Advertisement

Authentication for Single/Multi Domain in Ubiquitous Computing Using Attribute Certification

  • Deok-Gyu Lee
  • Seo-Il Kang
  • Dae-Hee Seo
  • Im-Yeong Lee
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3983)

Abstract

The Ubiquitous computer environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. Intend computing environment that can use easily as user wants and it is the smart environment that user provides context awareness that is wanting computing environment. This Ubiquitous computing contains much specially weak side in security. Masquerade attack of that crawl that is quoted to user or server among device that is around user by that discrete various computing devices exist everywhere among them become possible. Hereupon, in this paper, proposed method that has following characteristic. Present authentication model through transfer or device. Suggest two method that realize authentication through device in case of moved to method (MD: Multi Domain) and user ownself space (SD: Single Domain) that realize authentication through device in case of moved user’s direct path who device differs.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Aresenault, A., Tuner, S.: Internet X.509 Public Key Infrastructure, Internet Draft (2000)Google Scholar
  2. 2.
    ITU-T, Draft ITU-T RECOMMANDATION X.509 version4, ITU-T Publications (2001) Google Scholar
  3. 3.
    Al-Muhtadi, J., Ranganathan, A., Campbell, R., Dennis Mickunas, M.: A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments. In: ICDCSW 2002, pp. 771–776 (2002)Google Scholar
  4. 4.
    Weiser, M.: Hot Topics: Ubiquitous Computing. IEEE Computer (October 1993)Google Scholar
  5. 5.
    Roman, M., Campbell, R.: GAIA: Enabling Active Spaces. In: 9th ACM SIGOPS European Workshop, Kolding, Denmark, September 17-20 (2000)Google Scholar
  6. 6.
    Farrell, S., Housley, R.: An Internet Attribute Certificate Profile for Authorization, Internet Draft (2001)Google Scholar
  7. 7.
    Sarma, S.E., Weis, S.A., Daniel, S.W.: White Paper: RFID Systems, Security & Privacy Implications, AUTO-ID Center, MIT (November 2002)Google Scholar
  8. 8.
    Gen-Ho, L.: Information Security for Ubiquitous Computing Environment. In: Symposium on Information Security 2003, Korea, pp. 629–651 (2003)Google Scholar
  9. 9.
    Lee, S.-Y., Jung, H.-S.: Ubiquitous Research Trend & Future Works. Wolrdwide IT 3(7), 1–12 (2002)Google Scholar
  10. 10.
    Lee, Y.-C.: Home Networks Technology & Market Trend. ITFIND Weeks Technology Trend(TIS-03-20) (1098), 22–33 (2003)Google Scholar
  11. 11.
    Aura Project home page, http://www-2.cs.cmu.edu/~aura/
  12. 12.
    CoolTown home page, http://www.cooltown.hp.com
  13. 13.
  14. 14.
    Microsoft Research, EasyLiving Website, http://www.research,microsoft.com/easyliving Google Scholar
  15. 15.
    Oxygen Project home page, http://oxygen.lcs.mit.edu/
  16. 16.
  17. 17.
    TRON Project home page, http://www.tron.org/index-e.html

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Deok-Gyu Lee
    • 1
  • Seo-Il Kang
    • 1
  • Dae-Hee Seo
    • 1
  • Im-Yeong Lee
    • 1
  1. 1.Division of Information Technology EngineeringSoonchunhyang UniversityAsan-si, Choongchungnam-doKorea

Personalised recommendations