Design of anonymity-preserving user authentication and key agreement protocol for ubiquitous computing environments

4Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The spread of mobile devices, PDAs and sensors enabled the construction of ubiquitous computing environments, transforming regular physical spaces into "Smart space" augmented with intelligence and enhanced with services. However, the deployment of this computing paradigm in real-life is disturbed by poor security, particularly, the lack or proper authentication, authorization and key management techniques. Also, it is very important not only to find security measures but also to preserve user privacy in ubiquitous computing environment. In this paper, we propose efficient user authentication and key agreement protocol with anonymity for the privacy-preserving for ubiquitous computing environments. Our scheme is suitable for distributed environments with the computational constrained devices by using MAC-based security association token. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Kang, M. H., Ryou, H. B., & Choi, W. (2005). Design of anonymity-preserving user authentication and key agreement protocol for ubiquitous computing environments. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3828 LNCS, pp. 491–499). https://doi.org/10.1007/11600930_49

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free