PryGuard: A secure distributed authentication protocol for pervasive computing environment

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Handheld devices have become so commonplace nowadays that they are an integral part of our everyday life. Proliferation of these mobile handheld devices equipped with wide range of capabilities has bolstered widespread popularity of pervasive computing applications. In such applications many devices interact with each other by forming ad hoc wireless networks. The necessity of such unavoidable inter-device dependency along with volatile nature of connectivity and the lack of a fixed infrastructure for authentication and authorization, devices are susceptible and vulnerable to malicious active and passive snoopers. If a device registers a malicious device as its valid neighbor, the security and privacy of entire system might be jeopardized. Such sensitivity to malevolent activity necessitates the need for a robust mechanism to maintain a list of valid devices that will help to prevent malicious devices from authenticating successfully. In this paper, we present the feasibility of using a decentralized protocol in order to prevent malicious devices from participating illicitly into the ad hoc networks. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Hasan, C., Adibuzzaman, M., Kawsar, F., Haque, M., & Ahamed, S. I. (2011). PryGuard: A secure distributed authentication protocol for pervasive computing environment. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6703 LNAI, pp. 135–145). https://doi.org/10.1007/978-3-642-21822-4_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free