Download now Free registration required
Pervasive computing is fast becoming a reality with rapid advance in computing and networking technologies. It has the characteristics of scalability, invisibility, and the absence of the fixed infrastructure. Thus, existing security solutions do not fit this new computing environment. In many pervasive applications, devices collaborate with others within a particular area (such as a room or a building) and thus such applications need authentication for security. In this paper, the authors propose a new authentication technique which allows devices to authenticate each other when they are within the same audio region. The main advantage of scheme is that there is no need of the pre-shared secret, the pre-existing trust relationship and human involvement.
- Format: PDF
- Size: 433.7 KB