Location authentication in ubiquitous computing environment유비쿼터스 환경에서의 위치 정보에대한 인증기법

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 477
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisorKim, Kwang-Jo-
dc.contributor.advisor김광조-
dc.contributor.authorHan, Kyu-Suk-
dc.contributor.author한규석-
dc.date.accessioned2011-12-30-
dc.date.available2011-12-30-
dc.date.issued2004-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=392444&flag=dissertation-
dc.identifier.urihttp://hdl.handle.net/10203/55307-
dc.description학위논문(석사) - 한국정보통신대학원대학교 : 공학부, 2004, [ ix, 41 p. ]-
dc.description.abstractIn the ubiquitous computing, user``s availability will be maximized with the wireless network. Users get the proper service anytime, anywhere without any restriction of time and location. Without user``s concerns, user``s contexts are sensed by the network to provide the proper service. However, the increasing of user``s availability also will occur the increasing of security risks. Sensing user``s context cause privacy issues. Also, forgery of contexts is also problem. Forgery on location information is critical risk of context based service. There are several researches on location authentication. Denning [11] proposed Differential GPS based location authentication method, while Sastry [12] proposed location authentication method using the time difference from the velocity of radio frequency and sonic. Nakanishi [13] adopted RFID for location information. And, Kindberg [14] showed general model using constrained channel with Wi-Fi, Bluetooth, and etc. But these works are only focused on authentication of location information, there is no consideration of privacy of user. Moreover, they require specific device for protocol. We generalize the risks in the location based service model, and define security requirements in this paper. We also introduce new model of privacy preserving location authentication method which can be adopted in universal. Based on the model, we propose several protocol using asymmetric/symmetric key encryption and one-time key or timestamp. Finally, we discuss DRM in ubiquitous computing environments with location authentication.eng
dc.languageeng-
dc.publisher한국정보통신대학교-
dc.subjectUbiquitous Computing Environment-
dc.titleLocation authentication in ubiquitous computing environment-
dc.title.alternative유비쿼터스 환경에서의 위치 정보에대한 인증기법-
dc.typeThesis(Master)-
dc.identifier.CNRN392444/225023-
dc.description.department한국정보통신대학원대학교 : 공학부, -
dc.identifier.uid020014082-
dc.contributor.localauthorKim, Kwang-Jo-
dc.contributor.localauthor김광조-
Appears in Collection
School of Engineering-Theses_Master(공학부 석사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0