Privacy preserving and ownership authentication in ubiquitous computing devices using secure three way authentication

In todays world of technology and gadgets almost every person is having a portable device, be it a laptop or the smart phones. The user would like to have all the services at his fingertips and access them through the portable device he owns. Maybe he wants some data from the fellow user or from the service provider or maybe he wants to control his smart devices at home from wherever he is. In the present era of mobile environments, interactions between the user device and the service provider must be secure enough regardless of the type of device used to access or utilize the services. In this paper we propose a ”Secure Three Way Authentication (STWA)” technique intended to preserve the user privacy and to accomplish ownership authentication in order to securely deliver the services to the user devices. This technique will also help the users or the service providers to check if the device is compromised or not with the help of the encrypted pass-phrases that are being exchanged.

[1]  Wesley M. Eddy,et al.  TCP SYN Flooding Attacks and Common Mitigations , 2007, RFC.

[2]  Roy H. Campbell,et al.  A flexible, privacy-preserving authentication framework for ubiquitous computing environments , 2002, Proceedings 22nd International Conference on Distributed Computing Systems Workshops.

[3]  Michael Huth Secure communicating systems - design, analysis, and implementation , 2001 .

[4]  Chris J. Mitchell,et al.  A Device Management Framework for Secure Ubiquitous Service Delivery , 2008, 2008 The Fourth International Conference on Information Assurance and Security.

[5]  K.C. Sekaran,et al.  Distributed Multi level Security token based Authentication for Ubiquitous Objects-DMSA , 2006, 2006 International Symposium on Ad Hoc and Ubiquitous Computing.

[6]  Jesus Molina,et al.  A Mobile Trusted Platform Module (mTPM) Architecture , 2006 .

[7]  Robert Tappan Morris,et al.  Alpaca: extensible authorization for distributed services , 2007, CCS '07.

[8]  Xiufen Fu,et al.  Information Hiding for pervasive trusted authentication , 2009, 2009 Joint Conferences on Pervasive Computing (JCPC).