Abstract
Ubiquitous computing environment has a lot of different things as for applying existing security technical. It needs authentication method which is different kinks of confidence level or which satisfies for privacy of user’s position. Using range localizes appoint workstation or it uses assumption which is satify environment of client in Kerberos authentication method which is representation of existing authentication method but it needs new security mechanism because it is difficult to offer the condition in ubiquitous computing environment. This paper want to prove the result which is authentication method for user authentication and offering security which are using wireless certificate from experiment in ubiquitous environment. Then I propose method which is offering security and authentication in ubiquitous environment.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Weiser, M.: Some Computer Science Problems in Ubiquitous Computing. Communications of the ACM (July 1993)
Weiser, M.: Ubiquitous Computing. Nikkei Electronics, 137–143 (December 1993)
Yoo, S., Kim, K., Hwang, Y., Piljoong Lee, H.: Satus-Based RFID AuthenticationProtocol. Journal of The Korean Institute of Information Security and Cryptology 14(6), 57–67 (2004)
Henrici, D., Muller, P.: Hash based enhancement of location privacy for radio frequency identification devices using varying identifiers. In: PerSec 2004, March 2004, pp. 149–153 (2004)
Hwang, Y., Lee, M., Lee, D., Lim, J.: Low-Cost RFID Authentication Protocol on Ubiquatous. In: CISC S 2004, pp. 120–122 (June 2004)
Weis, S., Sarma, S., Rivest, R., Engels, D.: Security and Privacy aspects of low-cost radio frequency identification system. In: SPC 2003, March 2003, pp. 457–469 (2003)
Beresford, A., Stajano, F.: Location Privacy in Pervasive Computing. In: IEEE Pervasive Computing 2003, pp. 46–55 (2003)
Stajano, F.: Security fot Ubiquitous Computing. Halsted Press (2002)
Langheinrich, M.: Privacy by Design Principles of Privacy-Aware Ubiquitous System. Presented at ACM UbiComp 2001, Atlanta, GA (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ko, H., Sohn, B., Park, H., Shin, Y. (2005). Safe Authentication Method for Security Communication in Ubiquitous. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3481. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424826_46
Download citation
DOI: https://doi.org/10.1007/11424826_46
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25861-2
Online ISBN: 978-3-540-32044-9
eBook Packages: Computer ScienceComputer Science (R0)