Privacy preserving and ownership authentication in ubiquitous computing devices using secure three way authentication

Pradeep Hanumanthappa, Sanjay Singh

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

Abstract

In todays world of technology and gadgets almost every person is having a portable device, be it a laptop or the smart phones. The user would like to have all the services at his fingertips and access them through the portable device he owns. Maybe he wants some data from the fellow user or from the service provider or maybe he wants to control his smart devices at home from wherever he is. In the present era of mobile environments, interactions between the user device and the service provider must be secure enough regardless of the type of device used to access or utilize the services. In this paper we propose a "Secure Three Way Authentication (STWA)" technique intended to preserve the user privacy and to accomplish ownership authentication in order to securely deliver the services to the user devices. This technique will also help the users or the service providers to check if the device is compromised or not with the help of the encrypted pass-phrases that are being exchanged.

Original languageEnglish
Title of host publication2012 International Conference on Innovations in Information Technology, IIT 2012
Pages107-112
Number of pages6
DOIs
Publication statusPublished - 13-07-2012
Event2012 International Conference on Innovations in Information Technology, IIT 2012 - Abu Dhabi, Al-Ain, United Arab Emirates
Duration: 18-03-201220-03-2012

Conference

Conference2012 International Conference on Innovations in Information Technology, IIT 2012
Country/TerritoryUnited Arab Emirates
CityAbu Dhabi, Al-Ain
Period18-03-1220-03-12

All Science Journal Classification (ASJC) codes

  • Information Systems

Fingerprint

Dive into the research topics of 'Privacy preserving and ownership authentication in ubiquitous computing devices using secure three way authentication'. Together they form a unique fingerprint.

Cite this