Ownership Authentication Transfer Protocol for Ubiquitous Computing Devices

Pradeep, B H and Singh, Sanjay (2013) Ownership Authentication Transfer Protocol for Ubiquitous Computing Devices. In: International Conference on Computer Communication and Informatics (ICCCI–2013), Jan. 04-06, Coimbatore, INDIA.

[img] PDF
17.pdf - Published Version
Restricted to Registered users only

Download (1MB) | Request a copy
Official URL: http://arxiv.org/abs/1208.1712


Abstract—In ubiquitous computing devices, users tend to store some valuable information in their device. Even though the device can be borrowed by the other user temporarily, it is not safe for any user to borrow or lend the device as it may result the private data of the user to be public. To safeguard the user data and also to preserve user privacy we propose the technique of ownership authentication transfer. The user who is willing to sell the device has to transfer the ownership of the device under sale. Once the device is sold and the ownership has been transferred, the old owner will not be able to use that device at any cost. Either of the users will not be able to use the device if the process of ownership has not been carried out properly. This also takes care of the scenario when the device has been stolen or lost, avoiding the impersonation attack. The proposed protocol has been modeled and verified using Automated Validation of Internet Security Protocols and Applications (AVISPA) and is found to be safe.

Item Type: Conference or Workshop Item (Paper)
Subjects: Engineering > MIT Manipal > Information and Communication Technology
Depositing User: MIT Library
Date Deposited: 02 Mar 2013 10:47
Last Modified: 02 Mar 2013 10:47
URI: http://eprints.manipal.edu/id/eprint/78822

Actions (login required)

View Item View Item