Title :
SPUC: Security Protocol for Ubiquitous Computing
Author :
Yang, Fan ; Lv, Qingcong ; Cao, Qiying
Author_Institution :
Donghua Univ., Shanghai
Abstract :
We present a security protocol for ubiquitous computing. It provides data authentication, and data freshness besides unobtrusiveness that is the essential property of ubiquitous computing. We creatively use both asymmetric-key and symmetric-key algorithms to make the protocol more security and suffice severe resource constraints, limited computation, memory, and communication capacities.
Keywords :
cryptographic protocols; message authentication; ubiquitous computing; SPUC security protocol; asymmetric-key algorithm; data authentication; symmetric-key algorithm; ubicomp networks; ubiquitous computing; Authentication; Base stations; Communication system security; Computer security; Data security; Information security; Pervasive computing; Protocols; Public key cryptography; Ubiquitous computing;
Conference_Titel :
Computational Intelligence and Security Workshops, 2007. CISW 2007. International Conference on
Conference_Location :
Harbin
Print_ISBN :
978-0-7695-3073-4
DOI :
10.1109/CISW.2007.4425605