Browse > Article

An Anonymity-Preserving User Authentication and Authorization Model for Ubiquitous Computing Environments  

Kang Myung-Hee (Dept. of Computer Science, Kwangwoon University)
Ryou Hwang-Bin (Dept. of Computer Science, Kwangwoon University)
Publication Information
Abstract
The spread of mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical spaces into 'Smart space' augmented with intelligence and enhanced with services. However, the deployment of this computing paradigm in real-life is disturbed by poor security, particularly, the lack of proper authentication and authorization techniques. Also, it is very important not only to find security measures but also to preserve user privacy in ubiquitous computing environments. In this Paper, we propose efficient user authentication and authorization model with anonymity for the privacy-preserving for ubiquitous computing environments. Our model is suitable for distributed environments with the computational constrained devices by using MAC-based anonymous certificate and security association token instead of using Public key encryption technique. And our Proposed Protocol is better than Kerberos system in sense of cryptographic computation processing.
Keywords
Anonymity; Authorization; Privacy; User Authentication;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Ha, W., et at. 'Confusion of Physical Space and Electronic Space: Ubiquitous IT Revolution and the Third Space', Korean Electronic Times, 2002
2 G. Banavar and A. Bernstein, 'Software infrastructure and design challenges for ubiquitous computing applications', Communications of the ACM, vol. 45(12), pp. 92-6, 2002   DOI
3 C. H. Lim, 'Authenticated Key Distributed for Security Services in Open Networks', Future system Technical Report, May 1997
4 T. Kindberg and A. Fox, 'System Software for Ubiquitous Computing', IEEE Pervasive Computing, January-March, 2002, pp. 70-81   DOI   ScienceOn
5 Weiser, M., 'The Computer for the Twenty-First Century', Scientific American, vol.256, No. 3, pp. 94-104, September 1991
6 Kindberg, T. and Zhang, K, 'Validating and Securing Spontaneous Associations between Wireless Devices', Proceedings of 6th Information Security Conference(ISC'03), October 2003
7 Jalal Al-Muhtadi, Anand Ranganathan, Roy Campbell and M. Dennis Mickunas, 'A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments', Proceedings of the 22nd International Conference on Distributed Computing Systems Workshops (ICDCSW'02), 2002   DOI
8 B. Neumann and T. Ts'o, 'Kerberos: An Authentication Service for Computer Networks', IEEE Communications Magazine, 32(9): 33-38, September 1994   DOI   ScienceOn
9 Tom Leighton and Silvio Micali, 'Secret-Key Agreement without Public-Key Cryptography', Advances in Cryptology CRYPTO 1993, 456-479, 1994   DOI
10 권태경, 박해룡, 이철수 '공개키 기반 구조에 기반한 익명게시판 기술 현황' 정보보호학회학술지, 제14권, 제6호, 1-13쪽, 2004년 12월   과학기술학회마을
11 T. Kwon, J. Cheon, and Y. Kim, 'Anonymous Certificate and its Application', in preparation and available form http://dasan.sejong.ac.kr/-tkwon/research/pseudonym2.pdf, 2004
12 Kindberg, T. and Zhang, K., 'Secure Spontaneous Device Association', Proceedings of UbiComp 2003: Ubiquitous Computing, vol. 2864 of Lecture Notes in Computer Science, Seattle, WA, USA, October 12-15, 2003. Springer Verlag