Authentication for Ubiquitous multi domain in pervasive computing using PMI

被引:0
|
作者
Lee, Deok Gyu
Moon, Jong Sik
Park, Jong Hyuk
Lee, Im Yeong
机构
[1] Soonchunhyang Univ, Div Informat Technol Engn, Asan, Choongchungnam, South Korea
[2] Korea Univ, Ctr Informat Secur Technol, Seoul 136701, South Korea
关键词
pervasive computing; Multi Domain; authentication; PMI;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Ubiquitous computer environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. Intend computing environment that can use easily as user wants and it is the smart environment that user provides context awareness that is wanting computing environment. This Ubiquitous computing contains much especially weak side in security. Masquerade attack of that crawl that is quoted to user or server among device that is around user by that discrete various computing devices exist everywhere among them become possible. Hereupon, in this paper, proposed method that has following characteristic. Present authentication model through transfer or device. Suggest two method that realize authentication through device in case of moved to method (MD: Multi Domain) that realize authentication through device in case of moved user's direct path who device differs.
引用
收藏
页码:515 / 524
页数:10
相关论文
共 50 条
  • [1] Authentication for single/multi domain in Ubiquitous computing using attribute certification
    Lee, Deok-Gyu
    Kang, Seo-Il
    Seo, Dae-Hee
    Lee, Im-Yeong
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, 2006, 3983 : 326 - 335
  • [2] Pervasive/Ubiquitous Computing
    Friedemann Mattern
    Informatik-Spektrum, 2001, 24 (3) : 145 - 147
  • [3] Authentication for pervasive computing
    Creese, S
    Goldsmith, M
    Roscoe, B
    Zakiuddin, I
    SECURITY IN PERVASIVE COMPUTING, 2004, 2802 : 116 - 129
  • [4] An inter-domain authentication scheme for pervasive computing environment
    Yao, Lin
    Wang, Lei
    Kong, Xiangwei
    Wu, Guowei
    Xia, Feng
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2010, 60 (02) : 234 - 244
  • [5] Multi-modal authentication for ubiquitous computing environments
    Kwon, Taekyoung
    Park, Sang-ho
    Shin, Sooyeon
    UNIVERSAL ACCESS IN HUMAN-COMPUTER INTERACTION: AMBIENT INTERACTION, PT 2, PROCEEDINGS, 2007, 4555 : 113 - +
  • [6] Fair authentication in pervasive computing
    Li, Jun
    Christianson, Bruce
    Loomes, Martin
    SECURE MOBILE AD-HOC NETWORKS AND SENSORS, 2006, 4074 : 132 - 143
  • [7] An authentication protocol for pervasive computing
    Li, SQ
    Zhou, JY
    Li, XX
    Chen, KF
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, 2005, 3758 : 553 - 563
  • [8] Visualizing the research on pervasive and ubiquitous computing
    Zhao, Rongying
    Wang, Ju
    SCIENTOMETRICS, 2011, 86 (03) : 593 - 612
  • [9] Jini supporting ubiquitous and pervasive computing
    Hallenborg, K
    Kristensen, BB
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2003: COOPIS, DOA, AND ODBASE, 2003, 2888 : 1110 - 1132
  • [10] Trustworthiness and Authentication in Ubiquitous Computing
    Xiao, Hannan
    Malcolm, James
    Christianson, Bruce
    Zhang, Ying
    PROCEEDINGS OF THE 10TH ACM INTERNATIONAL SYMPOSIUM ON MOBILITY MANAGEMENT AND WIRELESS ACCESS, 2012, : 135 - 138