A Communication Security Protocol for Ubiquitous Sensor Networks
Title | A Communication Security Protocol for Ubiquitous Sensor Networks |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Sain, M., Bruce, N., Kim, K. H., Lee, H. J. |
Conference Name | 2017 19th International Conference on Advanced Communication Technology (ICACT) |
Date Published | feb |
ISBN Number | 978-89-968650-9-4 |
Keywords | Access Credential, authentication, cipher content, communication protocol, communication security protocol, cryptographic access, cryptography, gateway, Human Behavior, human factors, information technology, key exchange computation process, Logic gates, Medical services, Metrics, privacy, Protocols, pubcrawl, Public key, Resiliency, Scalability, security, telecommunication security, ubiquitous computing, Ubiquitous Computing Security, ubiquitous network system, ubiquitous sensor networks, Wireless sensor networks |
Abstract | The data accessibility anytime and anywhere is nowadays the key feature for information technology enabled by the ubiquitous network system for huge applications. However, security and privacy are perceived as primary obstacles to its wide adoption when it is applied to the end user application. When sharing sensitive information, personal s' data protection is the paramount requirement for the security and privacy to ensure the trustworthiness of the service provider. To this end, this paper proposes communication security protocol to achieve data protection when a user is sending his sensitive data to the network through gateway. We design a cipher content and key exchange computation process. Finally, the performance analysis of the proposed scheme ensure the honesty of the gateway service provider, since the user has the ability to control who has access to his data by issuing a cryptographic access credential to data users. |
URL | http://ieeexplore.ieee.org/document/7890088/ |
DOI | 10.23919/ICACT.2017.7890088 |
Citation Key | sain_communication_2017 |
- Metrics
- wireless sensor networks
- ubiquitous sensor networks
- ubiquitous network system
- Ubiquitous Computing Security
- ubiquitous computing
- telecommunication security
- security
- Scalability
- Resiliency
- Public key
- pubcrawl
- Protocols
- privacy
- Access Credential
- Medical services
- Logic gates
- key exchange computation process
- information technology
- Human Factors
- Human behavior
- gateway
- Cryptography
- cryptographic access
- communication security protocol
- communication protocol
- cipher content
- authentication