Abstract
The Ubiquitous computer environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. Intend computing environment that can use easily as user wants and it is the smart environment that user provides context awareness that is wanting computing environment. This Ubiquitous computing contains much specially weak side in security. Masquerade attack of that crawl that is quoted to user or server among device that is around user by that discrete various computing devices exist everywhere among them become possible. Hereupon, in this paper, proposed method that has following characteristic. Present authentication model through transfer or device. Suggest two method that realize authentication through device in case of moved to method (MD: Multi Domain) and user ownself space (SD: Single Domain) that realize authentication through device in case of moved user’s direct path who device differs.
This research was supported by the MIC (Ministry of Information and Communica-tion), Korea, under the ITRC (Information Technology Research Center) support program supervised by the IITA (Institute of Information Technology Assessment).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Aresenault, A., Tuner, S.: Internet X.509 Public Key Infrastructure, Internet Draft (2000)
ITU-T, Draft ITU-T RECOMMANDATION X.509 version4, ITU-T Publications (2001)
Al-Muhtadi, J., Ranganathan, A., Campbell, R., Dennis Mickunas, M.: A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments. In: ICDCSW 2002, pp. 771–776 (2002)
Weiser, M.: Hot Topics: Ubiquitous Computing. IEEE Computer (October 1993)
Roman, M., Campbell, R.: GAIA: Enabling Active Spaces. In: 9th ACM SIGOPS European Workshop, Kolding, Denmark, September 17-20 (2000)
Farrell, S., Housley, R.: An Internet Attribute Certificate Profile for Authorization, Internet Draft (2001)
Sarma, S.E., Weis, S.A., Daniel, S.W.: White Paper: RFID Systems, Security & Privacy Implications, AUTO-ID Center, MIT (November 2002)
Gen-Ho, L.: Information Security for Ubiquitous Computing Environment. In: Symposium on Information Security 2003, Korea, pp. 629–651 (2003)
Lee, S.-Y., Jung, H.-S.: Ubiquitous Research Trend & Future Works. Wolrdwide IT 3(7), 1–12 (2002)
Lee, Y.-C.: Home Networks Technology & Market Trend. ITFIND Weeks Technology Trend(TIS-03-20) (1098), 22–33 (2003)
Aura Project home page, http://www-2.cs.cmu.edu/~aura/
CoolTown home page, http://www.cooltown.hp.com
IBM Websphere home page, http://www-3.ibm.com/software/info1/websphere/index.jsp?tab=highlights
Microsoft Research, EasyLiving Website, http://www.research,microsoft.com/easyliving
Oxygen Project home page, http://oxygen.lcs.mit.edu/
Portolano home page, http://portolano.cs.washington.edu/
TRON Project home page, http://www.tron.org/index-e.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, DG., Kang, SI., Seo, DH., Lee, IY. (2006). Authentication for Single/Multi Domain in Ubiquitous Computing Using Attribute Certification. In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3983. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751632_35
Download citation
DOI: https://doi.org/10.1007/11751632_35
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34077-5
Online ISBN: 978-3-540-34078-2
eBook Packages: Computer ScienceComputer Science (R0)