机构地区:[1]College of Information Sciences and Technology,Donghua University [2]College of Mathematics and Computer Science,Anhui Normal University
出 处:《Journal of Donghua University(English Edition)》2008年第4期475-483,共9页东华大学学报(英文版)
基 金:Supported by the Ministry of Educationin China(No.104086)
摘 要:Ubiquitous computing systems typically have lots of security problems in the area of identification supply by means of classical Public Key Infrastructure (PKI) methods. The limited computing resources, the disconnection network, the classification requirements of identification, the requirement of trust transfer and cross identification, the bidirectional identification, the security delegation and the privacy protection etc are all these unsolved problems. In this paper, UCIMssp, a new novel ubiquitous computing identification mechanism based on SPKI/SDSI and Peer-to-Peer (P2P) is presented. SPKI- based authorization is exploited in UCIMssp to solve the above problems in the smalbscale ubiquitous computing environment. The DHT and flooding technology of P2P overlay network over the Intemet is expanded to solve the routing search in the large-scale ubiquitous computing environment. The architecture of ubiquitous computing environment, the validation of identification requisition, the identification authorization processes and the identification supply processes etc of UCIMssp are described in the paper. The performance analysis shows that UCIMssp is a suitable security solution used in the large-scale ubiquitous computing environment.Ubiquitous computing systems typically have lots of security problems in the area of identification supply by means of classical Public Key Infrastructure(PKI)methods.The limited computing resources,the disconnection network,the classification requirements of identification,the requirement of trust transfer and cross identification,the bidirectional identification,the security delegation and the privacy protection etc are all these unsolved problems.In this paper,UCIMssp,a new novel ubiquitous computing identification mechanism based on SPKI/SDSI and Peer-to-Peer(P2P)is presented.SPKI-based authorization is exploited in UCIMssp to solve the above problems in the small-scale ubiquitous computing environment.The DHT and flooding technology of P2P overlay network over the Internet is expanded to solve the routing search in the large-scale ubiquitous computing environment.The architecture of ubiquitous computing environment,the validation of identification requisition,the identification authorization processes and the identification supply processes etc of UCIMssp are described in the paper.The performance analysis shows that UCIMssp is a suitable security solution used in the large-scale ubiquitous computing environment.
关 键 词:ubiquitous computing identification mechanism UCIMssp SPKI/SDSI Peer-to-Peer security
分 类 号:TP393.08[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...