A Novel Authentication Mechanism Protecting Users’ Privacy in Pervasive Systems
Journal: The International Arab Journal of Information Technology (Vol.14, No. 1)Publication Date: 2017-01-01
Authors : Mohammed Djedid; Abdallah Chouarfia;
Page : 127-137
Keywords : Pervasive systems; identification/authentication; privacy.;
Abstract
Transparency of the system and its integration into the natural environment of the user are some of the important features of pervasive computing. But these characteristics that are considered as the strongest points of pervasive systems are
also their weak points in terms of the user's privacy. The privacy in pervasive systems involves more than the confidentiality of communications and concealing the identity of virtual users. The physical presence and behavior of the user in the pervasive space cannot be completely hidden and can reveal the secret of his/her identity and affect his/her privacy. This paper shows that the application of state-of-the-art techniques for protecting the user's privacy still insufficient. A new solution named shadow protocol is proposed, which allows the users to authenticate and interact with the surrounding devices within an ubiquitous computing environment while preserving their privacy.
Other Latest Articles
Last modified: 2019-05-06 19:17:31