Multiple trusted devices seamless authentication scheme / Qatrunnada Abdul Rahman

Ubiquitous computing paradigm is a significant progression of computing technology as it has changed the way computing hardware and devices are being set up and used in the surrounding infrastructures. Moreover it mostly populated with smart mobile devices which have networking capability and sensor...

Full description

Saved in:
Bibliographic Details
Main Author: Abdul Rahman, Qatrunnada
Format: Thesis
Language:English
Published: 2017
Subjects:
Online Access:https://ir.uitm.edu.my/id/eprint/37194/1/37194.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-uitm-ir.37194
record_format uketd_dc
spelling my-uitm-ir.371942022-11-01T03:21:20Z Multiple trusted devices seamless authentication scheme / Qatrunnada Abdul Rahman 2017 Abdul Rahman, Qatrunnada Computer engineering. Computer hardware Ubiquitous computing paradigm is a significant progression of computing technology as it has changed the way computing hardware and devices are being set up and used in the surrounding infrastructures. Moreover it mostly populated with smart mobile devices which have networking capability and sensors. Its dynamic and volatile nature also brought many challenging issues in security implementations, particularly on how to provide an appropriate authentication scheme for devices and applications. Therefore authentication services are expected to focus on device to device interaction which is seamless and autonomous instead of user to device interaction which requires human participation. Furthermore, devices in such environment are said to be exposed to attacks such as identity impostor, unauthorized access and also man-in-the-middle attacks. For that reason, through this research an authentication scheme is developed, not only to ensure device's authenticity but also provides seamless authentication without either needing password login or human participation. This condition is achieved by employing a trusted device to authenticate another device seamlessly. Accordingly, the requirements for the proposed authentication scheme are trust and seamlessness. The authentication scheme was developed as a mobile application using Java and was implemented on Android platform. The authentication scheme has been successfully tested on a test-bed using smartphones. In conclusion, it is hoped that this study may establish a new research dimension in the security domain along with contributing towards safeguarding devices' authenticity and the information being shared in a Ubiquitous computing environment as well as enabling seamless device to device authentication. 2017 Thesis https://ir.uitm.edu.my/id/eprint/37194/ https://ir.uitm.edu.my/id/eprint/37194/1/37194.pdf text en public masters Universiti Teknologi MARA (UiTM) Faculty of Computer and Mathematical Sciences Abd Jalil, Kamarularifin
institution Universiti Teknologi MARA
collection UiTM Institutional Repository
language English
advisor Abd Jalil, Kamarularifin
topic Computer engineering
Computer hardware
spellingShingle Computer engineering
Computer hardware
Abdul Rahman, Qatrunnada
Multiple trusted devices seamless authentication scheme / Qatrunnada Abdul Rahman
description Ubiquitous computing paradigm is a significant progression of computing technology as it has changed the way computing hardware and devices are being set up and used in the surrounding infrastructures. Moreover it mostly populated with smart mobile devices which have networking capability and sensors. Its dynamic and volatile nature also brought many challenging issues in security implementations, particularly on how to provide an appropriate authentication scheme for devices and applications. Therefore authentication services are expected to focus on device to device interaction which is seamless and autonomous instead of user to device interaction which requires human participation. Furthermore, devices in such environment are said to be exposed to attacks such as identity impostor, unauthorized access and also man-in-the-middle attacks. For that reason, through this research an authentication scheme is developed, not only to ensure device's authenticity but also provides seamless authentication without either needing password login or human participation. This condition is achieved by employing a trusted device to authenticate another device seamlessly. Accordingly, the requirements for the proposed authentication scheme are trust and seamlessness. The authentication scheme was developed as a mobile application using Java and was implemented on Android platform. The authentication scheme has been successfully tested on a test-bed using smartphones. In conclusion, it is hoped that this study may establish a new research dimension in the security domain along with contributing towards safeguarding devices' authenticity and the information being shared in a Ubiquitous computing environment as well as enabling seamless device to device authentication.
format Thesis
qualification_level Master's degree
author Abdul Rahman, Qatrunnada
author_facet Abdul Rahman, Qatrunnada
author_sort Abdul Rahman, Qatrunnada
title Multiple trusted devices seamless authentication scheme / Qatrunnada Abdul Rahman
title_short Multiple trusted devices seamless authentication scheme / Qatrunnada Abdul Rahman
title_full Multiple trusted devices seamless authentication scheme / Qatrunnada Abdul Rahman
title_fullStr Multiple trusted devices seamless authentication scheme / Qatrunnada Abdul Rahman
title_full_unstemmed Multiple trusted devices seamless authentication scheme / Qatrunnada Abdul Rahman
title_sort multiple trusted devices seamless authentication scheme / qatrunnada abdul rahman
granting_institution Universiti Teknologi MARA (UiTM)
granting_department Faculty of Computer and Mathematical Sciences
publishDate 2017
url https://ir.uitm.edu.my/id/eprint/37194/1/37194.pdf
_version_ 1783734398341873664