Browse > Article
http://dx.doi.org/10.13089/JKIISC.2006.16.2.3

Design of Anonymity-Preserving User Authentication and Key Agreement Protocol in Ubiquitous Computing Environments  

Kang Myung-Hee (Kwangwoon University)
Ryou Hwang-Bin (Kwangwoon University)
Abstract
The spread of mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical spaces into 'smart space' augmented with intelligence and enhanced with services. However, unless privacy concerns are taken into account early in the design process of various ubiquitous devices(e.g. mobile devices, PDAs, sensors, etc.). we will end up crating ubiquitous surveillance infrastructure. Also, it may inappropriate to use public key techniques for computational constrained devices in ubiquitous computing environment. In this paper, we propose efficient user authentication and ky agreement protocol not only to preserve anonymity for protecting personal privacy but also to be suitable for computational constrained devices in ubiquitous computing environments.
Keywords
User Authentication; Privacy; Key Agreement; Anonymity;
Citations & Related Records
연도 인용수 순위
  • Reference
1 권태경, 천정희, 김용대, 정찬주, '공개키 기반 구조에서 조건부 추적가능한 RSA 기반의 익 명 인증서 연구', 제 16회 정보보호와 암호에 관한 학술대회(WISC2004), pp.183-194, 2004
2 B. Neumann and T. Ts'o,, 'Kerberos: An Authentication Service for Computer Networks', IEEE Communications Magazine, 32(9): 33-38, September 1994   DOI   ScienceOn
3 Tom Leighton and Silvio Micali, 'Secret- Key Agreement without Public- Key Cryptography', Advances in Cryptology CRYPTO 1993, 456-479, 1994   DOI   ScienceOn
4 Kindberg, T. and Zhang, K.,'Validating and Securing Spontaneous Associations between Wireless Devices', Proceedings of 6th Information Security Conference(ISC'03), October 2003
5 Kindberg, T. and Zhang, K., 'Secure Spontaneous Device Association', Proceedings of UbiComp 2003: Ubiquitous Computing, vol. 2864 of Lecture Notes in Computer Science, Seattle, WA, USA, October 12-15, 2003. Springer Verlag
6 Freedom.net, http://www.freedom.net
7 Jalal Al-Muhtadi, R.Campbell, A.Kapadia, D.Micunas P.Naldurg and S.Yi, 'Routing Through the Mist: Privacy- Preserving Communication in Ubi quitous Computing Environments', Proc. of the International Conference of Distributed Computing Systems (ICDCS 2002), pp.65-74, Vienna, Austria, July 3, 2002
8 SafeWeb, http://www.safeweb.com
9 Jalal Al-Muhtadi, R.Campbell, A.Kapadia, D.Micunas and P.Naldurg, 'Socializing in the Mist: Privacy in Digital Communities', Technical Report UIUCDCS-R-2002-2271, April, 2002
10 Anonymizer, http://www.anonymizer.com
11 Jalal Al-Muhtadi, Anand Ranganathan, Roy Campbell and M. Dennis Mickunas, 'A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments', Proceedings of the 22nd International Conference on Distributed Computing Systems Workshops (ICDCSW' 02), 2002