International Journal of Soft Computing

Year: 2007
Volume: 2
Issue: 1
Page No. 157 - 160

Detail Analysis on the Authentication Models and Developing a Framework for Distributed Trust Model in Internet Scale Ubiquitous Computing

Authors : A.K.M. Najmul Islam and K.M. Najmul Islam

Abstract: Ubiquitous computing aims at defining environments where human beings can interact in an intuitive way with surrounding objects. Those objects, which can be personal digital assistants, electronic rings, doors or even clothes, offer embedded chips with computation power and communication facilities and are generally called artifacts. Apparently confidentiality of communication seems to be the most important issue as the prime concern for any system relying on wireless transmission. But the real problem is actually security. Authentication is also one of the most interesting security problems in ubiquitous computing. Many researchers have proposed different suitable authentication protocols for ubiquitous environment. But if we consider the ubiquitous computing environment, in some cases we find that the authentication procedure will not work. In this study we must have to find out an alternate solution. In this study I have tried to find out some situations where the authentication protocols will not work and presented an alternate solution in these situations.

How to cite this article:

A.K.M. Najmul Islam and K.M. Najmul Islam , 2007. Detail Analysis on the Authentication Models and Developing a Framework for Distributed Trust Model in Internet Scale Ubiquitous Computing. International Journal of Soft Computing, 2: 157-160.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved