Multiple trusted devices seamless authentication scheme / Qatrunnada Abdul Rahman

Ubiquitous computing paradigm is a significant progression of computing technology as it has changed the way computing hardware and devices are being set up and used in the surrounding infrastructures. Moreover it mostly populated with smart mobile devices which have networking capability and sensor...

Full description

Saved in:
Bibliographic Details
Main Author: Abdul Rahman, Qatrunnada
Format: Thesis
Language:English
Published: 2017
Subjects:
Online Access:https://ir.uitm.edu.my/id/eprint/37194/1/37194.pdf
https://ir.uitm.edu.my/id/eprint/37194/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uitm.ir.37194
record_format eprints
spelling my.uitm.ir.371942022-11-01T03:21:20Z https://ir.uitm.edu.my/id/eprint/37194/ Multiple trusted devices seamless authentication scheme / Qatrunnada Abdul Rahman Abdul Rahman, Qatrunnada Computer engineering. Computer hardware Ubiquitous computing paradigm is a significant progression of computing technology as it has changed the way computing hardware and devices are being set up and used in the surrounding infrastructures. Moreover it mostly populated with smart mobile devices which have networking capability and sensors. Its dynamic and volatile nature also brought many challenging issues in security implementations, particularly on how to provide an appropriate authentication scheme for devices and applications. Therefore authentication services are expected to focus on device to device interaction which is seamless and autonomous instead of user to device interaction which requires human participation. Furthermore, devices in such environment are said to be exposed to attacks such as identity impostor, unauthorized access and also man-in-the-middle attacks. For that reason, through this research an authentication scheme is developed, not only to ensure device's authenticity but also provides seamless authentication without either needing password login or human participation. This condition is achieved by employing a trusted device to authenticate another device seamlessly. Accordingly, the requirements for the proposed authentication scheme are trust and seamlessness. The authentication scheme was developed as a mobile application using Java and was implemented on Android platform. The authentication scheme has been successfully tested on a test-bed using smartphones. In conclusion, it is hoped that this study may establish a new research dimension in the security domain along with contributing towards safeguarding devices' authenticity and the information being shared in a Ubiquitous computing environment as well as enabling seamless device to device authentication. 2017 Thesis NonPeerReviewed text en https://ir.uitm.edu.my/id/eprint/37194/1/37194.pdf Multiple trusted devices seamless authentication scheme / Qatrunnada Abdul Rahman. (2017) Masters thesis, thesis, Universiti Teknologi MARA (UiTM).
institution Universiti Teknologi Mara
building Tun Abdul Razak Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Mara
content_source UiTM Institutional Repository
url_provider http://ir.uitm.edu.my/
language English
topic Computer engineering. Computer hardware
spellingShingle Computer engineering. Computer hardware
Abdul Rahman, Qatrunnada
Multiple trusted devices seamless authentication scheme / Qatrunnada Abdul Rahman
description Ubiquitous computing paradigm is a significant progression of computing technology as it has changed the way computing hardware and devices are being set up and used in the surrounding infrastructures. Moreover it mostly populated with smart mobile devices which have networking capability and sensors. Its dynamic and volatile nature also brought many challenging issues in security implementations, particularly on how to provide an appropriate authentication scheme for devices and applications. Therefore authentication services are expected to focus on device to device interaction which is seamless and autonomous instead of user to device interaction which requires human participation. Furthermore, devices in such environment are said to be exposed to attacks such as identity impostor, unauthorized access and also man-in-the-middle attacks. For that reason, through this research an authentication scheme is developed, not only to ensure device's authenticity but also provides seamless authentication without either needing password login or human participation. This condition is achieved by employing a trusted device to authenticate another device seamlessly. Accordingly, the requirements for the proposed authentication scheme are trust and seamlessness. The authentication scheme was developed as a mobile application using Java and was implemented on Android platform. The authentication scheme has been successfully tested on a test-bed using smartphones. In conclusion, it is hoped that this study may establish a new research dimension in the security domain along with contributing towards safeguarding devices' authenticity and the information being shared in a Ubiquitous computing environment as well as enabling seamless device to device authentication.
format Thesis
author Abdul Rahman, Qatrunnada
author_facet Abdul Rahman, Qatrunnada
author_sort Abdul Rahman, Qatrunnada
title Multiple trusted devices seamless authentication scheme / Qatrunnada Abdul Rahman
title_short Multiple trusted devices seamless authentication scheme / Qatrunnada Abdul Rahman
title_full Multiple trusted devices seamless authentication scheme / Qatrunnada Abdul Rahman
title_fullStr Multiple trusted devices seamless authentication scheme / Qatrunnada Abdul Rahman
title_full_unstemmed Multiple trusted devices seamless authentication scheme / Qatrunnada Abdul Rahman
title_sort multiple trusted devices seamless authentication scheme / qatrunnada abdul rahman
publishDate 2017
url https://ir.uitm.edu.my/id/eprint/37194/1/37194.pdf
https://ir.uitm.edu.my/id/eprint/37194/
_version_ 1748705969808867328
score 13.187175