| 注册
首页|期刊导航|东华大学学报(英文版)|Ubiquitous Computing Identity Authentication Mechanism Based on D-S Evidence Theory and Extended SPKI/SDSI

Ubiquitous Computing Identity Authentication Mechanism Based on D-S Evidence Theory and Extended SPKI/SDSI

SUN Dao-qing CAO Qi-ying

东华大学学报(英文版)2008,Vol.25Issue(5):564-570,7.
东华大学学报(英文版)2008,Vol.25Issue(5):564-570,7.

Ubiquitous Computing Identity Authentication Mechanism Based on D-S Evidence Theory and Extended SPKI/SDSI

Ubiquitous Computing Identity Authentication Mechanism Based on D-S Evidence Theory and Extended SPKI/SDSI

SUN Dao-qing 1CAO Qi-ying2

作者信息

  • 1. College of Mathematics and Computer Science, Anhui Normal University, Wuhu, Anhui 241000, China
  • 2. College of Inforrnation Sciences and Technology, Donghua University, Shanghai 201620, China
  • 折叠

摘要

Abstract

Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classification requirements of identity authentication, the requirement of trust transfer and cross identity authentication, the bi-directional identity authentication, the security delegation and the simple privacy protection etc are all these unsolved problems. In this paper, a new novel ubiquitous computing identity authentication mechanism, named UCIAMdess, is presented. It is based on D-S Evidence Theory and extended SPKI/SDSI. D-S Evidence Theory is used in UCIAMdess to compute the trust value from the ubiquitous computing environment to the principal or between the different ubiquitous computing environments. SPKI-based authorization is expanded by adding the trust certificate in UCIAMdess to solve above problems in the ubiquitous computing environments. The identity authentication mechanism and the algorithm of certificate reduction are given in the paper to solve the multi-levels trnst-correlative identity authentication problems. The performance analyses show that UCIAMdess is a suitable security mechanism in solving the complex ubiquitous computing problems.

关键词

utn'quitous computing/identity authentication mechanism/D-S Evidence Theory/SPKI/SDSI/security

Key words

utn'quitous computing/identity authentication mechanism/D-S Evidence Theory/SPKI/SDSI/security

分类

信息技术与安全科学

引用本文复制引用

SUN Dao-qing,CAO Qi-ying..Ubiquitous Computing Identity Authentication Mechanism Based on D-S Evidence Theory and Extended SPKI/SDSI[J].东华大学学报(英文版),2008,25(5):564-570,7.

基金项目

Supported by the Ministry of Education in China (No. 104086) (No. 104086)

东华大学学报(英文版)

1672-5220

访问量0
|
下载量0
段落导航相关论文