeong
机构
[1] Soonchunhyang Univ, Div Informat Technol Engn, Asan, Choongchungnam, South Korea
[2] Korea Univ, Ctr Informat Secur Technol, Seoul 136701, South Korea
关键词
pervasive computing; Multi Domain; authentication; PMI;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Ubiquitous computer environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. Intend computing environment that can use easily as user wants and it is the smart environment that user provides context awareness that is wanting computing environment. This Ubiquitous computing contains much especially weak side in security. Masquerade attack of that crawl that is quoted to user or server among device that is around user by that discrete various computing devices exist everywhere among them become possible. Hereupon, in this paper, proposed method that has following characteristic. Present authentication model through transfer or device. Suggest two method that realize authentication through device in case of moved to method (MD: Multi Domain) that realize authentication through device in case of moved user's direct path who device differs.
引用
收藏
页码:515 / 524
页数:10
相关论文
共 50 条
  • [41] Mobile cloud computing framework for a pervasive and ubiquitous environment
    Choi, Min
    Park, Jonghyuk
    Jeong, Young-Sik
    JOURNAL OF SUPERCOMPUTING, 2013, 64 (02): : 331 - 356
  • [42] BAPUC: A broadcast authentication protocol for ubiquitous computing
    Yang Fan
    Cai Hai-Bin
    Cao Qi-Ying
    Lv Qing-Cong
    ICIEA 2008: 3RD IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, PROCEEDINGS, VOLS 1-3, 2008, : 2560 - 2564
  • [43] HyCPK: Securing Identity Authentication in ubiquitous computing
    Xu, Guangquan
    Ren, Yan
    Zhang, Gaoxu
    Liu, Bin
    Li, Xiaohong
    Feng, Zhiyong
    IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 239 - 246
  • [44] A PRIVACY-PRESERVING AUTHENTICATION SCHEME USING BIOMETRICS FOR PERVASIVE COMPUTING ENVIRONMENTS
    Yao Lin Kong Xiangwei Wu Guowei Fan Qingna Lin Chi(School of Electronics & Information Engineering
    JournalofElectronics(China), 2010, 27 (01) : 68 - 78
  • [45] Chaining the Secret: Lightweight Authentication for Security in Pervasive Computing
    Han, Jiyong
    2016 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATION WORKSHOPS (PERCOM WORKSHOPS), 2016,
  • [46] An authentication mechanism of digital contents in pervasive computing environment
    Jang, Eun-Gyeom
    Koh, Byoung-Soo
    Choi, Yong-Rak
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 527 - +
  • [47] CLIBDA: A Deniable Authentication Scheme for Pervasive Computing Environment
    Ahene, Emmanuel
    Guan, Yuanfeng
    Zhang, Zhiwei
    Li, Fagen
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 67 - 83
  • [48] XAI for U: Explainable AI for Ubiquitous, Pervasive and Wearable Computing
    Gjoreski, Martin
    Hassan, Teena
    Vered, Mor
    Houben, Sebastian
    Kopp, Stefan
    COMPANION OF THE 2024 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING, UBICOMP COMPANION 2024, 2024, : 992 - 995
  • [49] Managing Pervasive Computing and Ubiquitous Communications: A Report on APNOMS 2003
    Kenichi Mase
    Il-Soo Ahn
    Nobuo Fujii
    Young-Chul Shim
    Journal of Network and Systems Management, 2003, 11 (4) : 505 - 509
  • [50] Global pervasive and ubiquitous computing during 2005-14
    Dhawan, S. M.
    Gupta, B. M.
    Gupta, Ritu
    ANNALS OF LIBRARY AND INFORMATION STUDIES, 2016, 63 (02) : 117 - 125