• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology

Article

Indian Journal of Science and Technology

Year: 2017, Volume: 10, Issue: 25, Pages: 1-6

Original Article

Secure Communication Architecture for Privacy and Authentication in Ubiquitous Computing

Abstract

Objectives: To change the conventional safety mechanism for the omnipresent condition. The security strategies must change with respect to the change in a specific situation. Thus, security approaches must be powerful as well as dynamic. Method: Framework of a ubiquitous computing environment consists of devices in all forms; sensors everywhere seamlessly associated to wireless networks to offer computing / communication services to the user. In this study, we have proposed an architecture that preserves the user’s privacy and authenticates the devices for secure communication between the devices and service providers. Findings: The secure architecture discussed in this research paper uses a unique pass-key exchange with a token combination during the data exchange to protect user privacy. This mechanism not only protects the user privacy but also authenticates the user. Application: This architecture can be used anywhere in the ubiquitous environment for security enhancement. 

Keywords: Authentication, Privacy, Secure Architecture, Secure Communication, Ubiquitous Computing

DON'T MISS OUT!

Subscribe now for latest articles and news.