Skip to main content

Safe Authentication Method for Security Communication in Ubiquitous

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3481))

Abstract

Ubiquitous computing environment has a lot of different things as for applying existing security technical. It needs authentication method which is different kinks of confidence level or which satisfies for privacy of user’s position. Using range localizes appoint workstation or it uses assumption which is satify environment of client in Kerberos authentication method which is representation of existing authentication method but it needs new security mechanism because it is difficult to offer the condition in ubiquitous computing environment. This paper want to prove the result which is authentication method for user authentication and offering security which are using wireless certificate from experiment in ubiquitous environment. Then I propose method which is offering security and authentication in ubiquitous environment.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Weiser, M.: Some Computer Science Problems in Ubiquitous Computing. Communications of the ACM (July 1993)

    Google Scholar 

  2. Weiser, M.: Ubiquitous Computing. Nikkei Electronics, 137–143 (December 1993)

    Google Scholar 

  3. Yoo, S., Kim, K., Hwang, Y., Piljoong Lee, H.: Satus-Based RFID AuthenticationProtocol. Journal of The Korean Institute of Information Security and Cryptology 14(6), 57–67 (2004)

    Google Scholar 

  4. Henrici, D., Muller, P.: Hash based enhancement of location privacy for radio frequency identification devices using varying identifiers. In: PerSec 2004, March 2004, pp. 149–153 (2004)

    Google Scholar 

  5. Hwang, Y., Lee, M., Lee, D., Lim, J.: Low-Cost RFID Authentication Protocol on Ubiquatous. In: CISC S 2004, pp. 120–122 (June 2004)

    Google Scholar 

  6. Weis, S., Sarma, S., Rivest, R., Engels, D.: Security and Privacy aspects of low-cost radio frequency identification system. In: SPC 2003, March 2003, pp. 457–469 (2003)

    Google Scholar 

  7. Beresford, A., Stajano, F.: Location Privacy in Pervasive Computing. In: IEEE Pervasive Computing 2003, pp. 46–55 (2003)

    Google Scholar 

  8. Stajano, F.: Security fot Ubiquitous Computing. Halsted Press (2002)

    Google Scholar 

  9. Langheinrich, M.: Privacy by Design Principles of Privacy-Aware Ubiquitous System. Presented at ACM UbiComp 2001, Atlanta, GA (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ko, H., Sohn, B., Park, H., Shin, Y. (2005). Safe Authentication Method for Security Communication in Ubiquitous. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3481. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424826_46

Download citation

  • DOI: https://doi.org/10.1007/11424826_46

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25861-2

  • Online ISBN: 978-3-540-32044-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics