TY - GEN
T1 - Ownership authentication transfer protocol for ubiquitous computing devices
AU - Pradeep, B. H.
AU - Singh, Sanjay
PY - 2013/3/12
Y1 - 2013/3/12
N2 - In ubiquitous computing devices, users tend to store some valuable information in their device. Even though the device can be borrowed by the other user temporarily, it is not safe for any user to borrow or lend the device as it may result the private data of the user to be public. To safeguard the user data and also to preserve user privacy we propose the technique of ownership authentication transfer. The user who is willing to sell the device has to transfer the ownership of the device under sale. Once the device is sold and the ownership has been transferred, the old owner will not be able to use that device at any cost. Either of the users will not be able to use the device if the process of ownership has not been carried out properly. This also takes care of the scenario when the device has been stolen or lost, avoiding the impersonation attack. The proposed protocol has been modeled and verified using Automated Validation of Internet Security Protocols and Applications (AVISPA) and is found to be safe.
AB - In ubiquitous computing devices, users tend to store some valuable information in their device. Even though the device can be borrowed by the other user temporarily, it is not safe for any user to borrow or lend the device as it may result the private data of the user to be public. To safeguard the user data and also to preserve user privacy we propose the technique of ownership authentication transfer. The user who is willing to sell the device has to transfer the ownership of the device under sale. Once the device is sold and the ownership has been transferred, the old owner will not be able to use that device at any cost. Either of the users will not be able to use the device if the process of ownership has not been carried out properly. This also takes care of the scenario when the device has been stolen or lost, avoiding the impersonation attack. The proposed protocol has been modeled and verified using Automated Validation of Internet Security Protocols and Applications (AVISPA) and is found to be safe.
UR - http://www.scopus.com/inward/record.url?scp=84874690767&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84874690767&partnerID=8YFLogxK
U2 - 10.1109/ICCCI.2013.6466133
DO - 10.1109/ICCCI.2013.6466133
M3 - Conference contribution
AN - SCOPUS:84874690767
SN - 9781467329057
T3 - 2013 International Conference on Computer Communication and Informatics, ICCCI 2013
BT - 2013 International Conference on Computer Communication and Informatics, ICCCI 2013
T2 - 2013 3rd International Conference on Computer Communication and Informatics, ICCCI 2013
Y2 - 4 January 2013 through 6 January 2013
ER -