ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Novel Authentication Mechanism Protecting Users’ Privacy in Pervasive Systems

Journal: The International Arab Journal of Information Technology (Vol.14, No. 1)

Publication Date:

Authors : ; ;

Page : 127-137

Keywords : Pervasive systems; identification/authentication; privacy.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Transparency of the system and its integration into the natural environment of the user are some of the important features of pervasive computing. But these characteristics that are considered as the strongest points of pervasive systems are also their weak points in terms of the user's privacy. The privacy in pervasive systems involves more than the confidentiality of communications and concealing the identity of virtual users. The physical presence and behavior of the user in the pervasive space cannot be completely hidden and can reveal the secret of his/her identity and affect his/her privacy. This paper shows that the application of state-of-the-art techniques for protecting the user's privacy still insufficient. A new solution named shadow protocol is proposed, which allows the users to authenticate and interact with the surrounding devices within an ubiquitous computing environment while preserving their privacy.

Last modified: 2019-05-06 19:17:31