Skip to main content

Design of Anonymity-Preserving User Authentication and Key Agreement Protocol for Ubiquitous Computing Environments

  • Conference paper
Internet and Network Economics (WINE 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3828))

Included in the following conference series:

  • 1949 Accesses

Abstract

The spread of mobile devices, PDAs and sensors enabled the construction of ubiquitous computing environments, transforming regular physical spaces into “Smart space” augmented with intelligence and enhanced with services. However, the deployment of this computing paradigm in real-life is disturbed by poor security, particularly, the lack or proper authentication, authorization and key management techniques. Also, it is very important not only to find security measures but also to preserve user privacy in ubiquitous computing environment. In this paper, we propose efficient user authentication and key agreement protocol with anonymity for the privacy-preserving for ubiquitous computing environments. Our scheme is suitable for distributed environments with the computational constrained devices by using MAC-based security association token.

This work was supported by a grand No.R12-2003-0004-00012-0 from Ministry of Commerce, Industry and Energy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Neumann, B., Ts’o, T.: Kerberos: An Authentication Service for Computer Networks. IEEE Communications Magazine 32(9), 33–38 (1994)

    Article  Google Scholar 

  2. Kindberg, T., Zhang, K.: Secure Spontaneous Device Association. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, pp. 124–131. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  3. Al-Muhtadi, J., Ranganathan, A., Campbell, R., Mickunas, M.D.: A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments. In: Proceedings of the 22nd International Conference on Distributed Computing Systems Workshops, ICDCSW 2002 (2002)

    Google Scholar 

  4. Leighton, T., Micali, S.: Secret-Key Agreement without Public-Key Cryptography. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 456–479. Springer, Heidelberg (1994)

    Google Scholar 

  5. Kindberg, T., Zhang, K.: Validating and Securing Spontaneous Associations between Wireless Devices. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol. 2851, pp. 44–53. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  6. Kindberg, T., Fox, A.: System Software for Ubiquitous Computing. IEEE Pervasive Computing, 70–81 (January-March 2002)

    Google Scholar 

  7. Banavar, G., Bernstein, A.: Software infrastructure and design challenges for ubiquitous computing applications. Communications of the ACM 45(12), 92–96 (2002)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kang, Mh., Ryou, Hb., Choi, W. (2005). Design of Anonymity-Preserving User Authentication and Key Agreement Protocol for Ubiquitous Computing Environments. In: Deng, X., Ye, Y. (eds) Internet and Network Economics. WINE 2005. Lecture Notes in Computer Science, vol 3828. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11600930_49

Download citation

  • DOI: https://doi.org/10.1007/11600930_49

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30900-0

  • Online ISBN: 978-3-540-32293-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics