TY - JOUR T1 - An Efficient Model for on the Fly Authentication in Ubiquitous Computing System AU - , A. K. M. Najmul Islam AU - , M. Fahim Ferdous Khan AU - , Md. Abu Esa Sarkar AU - , Kamrul Hasan JO - Asian Journal of Information Technology VL - 4 IS - 1 SP - 108 EP - 111 PY - 2005 DA - 2001/08/19 SN - 1682-3915 DO - ajit.2005.108.111 UR - https://makhillpublications.co/view-article.php?doi=ajit.2005.108.111 KW - AB - Ubiquitous computing aims at defining environments where human beings can interact in an intuitive way with surrounding objects. Those objects, which can be personal digital assistants, electronic rings, doors or even clothes, offer embedded chips with computation power and communication facilities and are generally called artifacts. Apparently confidentiality of communication seems to be the most important issue as the prime concern for any system relying on wireless transmission. But the real problem is actually authentication. Without being sure that one is speaking to the correct party, there is little point in encrypting the secrets he wants to communicate; whereas if one has successfully authenticated his interlocutor and established some key material, protecting communications confidentiality with strong and efficient encryption is nowadays a solved problem. Authentication is also one of the most interesting security problems in ad hoc networking, because much of the conventional wisdom from distributed systems does not quite carry over. In this study we have proposed a flexible and on the fly authentication model for devices under the same ownership. ER -