Towards a robust privacy and anonymity preserving architecture for ubiquitous computing - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2008

Towards a robust privacy and anonymity preserving architecture for ubiquitous computing

Résumé

Anonymous authentication is a means of authorizing a user without revealing his/her identification. Mobile technologies such as Radio Frequency Identification (RFID) Tags, PDAs and mobile phone systems are increasingly being deployed in pervasive computing. These mobile devices have raised public concern regarding violation of privacy, anonymity and information confidentiality. Considering these concerns, there is a growing need to discover and develop techniques and methods to overcome the threats described above. In this paper we propose an architecture which enhances the privacy and anonymity of users in ubiquitous computing and yet preserves the security requirements of the system. Our proposed architecture is based on Elliptic Curve techniques, on Map-to-Curve or Map-To-Point function, on Weil Pairing techniques and finally on elliptic curve based Okamoto Identification Scheme. In addition, we present a formal validation of our protocol by using the AVISPA tool. The main comparative study of our proposed architecture is to provide privacy and Anonymity for mobile users. Our proposed architecture achieves many of desirable security requirements
Fichier non déposé

Dates et versions

hal-01342666 , version 1 (06-07-2016)

Identifiants

Citer

Pierre Abi-Char, Mounir Mokhtari, Abdallah M'Hamed, Bachar El Hassan. Towards a robust privacy and anonymity preserving architecture for ubiquitous computing. CRiSIS 2008 : 3rd International Conference on Risks and Security of Internet and Systems, Oct 2008, Tozeur, Tunisia. pp.125 - 132, ⟨10.1109/CRISIS.2008.4757472⟩. ⟨hal-01342666⟩
37 Consultations
0 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More