Asian Journal of Information Technology

Year: 2005
Volume: 4
Issue: 1
Page No. 108 - 111

An Efficient Model for on the Fly Authentication in Ubiquitous Computing System

Authors : A. K. M. Najmul Islam , M. Fahim Ferdous Khan , Md. Abu Esa Sarkar and Kamrul Hasan

Abstract: Ubiquitous computing aims at defining environments where human beings can interact in an intuitive way with surrounding objects. Those objects, which can be personal digital assistants, electronic rings, doors or even clothes, offer embedded chips with computation power and communication facilities and are generally called artifacts. Apparently confidentiality of communication seems to be the most important issue as the prime concern for any system relying on wireless transmission. But the real problem is actually authentication. Without being sure that one is speaking to the correct party, there is little point in encrypting the secrets he wants to communicate; whereas if one has successfully authenticated his interlocutor and established some key material, protecting communications confidentiality with strong and efficient encryption is nowadays a solved problem. Authentication is also one of the most interesting security problems in ad hoc networking, because much of the conventional wisdom from distributed systems does not quite carry over. In this study we have proposed a flexible and on the fly authentication model for devices under the same ownership.

How to cite this article:

A. K. M. Najmul Islam , M. Fahim Ferdous Khan , Md. Abu Esa Sarkar and Kamrul Hasan , 2005. An Efficient Model for on the Fly Authentication in Ubiquitous Computing System . Asian Journal of Information Technology, 4: 108-111.

Design and power by Medwell Web Development Team. © Medwell Publishing 2022 All Rights Reserved