An effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environment

Peer-to-Peer Networking and Applications - Tập 7 - Trang 612-619 - 2013
Soobok Shin1, Taeshik Shon2, Hongjin Yeh1, Kangseok Kim3
1Graduate School of Information and Communications, Ajou University, Suwon, Korea
2Division of Information Computer Engineering, Ajou University, Suwon, Korea
3Graduate School of Department of Knowledge Information Engineering, Suwon, Korea

Tóm tắt

With the advent of new generation of mobile access devices such as smartphone and tablet PC, there is coming a need for ubiquitous collaboration which allows people to access information systems with their disparate access devices and to communicate with others in anytime and in anywhere. As the number of collaborators with a large number of disparate access devices increases in ubiquitous collaboration environment, the difficulties for protecting secured resources from unauthorized users as well as unsecured access devices will increase since the resources can be compromised by inadequately secured human and devices. Therfore, authentication mechanism for access of legitimate participants is essential in ubiquitous collaboration environment. In this paper we present an efficient authentication mechanism in ubiquitous collaboration environment. We show that proposed scheme is secure through security analysis and is efficient through the experimental results obtained from the practical evaluation of the scheme in ubiquitous collaboration environment.

Tài liệu tham khảo

Android Platform. http://www.android.com/ Community Grids Lab (CGL). http://pti.iu.edu/cgl Forne J, Hinarejos F, Marin A, Almenarez F, Lopez J, Montenegro JA, Lacoste M, Diaz D (2010) Pervasive authentication and authorization infrastructures for mobile users. Comput Secur 29:501–514 He D, Chan S, Chen C, Bu J, Fan R (2011) Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wirel Pers Commun 61:465–476 iPhone. http://www.apple.com/iphone/ Jiang Q, Li G, Ma J, Yang C (2011) Hybrid authentication model for heterogeneous wireless networks. J Huazhong Univ Sci Technol 39:11–14 Kim K, Fox G (2011) Modeling, simulation, and practice of floor control for synchronous and ubiquitous collaboration. Multimed Tools Appl 53:213–236. doi:10.1007/s11042-010-0508-0 Lamport L (1981) Password authentication with insecure communication. Commun ACM 24:770–772 NaradaBrokering. http://www.naradabrokering.org Pallickara S, Pierce M, Gadgil H, Fox G, Yan Y, Huang Y (2006) A framework for secure end-to-end delivery of messages in publish/subscribe systems. Proceedings of the 7th IEEE/ACM International Conference on Grid Computing (GRID 2006), Barcelona, Spain, pp 28–29 Park JH (2010) An authentication protocol offering service anonymity of mobile device in ubiquitous environment. J Supercomput. doi:10.1007/s11227-010-0467-2 Xu J, Zhu WT, Feng DG (2011) An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Comput Commun 34:319–325 Moon JS, Lee IY (2001) An AAA scheme using ID-based ticket with anonymity in future mobile communication. Comput Commun 34(3):295–304 Shin SB, Yeh HJ, Kim KH, Kim KS (2012) A remote user authentication scheme with anonymity for mobile devices. Int J Adv Robot Syst 9:1–7 Tzeng ZJ, Tzeng WG (2011) Authentication of mobile users in third generation mobile systems. Wirel Pers Commun 16(1):35–50 Zhu J, Ma J (2004) A new authentication scheme with anonymity for wireless environments. IEEE Trans Consum Electron 50(1):230–234