A Novel Authentication Mechanism Protecting Users’ Privacy in Pervasive Systems

A Novel Authentication Mechanism Protecting Users’ Privacy in Pervasive Systems

 

Mohammed Djedid and Abdallah Chouarfia

Faculty of Science, University of Sciences and Technology of Oran-Mohammed Boudiaf-, Algeria

Abstract: Transparency of the system and its integration into the natural environment of the user are some of the important features of pervasive computing. But these characteristics that are considered as the strongest points of pervasive systems are also their weak points in terms of the user’s privacy. The privacy in pervasive systems involves more than the confidentiality of communications and concealing the identity of virtual users. The physical presence and behavior of the user in the pervasive space cannot be completely hidden and can reveal the secret of his/her identity and affect his/her privacy. This paper shows that the application of state-of-the-art techniques for protecting the user’s privacy still insufficient. A new solution named shadow protocol is proposed, which allows the users to authenticate and interact with the surrounding devices within an ubiquitous computing environment while preserving their privacy.

Keywords: Pervasive systems, Identification/authentication, privacy.

Read 1366 times Last modified on Monday, 22 February 2016 06:57
Share
Top
We use cookies to improve our website. By continuing to use this website, you are giving consent to cookies being used. More details…