DocumentCode
597701
Title
Ownership authentication transfer protocol for ubiquitous computing devices
Author
Pradeep, B.H. ; Singh, Sushil
Author_Institution
Dept. of Inf. & Commun. Technol., Manipal Univ., Manipal, India
fYear
2013
fDate
4-6 Jan. 2013
Firstpage
1
Lastpage
6
Abstract
In ubiquitous computing devices, users tend to store some valuable information in their device. Even though the device can be borrowed by the other user temporarily, it is not safe for any user to borrow or lend the device as it may result the private data of the user to be public. To safeguard the user data and also to preserve user privacy we propose the technique of ownership authentication transfer. The user who is willing to sell the device has to transfer the ownership of the device under sale. Once the device is sold and the ownership has been transferred, the old owner will not be able to use that device at any cost. Either of the users will not be able to use the device if the process of ownership has not been carried out properly. This also takes care of the scenario when the device has been stolen or lost, avoiding the impersonation attack. The proposed protocol has been modeled and verified using Automated Validation of Internet Security Protocols and Applications (AVISPA) and is found to be safe.
Keywords
Internet; cryptographic protocols; data privacy; ubiquitous computing; AVISPA; automated validation of Internet security protocols and applications; impersonation attack; ownership authentication transfer protocol; ubiquitous computing devices; user data; user privacy preservation; Authentication; Cryptography; Marketing and sales; Protocols; Servers; Ubiquitous computing;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Communication and Informatics (ICCCI), 2013 International Conference on
Conference_Location
Coimbatore
Print_ISBN
978-1-4673-2906-4
Type
conf
DOI
10.1109/ICCCI.2013.6466133
Filename
6466133
Link To Document