Open Access Open Access  Restricted Access Subscription Access

Secure Communication Architecture for Privacy and Authentication in Ubiquitous Computing


Affiliations
1 I. K. Gujral Punjab Technical University, Jalandhar – 144603, Punjab, India
2 Chitkara University, Patiala – 140401, Punjab, India
 

Objectives: To change the conventional safety mechanism for the omnipresent condition. The security strategies must change with respect to the change in a specific situation. Thus, security approaches must be powerful as well as dynamic. Method: Framework of a ubiquitous computing environment consists of devices in all forms; sensors everywhere seamlessly associated to wireless networks to offer computing / communication services to the user. In this study, we have proposed an architecture that preserves the user’s privacy and authenticates the devices for secure communication between the devices and service providers. Findings: The secure architecture discussed in this research paper uses a unique pass-key exchange with a token combination during the data exchange to protect user privacy. This mechanism not only protects the user privacy but also authenticates the user. Application: This architecture can be used anywhere in the ubiquitous environment for security enhancement.

Keywords

Authentication, Privacy, Secure Architecture, Secure Communication, Ubiquitous Computing
User

Abstract Views: 192

PDF Views: 0




  • Secure Communication Architecture for Privacy and Authentication in Ubiquitous Computing

Abstract Views: 192  |  PDF Views: 0

Authors

Nitin Jain
I. K. Gujral Punjab Technical University, Jalandhar – 144603, Punjab, India
Kirti Walia
I. K. Gujral Punjab Technical University, Jalandhar – 144603, Punjab, India
S. N. Panda
Chitkara University, Patiala – 140401, Punjab, India

Abstract


Objectives: To change the conventional safety mechanism for the omnipresent condition. The security strategies must change with respect to the change in a specific situation. Thus, security approaches must be powerful as well as dynamic. Method: Framework of a ubiquitous computing environment consists of devices in all forms; sensors everywhere seamlessly associated to wireless networks to offer computing / communication services to the user. In this study, we have proposed an architecture that preserves the user’s privacy and authenticates the devices for secure communication between the devices and service providers. Findings: The secure architecture discussed in this research paper uses a unique pass-key exchange with a token combination during the data exchange to protect user privacy. This mechanism not only protects the user privacy but also authenticates the user. Application: This architecture can be used anywhere in the ubiquitous environment for security enhancement.

Keywords


Authentication, Privacy, Secure Architecture, Secure Communication, Ubiquitous Computing



DOI: https://doi.org/10.17485/ijst%2F2017%2Fv10i25%2F156403