Multiple trusted devices seamless authentication scheme / Qatrunnada Abdul Rahman
Ubiquitous computing paradigm is a significant progression of computing technology as it has changed the way computing hardware and devices are being set up and used in the surrounding infrastructures. Moreover it mostly populated with smart mobile devices which have networking capability and sensor...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2017
|
Subjects: | |
Online Access: | https://ir.uitm.edu.my/id/eprint/37194/1/37194.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-uitm-ir.37194 |
---|---|
record_format |
uketd_dc |
spelling |
my-uitm-ir.371942022-11-01T03:21:20Z Multiple trusted devices seamless authentication scheme / Qatrunnada Abdul Rahman 2017 Abdul Rahman, Qatrunnada Computer engineering. Computer hardware Ubiquitous computing paradigm is a significant progression of computing technology as it has changed the way computing hardware and devices are being set up and used in the surrounding infrastructures. Moreover it mostly populated with smart mobile devices which have networking capability and sensors. Its dynamic and volatile nature also brought many challenging issues in security implementations, particularly on how to provide an appropriate authentication scheme for devices and applications. Therefore authentication services are expected to focus on device to device interaction which is seamless and autonomous instead of user to device interaction which requires human participation. Furthermore, devices in such environment are said to be exposed to attacks such as identity impostor, unauthorized access and also man-in-the-middle attacks. For that reason, through this research an authentication scheme is developed, not only to ensure device's authenticity but also provides seamless authentication without either needing password login or human participation. This condition is achieved by employing a trusted device to authenticate another device seamlessly. Accordingly, the requirements for the proposed authentication scheme are trust and seamlessness. The authentication scheme was developed as a mobile application using Java and was implemented on Android platform. The authentication scheme has been successfully tested on a test-bed using smartphones. In conclusion, it is hoped that this study may establish a new research dimension in the security domain along with contributing towards safeguarding devices' authenticity and the information being shared in a Ubiquitous computing environment as well as enabling seamless device to device authentication. 2017 Thesis https://ir.uitm.edu.my/id/eprint/37194/ https://ir.uitm.edu.my/id/eprint/37194/1/37194.pdf text en public masters Universiti Teknologi MARA (UiTM) Faculty of Computer and Mathematical Sciences Abd Jalil, Kamarularifin |
institution |
Universiti Teknologi MARA |
collection |
UiTM Institutional Repository |
language |
English |
advisor |
Abd Jalil, Kamarularifin |
topic |
Computer engineering Computer hardware |
spellingShingle |
Computer engineering Computer hardware Abdul Rahman, Qatrunnada Multiple trusted devices seamless authentication scheme / Qatrunnada Abdul Rahman |
description |
Ubiquitous computing paradigm is a significant progression of computing technology as it has changed the way computing hardware and devices are being set up and used in the surrounding infrastructures. Moreover it mostly populated with smart mobile devices which have networking capability and sensors. Its dynamic and volatile nature also brought many challenging issues in security implementations, particularly on how to provide an appropriate authentication scheme for devices and applications. Therefore authentication services are expected to focus on device to device interaction which is seamless and autonomous instead of user to device interaction which requires human participation. Furthermore, devices in such environment are said to be exposed to attacks such as identity impostor, unauthorized access and also man-in-the-middle attacks. For that reason, through this research an authentication scheme is developed, not only to ensure device's authenticity but also provides seamless authentication without either needing password login or human participation. This condition is achieved by employing a trusted device to authenticate another device seamlessly. Accordingly, the requirements for the proposed authentication scheme are trust and seamlessness. The authentication scheme was developed as a mobile application using Java and was implemented on Android platform. The authentication scheme has been successfully tested on a test-bed using smartphones. In conclusion, it is hoped that this study may establish a new research dimension in the security domain along with contributing towards safeguarding devices' authenticity and the information being shared in a Ubiquitous computing environment as well as enabling seamless device to device authentication. |
format |
Thesis |
qualification_level |
Master's degree |
author |
Abdul Rahman, Qatrunnada |
author_facet |
Abdul Rahman, Qatrunnada |
author_sort |
Abdul Rahman, Qatrunnada |
title |
Multiple trusted devices seamless authentication scheme / Qatrunnada Abdul Rahman |
title_short |
Multiple trusted devices seamless authentication scheme / Qatrunnada Abdul Rahman |
title_full |
Multiple trusted devices seamless authentication scheme / Qatrunnada Abdul Rahman |
title_fullStr |
Multiple trusted devices seamless authentication scheme / Qatrunnada Abdul Rahman |
title_full_unstemmed |
Multiple trusted devices seamless authentication scheme / Qatrunnada Abdul Rahman |
title_sort |
multiple trusted devices seamless authentication scheme / qatrunnada abdul rahman |
granting_institution |
Universiti Teknologi MARA (UiTM) |
granting_department |
Faculty of Computer and Mathematical Sciences |
publishDate |
2017 |
url |
https://ir.uitm.edu.my/id/eprint/37194/1/37194.pdf |
_version_ |
1783734398341873664 |