TY - JOUR T1 - Detail Analysis on the Authentication Models and Developing a Framework for Distributed Trust Model in Internet Scale Ubiquitous Computing AU - , A.K.M. Najmul Islam AU - , K.M. Najmul Islam JO - International Journal of Soft Computing VL - 2 IS - 1 SP - 157 EP - 160 PY - 2007 DA - 2001/08/19 SN - 1816-9503 DO - ijscomp.2007.157.160 UR - https://makhillpublications.co/view-article.php?doi=ijscomp.2007.157.160 KW - Ubiquitous computing KW -ad hoc networking KW -authentication KW -access control list KW -encryption KW -distributed trust AB - Ubiquitous computing aims at defining environments where human beings can interact in an intuitive way with surrounding objects. Those objects, which can be personal digital assistants, electronic rings, doors or even clothes, offer embedded chips with computation power and communication facilities and are generally called artifacts. Apparently confidentiality of communication seems to be the most important issue as the prime concern for any system relying on wireless transmission. But the real problem is actually security. Authentication is also one of the most interesting security problems in ubiquitous computing. Many researchers have proposed different suitable authentication protocols for ubiquitous environment. But if we consider the ubiquitous computing environment, in some cases we find that the authentication procedure will not work. In this study we must have to find out an alternate solution. In this study I have tried to find out some situations where the authentication protocols will not work and presented an alternate solution in these situations. ER -