Skip to main content

An Efficient Device Authentication Protocol Using Bioinformatic

  • Conference paper
Computational Intelligence and Security (CIS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4456))

Included in the following conference series:

Abstract

The personalization of computing environments is one of the key aspects of ubiquitous computing, and such personalization requires isolated computing environments for better security and stability. In this paper, we propose a mutual authentication method using biometric information of each device users in a situation where device A communicates with device B which is in heterogenous environment. Proposed scheme is designed to be agile in a peer-to-peer environment. We provide analysis results against security attacks and number of required procedures for device authentication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ellison, C.: UPnP Security Ceremonies Version 1.0, UPnP Forum (2003)

    Google Scholar 

  2. Einfeld, D., Sarraf, R.H., Attal, M., Tavakoli, K.: SESAME, a 2,5 GeV synchrotron light source for the Middle East region. In: Particle Accelerator Conference, 2003. PAC 2003, Proceedings of the vol. 1 12(16), 238–240 (2003)

    Google Scholar 

  3. Muhtad, A., Ranganathan, A., Campbell, R., Mickunas, N.D.: A flexible, privacy-preserving authentication framework for ubiquitous computing environments. In: Proceedings of IWSAEC (2002)

    Google Scholar 

  4. Stajano, F.: Security for Ubiquitous Computing. John Wiley and Sons Ltd, New York (2002)

    Book  Google Scholar 

  5. Gehrmann, C., Nyberg, K.: Security in personal area networks. In: Mitchell, C.J. (ed.) Security for Mobility, pp. 191–230. IEE, London (2004)

    Google Scholar 

  6. Bussard, L., Roudier, Y.: Authentication in Ubiquitous Computing. In: Workshop on Security in Ubiquitous Computing, 4th International UBICOMP (2002)

    Google Scholar 

  7. Gehrmann, C., Nyberg, K., Mitchell, C.J.: The personal CA - PKI for a personal area network. In: IST Mobile and Wireless Telecommunications Summit, pp. 31–35 (2002)

    Google Scholar 

  8. Kagal, L., Finin, T., Joshi, A.: Trust-Based Security in Pervasive Computing Environments. IEEE Computer 24, 154–157 (2001)

    Google Scholar 

  9. Richard, G.G.: Service Advertisement and Discovery: Enabling Universal Device Cooperation. IEEE Internet Computing, 4(5) (2000)

    Google Scholar 

  10. SafeNet, Device Authetnication:A Valunable Addition to Agency Cyber-Security Programs, SafeNet, Inc (2002)

    Google Scholar 

  11. Hengartner, U., Steenkiste, P.: Protecting People Location Information, Workshop on Security in Ubiquitous Computing, 4th International UBICOMP (2002)

    Google Scholar 

  12. Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI Certificate Theory, RFC2693 (1999)

    Google Scholar 

  13. Gehrmann, C., Kuhn, T., Nyberg, K., Windirsch, P.: Trust model, communication and configuration security for personal area networks. In: IST Mobile and Wireless Telecommunications Summit, pp. 41–45 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jeong, YS., Lee, BK., Lee, SH. (2007). An Efficient Device Authentication Protocol Using Bioinformatic. In: Wang, Y., Cheung, Ym., Liu, H. (eds) Computational Intelligence and Security. CIS 2006. Lecture Notes in Computer Science(), vol 4456. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74377-4_59

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74377-4_59

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74376-7

  • Online ISBN: 978-3-540-74377-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics