Browse > Article

A Security Framework for Ubiquitous Computing Environment  

Chae, Cheol-Joo (Department of Computer Engineering, Hannam University)
Shin, Hyo-Young (Department of Internet Information, Kyungbok College)
Lee, Jae-Kwang (Department of Computer Engineering, Hannam University)
Abstract
Most security solutions and middleware on home network consider internet users as approaching subject. It is unrealistic where the most subjects are mobile users who want to control home network devices. Therefore minor and fast certification structures are needed to control other devices with mobile device that has lower computing capacity. To solve the above problems, this paper wants to build safe certification frame work for internet and mobile users to control household devices safely. New certification structure is proposed to get out of heavy certification structure like PKI and to minimize encrypting and decrypting operation by compounding session key and public key.
Keywords
Ubiquitous Computing Security; Mobile Security; Authentication; PKI;
Citations & Related Records
연도 인용수 순위
  • Reference
1 K. Wrona, "Distributed Security: Ad-Hoc Netwroks and Beyond," Workshop on Requirements for Mobile Privacy and Security, 2002
2 Carl M.Ellison, "Interoperable Home Infrastructure Home Network Security," Intel Technology Journal, Vol.6, 2002
3 F. Stajano, R Anderson, "The Resurrecting Duckling: Security Issues for Ubiquitous Computing, Wiley, 2002
4 J. P. Hubaux, L. Buttyn, and S. Apkun, "The Quest for Security in Mobile Ad Hoc Networks," ACM Symposium on Mobile Ad Hoc Networking and Computing, 2001   DOI
5 A. Weimerskirch, and G Thonet, "A Distributed Light-Weight Authentication Model for Ad Hoc Networks," Lecture Notes in Computer Science, Vol.2288, 2001   DOI   ScienceOn
6 F. Stajano, "Security for Ubiquitous Computing," first Security & Privacy supplement to IEEE Computer, Apr. 2002