首页> 外文会议>International Conference on Cyber Security, Cyber Warfare and Digital Forensic >Multiple trusted devices authentication protocol for ubiquitous computing applications
【24h】

Multiple trusted devices authentication protocol for ubiquitous computing applications

机译:无处不在的计算应用程序的多个可信设备认证协议

获取原文

摘要

The dynamicity of ubiquitous application environment where devices are free to connect and disconnect has made it exposed to adversaries. Identity impostor, man-in-the-middle attack and unauthorized access are some of the threats posed by the potential adversaries. These threats exist due to the lack of good authentication protocol for ubiquitous application environment. As a result, some users are keeping their distance from such applications. In this paper, a new authentication protocol which employs multiple trusted devices to validate other device's identity is introduced. The proposed protocol is somewhat different with the other authentication protocols in sense that it could avoid a single point of failure, promotes decentralization and also implements trust level in granting access. It is hoped that by implementing the proposed protocol, the integrity of the entities involved in a ubiquitous computing applications can be increased.
机译:无处不在的应用环境的动态性,其中设备可以自由连接和断开,使其暴露于对手。身份冒名顶替者,中间人攻击和未经授权的访问是潜在的对手构成的一些威胁。由于普遍存在应用环境缺乏良好的认证协议,因此存在这些威胁。结果,一些用户正在保持与此类应用的距离。本文介绍了采用多个可信设备验证其他设备的身份的新认证协议。所提出的协议有点不同,与其他身份验证协议有意义,它可以避免单点故障,促进分散化,并且还实现授予访问权限的信任级别。希望通过实施所提出的协议,可以增加涉及普遍存在的计算应用程序的实体的完整性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号