Total views : 124

Secure Communication Architecture for Privacy and Authentication in Ubiquitous Computing

Affiliations

  • I. K. Gujral Punjab Technical University, Jalandhar – 144603, Punjab, India
  • Chitkara University, Patiala – 140401, Punjab, India

Abstract


Objectives: To change the conventional safety mechanism for the omnipresent condition. The security strategies must change with respect to the change in a specific situation. Thus, security approaches must be powerful as well as dynamic. Method: Framework of a ubiquitous computing environment consists of devices in all forms; sensors everywhere seamlessly associated to wireless networks to offer computing / communication services to the user. In this study, we have proposed an architecture that preserves the user’s privacy and authenticates the devices for secure communication between the devices and service providers. Findings: The secure architecture discussed in this research paper uses a unique pass-key exchange with a token combination during the data exchange to protect user privacy. This mechanism not only protects the user privacy but also authenticates the user. Application: This architecture can be used anywhere in the ubiquitous environment for security enhancement.

Keywords

Authentication, Privacy, Secure Architecture, Secure Communication, Ubiquitous Computing

Full Text:

 |  (PDF views: 86)

References


  • Mark W. The computer for the 21st century. Scientific American. 1991 Sep; 265(3):94–104. CrossRef.
  • Jain N, Panda SN, Kumar A. Future scintillation of ubiquitous computing. International Journal of Computing and Business Research. 2012 Sep; 3:1–15.
  • Campbell RE. Towards security and privacy for pervasive computing. Software Security—Theories and Systems, Springer Berlin Heidelberg; 2003. p. 1–15. CrossRef.
  • BoFu FD. User centric trust based access control management for ubiquitous computing environments. IEEE Network Operations and Management Symposium Workshops; 2008. p. 265–74
  • Kumar R. Pervasive computing. A safe walk in the woods? Survey paper [Internet]. 2002. Available from: http://www.cs.umn.edu/~richa/reports/PC. ps.
  • Liu WF. Information hiding for pervasive trusted authentication.Proceedings of IEEE Pervasive Computing Joint Conferences, (JCPC); 2009. p. 653–6.
  • Corella F, Lewison K. Strong and convenient multifactor authentication on mobile devices. 2012 Sep; 2(7):12–18.
  • Chaw R, Jakobsson M, Masuoka R, Molina J, Niu Y, Shi E. Authentication in the clouds: A framework and its application to mobile users. CCSW, ACM. 2012 Oct; 63(2):352–8.
  • Zadeh MB. Keystroke dynamic authentication in mobile cloud computing. International Journal of Computer Applications. 2014 Mar; 90(1):35–9.
  • Chang CC. A multipurpose key agreement scheme in ubiquitous computing environments. Mobile Information Systems. Hindawi Publishing Corporation. 2015; 2015.
  • Jalil KA, Rahman QBA. Authenticating devices in ubiquitous computing environment. International Journal of Cyber-Security and Digital Forensics. 2012; 1(2):75– 81.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.