Abstract
The Ubiquitous computer environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. Intend computing environment that can use easily as user wants and it is the smart environment that user provides context awareness that is wanting computing environment. This Ubiquitous computing contains much especially weak side in security. Masquerade attack of that crawl that is quoted to user or server among device that is around user by that discrete various computing devices exist everywhere among them become possible. Hereupon, in this paper, proposed method that has following characteristic. Present authentication model through transfer or device. Suggest two method that realize authentication through device in case of moved to method (MD: Multi Domain) that realize authentication through device in case of moved user’s direct path who device differs.
This research was supported by the MIC (Ministry of Information and Communica-tion), Korea, under the ITRC(Information Technology Research Center) support program supervised by the IITA (Institute of Information Technology Assessment).
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Aresenault, A., Tuner, S.: Internet X.509 Public Key Infrastructure, Internet Draft (2000)
ITU-T, Draft ITU-T RECOMMANDATION X.509 version4, ITU-T Publications (2001)
Al-Muhtadi, J., Ranganathan, A., Campbell, R., Mickunas, M.D.: A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments. In: ICDCSW 2002, pp. 771–776 (2002)
Weiser, M.: Hot Topics: Ubiquitous Computing. IEEE Computer (October 1993)
Roman, M., Campbell, R.: GAIA: Enabling Active Spaces. In: 9th ACM SIGOPS European Workshop, Kolding, Denmark, September 17-20 (2000)
Farrell, S., Housley, R.: An Internet Attribute Certificate Profile for Authorization, Internet Draft (2001)
Sarma, A.E., Weis, S.A., Daniel, S.W.: White Paper: RFID Systems, Security and Privacy Implications, AUTO-ID Center, November 2002. MIT, Cambridge (2002)
Gen-Ho, L.: Information Security for Ubiquitous Computing Environment. In: Symposium on Information Security 2003, KOREA, pp. 629–651 (2003)
Sung-Yong, L., Hyun-Su, J.: Ubiquitous Research Trend and Future Works. Wolrdwide IT 3(7), 1–12 (2002)
Yun-Chol, L.: Home Networks Technology and Market Trend. ITFIND Weeks Technology Trend (TIS-03-20) No. 1098, pp. 22– 33 (2003)
Aura Project home page, http://www-2.cs.cmu.edu/~aura/
CoolTown home page, http://www.cooltown.hp.com
Portolano home page, http://portolano.cs.washington.edu/
TRON Project home page, http://www.tron.org/index-e.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, D.G., Moon, J.S., Park, J.H., Lee, I.Y. (2006). Authentication for Ubiquitous Multi Domain in Pervasive Computing Using PMI. In: Gerndt, M., Kranzlmüller, D. (eds) High Performance Computing and Communications. HPCC 2006. Lecture Notes in Computer Science, vol 4208. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11847366_53
Download citation
DOI: https://doi.org/10.1007/11847366_53
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-39368-9
Online ISBN: 978-3-540-39372-6
eBook Packages: Computer ScienceComputer Science (R0)