Skip to main content
Log in

An effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environment

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

With the advent of new generation of mobile access devices such as smartphone and tablet PC, there is coming a need for ubiquitous collaboration which allows people to access information systems with their disparate access devices and to communicate with others in anytime and in anywhere. As the number of collaborators with a large number of disparate access devices increases in ubiquitous collaboration environment, the difficulties for protecting secured resources from unauthorized users as well as unsecured access devices will increase since the resources can be compromised by inadequately secured human and devices. Therfore, authentication mechanism for access of legitimate participants is essential in ubiquitous collaboration environment. In this paper we present an efficient authentication mechanism in ubiquitous collaboration environment. We show that proposed scheme is secure through security analysis and is efficient through the experimental results obtained from the practical evaluation of the scheme in ubiquitous collaboration environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig 6
Fig. 7

Similar content being viewed by others

References

  1. Android Platform. http://www.android.com/

  2. Community Grids Lab (CGL). http://pti.iu.edu/cgl

  3. Forne J, Hinarejos F, Marin A, Almenarez F, Lopez J, Montenegro JA, Lacoste M, Diaz D (2010) Pervasive authentication and authorization infrastructures for mobile users. Comput Secur 29:501–514

    Article  Google Scholar 

  4. He D, Chan S, Chen C, Bu J, Fan R (2011) Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wirel Pers Commun 61:465–476

    Article  Google Scholar 

  5. iPhone. http://www.apple.com/iphone/

  6. Jiang Q, Li G, Ma J, Yang C (2011) Hybrid authentication model for heterogeneous wireless networks. J Huazhong Univ Sci Technol 39:11–14

    Google Scholar 

  7. Kim K, Fox G (2011) Modeling, simulation, and practice of floor control for synchronous and ubiquitous collaboration. Multimed Tools Appl 53:213–236. doi:10.1007/s11042-010-0508-0

    Article  Google Scholar 

  8. Lamport L (1981) Password authentication with insecure communication. Commun ACM 24:770–772

    Article  Google Scholar 

  9. NaradaBrokering. http://www.naradabrokering.org

  10. Pallickara S, Pierce M, Gadgil H, Fox G, Yan Y, Huang Y (2006) A framework for secure end-to-end delivery of messages in publish/subscribe systems. Proceedings of the 7th IEEE/ACM International Conference on Grid Computing (GRID 2006), Barcelona, Spain, pp 28–29

  11. Park JH (2010) An authentication protocol offering service anonymity of mobile device in ubiquitous environment. J Supercomput. doi:10.1007/s11227-010-0467-2

    Google Scholar 

  12. Xu J, Zhu WT, Feng DG (2011) An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Comput Commun 34:319–325

    Article  Google Scholar 

  13. Moon JS, Lee IY (2001) An AAA scheme using ID-based ticket with anonymity in future mobile communication. Comput Commun 34(3):295–304

    Article  MathSciNet  Google Scholar 

  14. Shin SB, Yeh HJ, Kim KH, Kim KS (2012) A remote user authentication scheme with anonymity for mobile devices. Int J Adv Robot Syst 9:1–7

    Article  Google Scholar 

  15. Tzeng ZJ, Tzeng WG (2011) Authentication of mobile users in third generation mobile systems. Wirel Pers Commun 16(1):35–50

    Article  Google Scholar 

  16. Zhu J, Ma J (2004) A new authentication scheme with anonymity for wireless environments. IEEE Trans Consum Electron 50(1):230–234

    MathSciNet  Google Scholar 

Download references

Acknowledgments

This research was supported by the MKE (Ministry of Knowledge Economy), Korea, under the “Employment Contract based Master’s Degree Program for Information Security” supervised by the KISA (Korea Internet Security Agency) and by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education, Science and Technology(No. 2012R1A1A1010667).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kangseok Kim.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Shin, S., Shon, T., Yeh, H. et al. An effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environment. Peer-to-Peer Netw. Appl. 7, 612–619 (2014). https://doi.org/10.1007/s12083-013-0220-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-013-0220-8

Keywords

Navigation