A Security Framework for Ubiquitous Computing Environment

  • Published : 2009.09.30

Abstract

Most security solutions and middleware on home network consider internet users as approaching subject. It is unrealistic where the most subjects are mobile users who want to control home network devices. Therefore minor and fast certification structures are needed to control other devices with mobile device that has lower computing capacity. To solve the above problems, this paper wants to build safe certification frame work for internet and mobile users to control household devices safely. New certification structure is proposed to get out of heavy certification structure like PKI and to minimize encrypting and decrypting operation by compounding session key and public key.

Keywords

References

  1. Carl M.Ellison, "Interoperable Home Infrastructure Home Network Security," Intel Technology Journal, Vol.6, 2002
  2. F. Stajano, R Anderson, "The Resurrecting Duckling: Security Issues for Ubiquitous Computing, Wiley, 2002
  3. F. Stajano, "Security for Ubiquitous Computing," first Security & Privacy supplement to IEEE Computer, Apr. 2002
  4. J. P. Hubaux, L. Buttyn, and S. Apkun, "The Quest for Security in Mobile Ad Hoc Networks," ACM Symposium on Mobile Ad Hoc Networking and Computing, 2001 https://doi.org/10.1145/501436.501437
  5. A. Weimerskirch, and G Thonet, "A Distributed Light-Weight Authentication Model for Ad Hoc Networks," Lecture Notes in Computer Science, Vol.2288, 2001 https://doi.org/10.1007/3-540-45861-1_26
  6. K. Wrona, "Distributed Security: Ad-Hoc Netwroks and Beyond," Workshop on Requirements for Mobile Privacy and Security, 2002