Abstract
With the advent of new generation of mobile access devices such as smartphone and tablet PC, there is coming a need for ubiquitous collaboration which allows people to access information systems with their disparate access devices and to communicate with others in anytime and in anywhere. As the number of collaborators with a large number of disparate access devices increases in ubiquitous collaboration environment, the difficulties for protecting secured resources from unauthorized users as well as unsecured access devices will increase since the resources can be compromised by inadequately secured human and devices. Therfore, authentication mechanism for access of legitimate participants is essential in ubiquitous collaboration environment. In this paper we present an efficient authentication mechanism in ubiquitous collaboration environment. We show that proposed scheme is secure through security analysis and is efficient through the experimental results obtained from the practical evaluation of the scheme in ubiquitous collaboration environment.
Similar content being viewed by others
References
Android Platform. http://www.android.com/
Community Grids Lab (CGL). http://pti.iu.edu/cgl
Forne J, Hinarejos F, Marin A, Almenarez F, Lopez J, Montenegro JA, Lacoste M, Diaz D (2010) Pervasive authentication and authorization infrastructures for mobile users. Comput Secur 29:501–514
He D, Chan S, Chen C, Bu J, Fan R (2011) Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wirel Pers Commun 61:465–476
iPhone. http://www.apple.com/iphone/
Jiang Q, Li G, Ma J, Yang C (2011) Hybrid authentication model for heterogeneous wireless networks. J Huazhong Univ Sci Technol 39:11–14
Kim K, Fox G (2011) Modeling, simulation, and practice of floor control for synchronous and ubiquitous collaboration. Multimed Tools Appl 53:213–236. doi:10.1007/s11042-010-0508-0
Lamport L (1981) Password authentication with insecure communication. Commun ACM 24:770–772
NaradaBrokering. http://www.naradabrokering.org
Pallickara S, Pierce M, Gadgil H, Fox G, Yan Y, Huang Y (2006) A framework for secure end-to-end delivery of messages in publish/subscribe systems. Proceedings of the 7th IEEE/ACM International Conference on Grid Computing (GRID 2006), Barcelona, Spain, pp 28–29
Park JH (2010) An authentication protocol offering service anonymity of mobile device in ubiquitous environment. J Supercomput. doi:10.1007/s11227-010-0467-2
Xu J, Zhu WT, Feng DG (2011) An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Comput Commun 34:319–325
Moon JS, Lee IY (2001) An AAA scheme using ID-based ticket with anonymity in future mobile communication. Comput Commun 34(3):295–304
Shin SB, Yeh HJ, Kim KH, Kim KS (2012) A remote user authentication scheme with anonymity for mobile devices. Int J Adv Robot Syst 9:1–7
Tzeng ZJ, Tzeng WG (2011) Authentication of mobile users in third generation mobile systems. Wirel Pers Commun 16(1):35–50
Zhu J, Ma J (2004) A new authentication scheme with anonymity for wireless environments. IEEE Trans Consum Electron 50(1):230–234
Acknowledgments
This research was supported by the MKE (Ministry of Knowledge Economy), Korea, under the “Employment Contract based Master’s Degree Program for Information Security” supervised by the KISA (Korea Internet Security Agency) and by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education, Science and Technology(No. 2012R1A1A1010667).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Shin, S., Shon, T., Yeh, H. et al. An effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environment. Peer-to-Peer Netw. Appl. 7, 612–619 (2014). https://doi.org/10.1007/s12083-013-0220-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-013-0220-8