Title :
Information Hiding for pervasive trusted authentication
Author :
Liu, Wenjuan ; Fu, Xiufen ; Ouyang, Shaocong ; Lin, Jinchuan ; Teng, Shaohua
Author_Institution :
Fac. of Comput., Guangdong Univ. of Technol., Guangzhou, China
Abstract :
Pervasive computing promises rich and seamless interaction with the surrounding computing environment. However, the ubiquitous environment presents a new security challenge. Authentication is a cornerstone of security. This paper proposes a secure authentication model based on Information Hiding and implements an approach for hiding and restoring the authentication information using IP header of TCP/IP packets. The proposed model, showing Information Hiding can play for authentication in a pervasive environment, may be generalized for trustworthy authentication of security devices such as firewalls. Finally we analyze the security properties of proposed model and approach, which shows that the model is feasible.
Keywords :
authorisation; data encapsulation; ubiquitous computing; IP header; TCP/IP packets; firewalls; information hiding; information restoration; pervasive computing; pervasive trusted authentication; secure authentication model; security devices; ubiquitous environment; Authentication; Biometrics; Cryptography; Fingerprint recognition; Information security; Intrusion detection; Pervasive computing; Privacy; RFID tags; Speech recognition; Authentication; Information Hiding; Packets; Pervasive Computing;
Conference_Titel :
Pervasive Computing (JCPC), 2009 Joint Conferences on
Conference_Location :
Tamsui, Taipei
Print_ISBN :
978-1-4244-5227-9
Electronic_ISBN :
978-1-4244-5228-6
DOI :
10.1109/JCPC.2009.5420101