期刊论文详细信息
Network Protocols and Algorithms
Design of Authentication Model Preserving Intimacy and Trust in Intelligent Environments
Abdallah Chouarfia1  Benchaa Djellali1  Kheira Belarbi1  Pascal Lorenz2 
[1]University of Haute-Alsace
关键词: Anonymity;    Authentication;    Authorization;    Intelligent environment;    Pervasive Computing Environment;   
DOI  :  10.5296/npa.v7i1.7208
学科分类:计算机应用
来源: Macrothink Institute, Inc.
PDF
【 摘 要 】
With the recent advances in communication technologies for low-power devices, pervasive computing environments (PCE) spread as new domains beyond legacy enterprise and personal computing. The intelligent home network environment is thing which invisible device that is not shown linked mutually through network so that user may use device always is been pervasive. Smart devices are interconnected and collaborate as a global distributed system to infuse intelligence into systems and processes. This kind of environment provides various smart services and makes consequently an offer of convenient, pleasant, and blessed lives to people. However, the risk is high as long as the offer is pleasant and convenient. In such context, security is stil very fragile and there is often a violation of user privacy and service interference. For this, a special interest in ubiquitous network security is going up. Safety lies primarily in the authentication of users accessing the network. It guarantees that only legitimate users can login and access to services indoor the network. In this paper, we propose an anonymous authentication and access control scheme to secure the interaction between mobile users handling smart devices and smart services in PCEs. In an environment based on public key infrastructure (PKI) and Authentication, Authorization, and Accounting (AAA), the proposed authentication protocol combines both network authentication technique based on symmetric keys and single sign-on mechanisms. The authentication protocol is simple and secure, protects the privacy of user and aims to satisfy the security requirements.
【 授权许可】

Unknown   

【 预 览 】
附件列表
Files Size Format View
RO201912040561700ZK.pdf 233KB PDF download
  文献评价指标  
  下载次数:8次 浏览次数:21次