An effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environment
Tóm tắt
With the advent of new generation of mobile access devices such as smartphone and tablet PC, there is coming a need for ubiquitous collaboration which allows people to access information systems with their disparate access devices and to communicate with others in anytime and in anywhere. As the number of collaborators with a large number of disparate access devices increases in ubiquitous collaboration environment, the difficulties for protecting secured resources from unauthorized users as well as unsecured access devices will increase since the resources can be compromised by inadequately secured human and devices. Therfore, authentication mechanism for access of legitimate participants is essential in ubiquitous collaboration environment. In this paper we present an efficient authentication mechanism in ubiquitous collaboration environment. We show that proposed scheme is secure through security analysis and is efficient through the experimental results obtained from the practical evaluation of the scheme in ubiquitous collaboration environment.
Tài liệu tham khảo
Android Platform. http://www.android.com/
Community Grids Lab (CGL). http://pti.iu.edu/cgl
Forne J, Hinarejos F, Marin A, Almenarez F, Lopez J, Montenegro JA, Lacoste M, Diaz D (2010) Pervasive authentication and authorization infrastructures for mobile users. Comput Secur 29:501–514
He D, Chan S, Chen C, Bu J, Fan R (2011) Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wirel Pers Commun 61:465–476
iPhone. http://www.apple.com/iphone/
Jiang Q, Li G, Ma J, Yang C (2011) Hybrid authentication model for heterogeneous wireless networks. J Huazhong Univ Sci Technol 39:11–14
Kim K, Fox G (2011) Modeling, simulation, and practice of floor control for synchronous and ubiquitous collaboration. Multimed Tools Appl 53:213–236. doi:10.1007/s11042-010-0508-0
Lamport L (1981) Password authentication with insecure communication. Commun ACM 24:770–772
NaradaBrokering. http://www.naradabrokering.org
Pallickara S, Pierce M, Gadgil H, Fox G, Yan Y, Huang Y (2006) A framework for secure end-to-end delivery of messages in publish/subscribe systems. Proceedings of the 7th IEEE/ACM International Conference on Grid Computing (GRID 2006), Barcelona, Spain, pp 28–29
Park JH (2010) An authentication protocol offering service anonymity of mobile device in ubiquitous environment. J Supercomput. doi:10.1007/s11227-010-0467-2
Xu J, Zhu WT, Feng DG (2011) An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Comput Commun 34:319–325
Moon JS, Lee IY (2001) An AAA scheme using ID-based ticket with anonymity in future mobile communication. Comput Commun 34(3):295–304
Shin SB, Yeh HJ, Kim KH, Kim KS (2012) A remote user authentication scheme with anonymity for mobile devices. Int J Adv Robot Syst 9:1–7
Tzeng ZJ, Tzeng WG (2011) Authentication of mobile users in third generation mobile systems. Wirel Pers Commun 16(1):35–50
Zhu J, Ma J (2004) A new authentication scheme with anonymity for wireless environments. IEEE Trans Consum Electron 50(1):230–234