Ownership authentication transfer protocol for ubiquitous computing devices

B. H. Pradeep*, Sanjay Singh

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

In ubiquitous computing devices, users tend to store some valuable information in their device. Even though the device can be borrowed by the other user temporarily, it is not safe for any user to borrow or lend the device as it may result the private data of the user to be public. To safeguard the user data and also to preserve user privacy we propose the technique of ownership authentication transfer. The user who is willing to sell the device has to transfer the ownership of the device under sale. Once the device is sold and the ownership has been transferred, the old owner will not be able to use that device at any cost. Either of the users will not be able to use the device if the process of ownership has not been carried out properly. This also takes care of the scenario when the device has been stolen or lost, avoiding the impersonation attack. The proposed protocol has been modeled and verified using Automated Validation of Internet Security Protocols and Applications (AVISPA) and is found to be safe.

Original languageEnglish
Title of host publication2013 International Conference on Computer Communication and Informatics, ICCCI 2013
DOIs
Publication statusPublished - 12-03-2013
Event2013 3rd International Conference on Computer Communication and Informatics, ICCCI 2013 - Coimbatore, India
Duration: 04-01-201306-01-2013

Publication series

Name2013 International Conference on Computer Communication and Informatics, ICCCI 2013

Conference

Conference2013 3rd International Conference on Computer Communication and Informatics, ICCCI 2013
Country/TerritoryIndia
CityCoimbatore
Period04-01-1306-01-13

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Information Systems

Fingerprint

Dive into the research topics of 'Ownership authentication transfer protocol for ubiquitous computing devices'. Together they form a unique fingerprint.

Cite this