Ownership authentication transfer protocol for ubiquitous computing devices

B. H. Pradeep, Sanjay Singh

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

In ubiquitous computing devices, users tend to store some valuable information in their device. Even though the device can be borrowed by the other user temporarily, it is not safe for any user to borrow or lend the device as it may result the private data of the user to be public. To safeguard the user data and also to preserve user privacy we propose the technique of ownership authentication transfer. The user who is willing to sell the device has to transfer the ownership of the device under sale. Once the device is sold and the ownership has been transferred, the old owner will not be able to use that device at any cost. Either of the users will not be able to use the device if the process of ownership has not been carried out properly. This also takes care of the scenario when the device has been stolen or lost, avoiding the impersonation attack. The proposed protocol has been modeled and verified using Automated Validation of Internet Security Protocols and Applications (AVISPA) and is found to be safe.

Original languageEnglish
Title of host publication2013 International Conference on Computer Communication and Informatics, ICCCI 2013
DOIs
Publication statusPublished - 12-03-2013
Event2013 3rd International Conference on Computer Communication and Informatics, ICCCI 2013 - Coimbatore, India
Duration: 04-01-201306-01-2013

Conference

Conference2013 3rd International Conference on Computer Communication and Informatics, ICCCI 2013
CountryIndia
CityCoimbatore
Period04-01-1306-01-13

Fingerprint

Ubiquitous computing
Authentication
Network protocols
Sales
Internet
Costs

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Information Systems

Cite this

Pradeep, B. H., & Singh, S. (2013). Ownership authentication transfer protocol for ubiquitous computing devices. In 2013 International Conference on Computer Communication and Informatics, ICCCI 2013 [6466133] https://doi.org/10.1109/ICCCI.2013.6466133
Pradeep, B. H. ; Singh, Sanjay. / Ownership authentication transfer protocol for ubiquitous computing devices. 2013 International Conference on Computer Communication and Informatics, ICCCI 2013. 2013.
@inproceedings{12fab594e27d4b4692bfac845f1e678e,
title = "Ownership authentication transfer protocol for ubiquitous computing devices",
abstract = "In ubiquitous computing devices, users tend to store some valuable information in their device. Even though the device can be borrowed by the other user temporarily, it is not safe for any user to borrow or lend the device as it may result the private data of the user to be public. To safeguard the user data and also to preserve user privacy we propose the technique of ownership authentication transfer. The user who is willing to sell the device has to transfer the ownership of the device under sale. Once the device is sold and the ownership has been transferred, the old owner will not be able to use that device at any cost. Either of the users will not be able to use the device if the process of ownership has not been carried out properly. This also takes care of the scenario when the device has been stolen or lost, avoiding the impersonation attack. The proposed protocol has been modeled and verified using Automated Validation of Internet Security Protocols and Applications (AVISPA) and is found to be safe.",
author = "Pradeep, {B. H.} and Sanjay Singh",
year = "2013",
month = "3",
day = "12",
doi = "10.1109/ICCCI.2013.6466133",
language = "English",
isbn = "9781467329057",
booktitle = "2013 International Conference on Computer Communication and Informatics, ICCCI 2013",

}

Pradeep, BH & Singh, S 2013, Ownership authentication transfer protocol for ubiquitous computing devices. in 2013 International Conference on Computer Communication and Informatics, ICCCI 2013., 6466133, 2013 3rd International Conference on Computer Communication and Informatics, ICCCI 2013, Coimbatore, India, 04-01-13. https://doi.org/10.1109/ICCCI.2013.6466133

Ownership authentication transfer protocol for ubiquitous computing devices. / Pradeep, B. H.; Singh, Sanjay.

2013 International Conference on Computer Communication and Informatics, ICCCI 2013. 2013. 6466133.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Ownership authentication transfer protocol for ubiquitous computing devices

AU - Pradeep, B. H.

AU - Singh, Sanjay

PY - 2013/3/12

Y1 - 2013/3/12

N2 - In ubiquitous computing devices, users tend to store some valuable information in their device. Even though the device can be borrowed by the other user temporarily, it is not safe for any user to borrow or lend the device as it may result the private data of the user to be public. To safeguard the user data and also to preserve user privacy we propose the technique of ownership authentication transfer. The user who is willing to sell the device has to transfer the ownership of the device under sale. Once the device is sold and the ownership has been transferred, the old owner will not be able to use that device at any cost. Either of the users will not be able to use the device if the process of ownership has not been carried out properly. This also takes care of the scenario when the device has been stolen or lost, avoiding the impersonation attack. The proposed protocol has been modeled and verified using Automated Validation of Internet Security Protocols and Applications (AVISPA) and is found to be safe.

AB - In ubiquitous computing devices, users tend to store some valuable information in their device. Even though the device can be borrowed by the other user temporarily, it is not safe for any user to borrow or lend the device as it may result the private data of the user to be public. To safeguard the user data and also to preserve user privacy we propose the technique of ownership authentication transfer. The user who is willing to sell the device has to transfer the ownership of the device under sale. Once the device is sold and the ownership has been transferred, the old owner will not be able to use that device at any cost. Either of the users will not be able to use the device if the process of ownership has not been carried out properly. This also takes care of the scenario when the device has been stolen or lost, avoiding the impersonation attack. The proposed protocol has been modeled and verified using Automated Validation of Internet Security Protocols and Applications (AVISPA) and is found to be safe.

UR - http://www.scopus.com/inward/record.url?scp=84874690767&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84874690767&partnerID=8YFLogxK

U2 - 10.1109/ICCCI.2013.6466133

DO - 10.1109/ICCCI.2013.6466133

M3 - Conference contribution

SN - 9781467329057

BT - 2013 International Conference on Computer Communication and Informatics, ICCCI 2013

ER -

Pradeep BH, Singh S. Ownership authentication transfer protocol for ubiquitous computing devices. In 2013 International Conference on Computer Communication and Informatics, ICCCI 2013. 2013. 6466133 https://doi.org/10.1109/ICCCI.2013.6466133