Design of Authentication Model Preserving Intimacy and Trust in Intelligent Environments

With the recent advances in communication technologies for low-power devices, pervasive computing environments (PCE) spread as new domains beyond legacy enterprise and personal computing. The intelligent home network environment is thing which invisible device that is not shown linked mutually through network so that user may use device always is been pervasive. Smart devices are interconnected and collaborate as a global distributed system to infuse intelligence into systems and processes. This kind of environment provides various smart services and makes consequently an offer of convenient, pleasant, and blessed lives to people. However, the risk is high as long as the offer is pleasant and convenient. In such context, security is stil very fragile and there is often a violation of user privacy and service interference. For this, a special interest in ubiquitous network security is going up. Safety lies primarily in the authentication of users accessing the network. It guarantees that only legitimate users can login and access to services indoor the network. In this paper, we propose an anonymous authentication and access control scheme to secure the interaction between mobile users handling smart devices and smart services in PCEs. In an environment based on public key infrastructure (PKI) and Authentication, Authorization, and Accounting (AAA), the proposed authentication protocol combines both network authentication technique based on symmetric keys and single sign-on mechanisms. The authentication protocol is simple and secure, protects the privacy of user and aims to satisfy the security requirements.

[1]  Stephen Smalley,et al.  Integrating Flexible Support for Security Policies into the Linux Operating System , 2001, USENIX Annual Technical Conference, FREENIX Track.

[2]  Syed Salar Hussain Naqvi Architecture de sécurité pour les grands systèmes, ouverts, répartis et hétérogènes , 2005 .

[3]  Michael Koch,et al.  Ubiquitous Computing , 2001, CSCW-Kompendium.

[4]  Nei Kato,et al.  Toward intelligent machine-to-machine communications in smart grid , 2011, IEEE Communications Magazine.

[5]  Jong-Wook Han,et al.  Intelligent Pervasive Network Authentication: S/Key Based Device Authentication , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.

[6]  B. Clifford Neuman,et al.  A note on the use of timestamps as nonces , 1993, OPSR.

[7]  John T. Kohl,et al.  The Kerberos Network Authentication Service (V5 , 2004 .

[8]  Chan Yeob Yeun,et al.  Security for emerging ubiquitous networks , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[9]  Pascal Lorenz,et al.  User authentication scheme preserving anonymity for ubiquitous devices , 2015, Secur. Commun. Networks.

[10]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[11]  Theodore Y. Ts'o,et al.  Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.

[12]  Chris J. Mitchell,et al.  The personal CA – PKI for a Personal Area Network , 2003 .

[13]  Roy H. Campbell,et al.  Towards Security and Privacy for Pervasive Computing , 2002, ISSS.

[14]  Saber Zrelli,et al.  XKDCP: An Inter-KDC Protocol for Dependable Kerberos Cross-Realm Operations , 2013, J. Networks.

[15]  Jeffrey D. Case,et al.  Introduction to Version 3 of the Internet-standard Network Management Framework , 1999, RFC.

[16]  Jon Crowcroft,et al.  Ticket based service access for the mobile user , 1997, MobiCom '97.

[17]  Ayaz Hassan Moon,et al.  Authenticated key exchange protocol for Wireless Sensor Networks , 2016 .

[18]  Nei Kato,et al.  A Lightweight Message Authentication Scheme for Smart Grid Communications , 2011, IEEE Transactions on Smart Grid.

[19]  Jong Wook Han,et al.  Efficient and User Friendly Inter-domain Device Authentication/Access Control for Home Networks , 2006, EUC.

[20]  Jae-Cheol Ryou,et al.  A Trusted Key Management Scheme for Digital Rights Management , 2005 .

[21]  Marc Langheinrich,et al.  A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.

[22]  Pascal Lorenz,et al.  Security Model for Pervasive Multimedia Environment , 2014 .

[23]  Mahadev Satyanarayanan,et al.  Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..

[24]  M. Weiser The Computer for the Twenty-First Century , 1991 .

[25]  Jongpil Jeong,et al.  Secure User Authentication Mechanism in Digital Home Network Environments , 2006, EUC.

[26]  Jim Boyle,et al.  Accept-Ranges : bytes Content-Length : 55967 Connection : close Content-Type : text / plain Internet Draft , 2012 .

[27]  Timothy W. Finin,et al.  Trust-Based Security in Pervasive Computing Environments , 2022 .

[28]  Timothy W. Finin,et al.  Vigil: Enforcing Security in Ubiquitous Environments , 2002 .