Loading…
Design of Authentication Model Preserving Intimacy and Trust in Intelligent Environments
With the recent advances in communication technologies for low-power devices, pervasivecomputing environments (PCE) spread as new domains beyond legacy enterprise andpersonal computing. The intelligent home network environment is thing which invisibledevice that is not shown linked mutually through...
Saved in:
Published in: | Network protocols and algorithms 2015-04, Vol.7 (1), p.64 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | With the recent advances in communication technologies for low-power devices, pervasivecomputing environments (PCE) spread as new domains beyond legacy enterprise andpersonal computing. The intelligent home network environment is thing which invisibledevice that is not shown linked mutually through network so that user may use device alwaysis been pervasive. Smart devices are interconnected and collaborate as a global distributedsystem to infuse intelligence into systems and processes. This kind of environment providesvarious smart services and makes consequently an offer of convenient, pleasant, and blessedlives to people. However, the risk is high as long as the offer is pleasant and convenient. Insuch context, security is still very fragile and there is often a violation of user privacy andservice interference. For this, a special interest in ubiquitous network security is going up.Safety lies primarily in the authentication of users accessing the network. It guarantees thatonly legitimate users can login and access to services indoor the network. In this paper, wepropose an anonymous authentication and access control scheme to secure the interactionbetween mobile users handling smart devices and smart services in PCEs. In an environmentbased on public key infrastructure (PKI) and Authentication, Authorization, and Accounting(AAA), the proposed authentication protocol combines both network authenticationtechnique based on symmetric keys and single sign-on mechanisms. The authenticationprotocol is simple and secure, protects the privacy of user and aims to satisfy the securityrequirements. |
---|---|
ISSN: | 1943-3581 1943-3581 |
DOI: | 10.5296/npa.v7i1.7208 |