Abstract
The personalization of computing environments is one of the key aspects of ubiquitous computing, and such personalization requires isolated computing environments for better security and stability. In this paper, we propose a mutual authentication method using biometric information of each device users in a situation where device A communicates with device B which is in heterogenous environment. Proposed scheme is designed to be agile in a peer-to-peer environment. We provide analysis results against security attacks and number of required procedures for device authentication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ellison, C.: UPnP Security Ceremonies Version 1.0, UPnP Forum (2003)
Einfeld, D., Sarraf, R.H., Attal, M., Tavakoli, K.: SESAME, a 2,5 GeV synchrotron light source for the Middle East region. In: Particle Accelerator Conference, 2003. PAC 2003, Proceedings of the vol. 1 12(16), 238–240 (2003)
Muhtad, A., Ranganathan, A., Campbell, R., Mickunas, N.D.: A flexible, privacy-preserving authentication framework for ubiquitous computing environments. In: Proceedings of IWSAEC (2002)
Stajano, F.: Security for Ubiquitous Computing. John Wiley and Sons Ltd, New York (2002)
Gehrmann, C., Nyberg, K.: Security in personal area networks. In: Mitchell, C.J. (ed.) Security for Mobility, pp. 191–230. IEE, London (2004)
Bussard, L., Roudier, Y.: Authentication in Ubiquitous Computing. In: Workshop on Security in Ubiquitous Computing, 4th International UBICOMP (2002)
Gehrmann, C., Nyberg, K., Mitchell, C.J.: The personal CA - PKI for a personal area network. In: IST Mobile and Wireless Telecommunications Summit, pp. 31–35 (2002)
Kagal, L., Finin, T., Joshi, A.: Trust-Based Security in Pervasive Computing Environments. IEEE Computer 24, 154–157 (2001)
Richard, G.G.: Service Advertisement and Discovery: Enabling Universal Device Cooperation. IEEE Internet Computing, 4(5) (2000)
SafeNet, Device Authetnication:A Valunable Addition to Agency Cyber-Security Programs, SafeNet, Inc (2002)
Hengartner, U., Steenkiste, P.: Protecting People Location Information, Workshop on Security in Ubiquitous Computing, 4th International UBICOMP (2002)
Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI Certificate Theory, RFC2693 (1999)
Gehrmann, C., Kuhn, T., Nyberg, K., Windirsch, P.: Trust model, communication and configuration security for personal area networks. In: IST Mobile and Wireless Telecommunications Summit, pp. 41–45 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jeong, YS., Lee, BK., Lee, SH. (2007). An Efficient Device Authentication Protocol Using Bioinformatic. In: Wang, Y., Cheung, Ym., Liu, H. (eds) Computational Intelligence and Security. CIS 2006. Lecture Notes in Computer Science(), vol 4456. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74377-4_59
Download citation
DOI: https://doi.org/10.1007/978-3-540-74377-4_59
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74376-7
Online ISBN: 978-3-540-74377-4
eBook Packages: Computer ScienceComputer Science (R0)