Indian Journal of Science and Technology
Year: 2017, Volume: 10, Issue: 25, Pages: 1-6
Nitin Jain1 *, Kirti Walia1 and S. N. Panda2
*Author for correspondence
I. K. Gujral Punjab Technical University, Jalandhar – 144603, Punjab, India; [email protected]
Objectives: To change the conventional safety mechanism for the omnipresent condition. The security strategies must change with respect to the change in a specific situation. Thus, security approaches must be powerful as well as dynamic. Method: Framework of a ubiquitous computing environment consists of devices in all forms; sensors everywhere seamlessly associated to wireless networks to offer computing / communication services to the user. In this study, we have proposed an architecture that preserves the user’s privacy and authenticates the devices for secure communication between the devices and service providers. Findings: The secure architecture discussed in this research paper uses a unique pass-key exchange with a token combination during the data exchange to protect user privacy. This mechanism not only protects the user privacy but also authenticates the user. Application: This architecture can be used anywhere in the ubiquitous environment for security enhancement.
Keywords: Authentication, Privacy, Secure Architecture, Secure Communication, Ubiquitous Computing
Subscribe now for latest articles and news.