We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Design of Authentication and Access Control Model for Remote Access using GSM Technologies

by S. Pandikumar, S. Ambethkar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 57 - Number 14
Year of Publication: 2012
Authors: S. Pandikumar, S. Ambethkar
10.5120/9181-3601

S. Pandikumar, S. Ambethkar . A Design of Authentication and Access Control Model for Remote Access using GSM Technologies. International Journal of Computer Applications. 57, 14 ( November 2012), 12-15. DOI=10.5120/9181-3601

@article{ 10.5120/9181-3601,
author = { S. Pandikumar, S. Ambethkar },
title = { A Design of Authentication and Access Control Model for Remote Access using GSM Technologies },
journal = { International Journal of Computer Applications },
issue_date = { November 2012 },
volume = { 57 },
number = { 14 },
month = { November },
year = { 2012 },
issn = { 0975-8887 },
pages = { 12-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume57/number14/9181-3601/ },
doi = { 10.5120/9181-3601 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:00:25.372252+05:30
%A S. Pandikumar
%A S. Ambethkar
%T A Design of Authentication and Access Control Model for Remote Access using GSM Technologies
%J International Journal of Computer Applications
%@ 0975-8887
%V 57
%N 14
%P 12-15
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The GSM technologies plays vital role in pervasive computing environments. The open and dynamic nature of the pervasive computing environment allows entities to join and leave frequently. This causes a large number of autonomous entities to interact in an ad-hoc manner, raising concerns as to the trustworthiness of the service providers. Thus service providers are not willing to share their resources to the anonymous users for fear of a potential security violation. To handle the issue of anonymous resource access, a policy based trust management system must grant user access of resources and information based on trustworthiness rather than the conventional technique map access rights authorization. In this paper, we have developed a new model of GSM-SMS based user authentication and policy based resource access, which will guarantee that service providers can securely share an unlimited number of resources to remote access. This framework provides mechanism to administrator to create policy and grant session based access permission to trusted users. The users can access information and resources based on the access policies and session policies through their mobile phone by sending SMS. This is a low cost and high performance model for preserving access control and resource access in pervasive computing environment.

References
  1. Sheikh Iqbal Ahamed, Munirul M. Haque and Nilothpal Talukder, "Service Sharing with Trust in Pervasive Environment: Now it's Time to Break the Jinx", 2008.
  2. S. Pandikumar, "A Model for GSM Based Intelligence PC Monitoring System", International Journal of Advanced Computer Science and Technology, 2012.
  3. Rainer Steffen, Rudi Knorr, "A Trust Based Delegation System for Managing Access Control", In Advances in Pervasive Computing: Adjunct Proc. Pervasive 2005.
  4. Sudip Chakraborty and Indrajit Ray, "TrustBAC - Integrating Trust Relationships into the RBAC Model for Access Control in Open Systems", SACMAT, June 7–9, 2006.
  5. David F. Ferraiolo, D. Richard Kuhn, and Ramaswamy Chandramouli, "Role-Based Access Control", Artech House, Inc. , Norwood, MA, USA, 2003.
  6. Alessandra Toninelli, Rebecca Montanari, Lalana Kagal, and Ora Lassila: "A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments", 5th International Semantic Web Conference, 2006.
  7. Manachai Toahchoodee, "Access Control Models For Pervasive Computing Environments", Ph. D Dissertation, Colorado State University, 2010.
  8. Alessandra Toninelli, Rebecca Montanari, Lalana Kagal, and Ora Lassila: "A Semantic Context-Aware Access Control Framework for Secure Collaborations in ervasive Computing Environments", 5th International Semantic Web Conference, 2006.
  9. M. Anisetti, C. A. Ardagna, V. Bellandi, E. Damiani, S. De Capitani di Vimercati, P. Samarati , "OpenAmbient: a Pervasive Access Control Architecture", Co-located with the International Conference on Emerging Trends in Information and Communication Security (ETRICS'06), Freiburg, Germany, June 6-9, 2006.
  10. Kui Ren and Wenjing Lou: "Privacy Enhanced Access Control in Pervasive Computing Environments"
  11. Ran Yang, "Trust Based Access Control in Infrastructure-Centric Environment", IEEE International Conference on Communications (ICC), 2011.
  12. Michel Kamel, Romain Laborde, Francois Barrere and Abdelmalek Benzekri, "A trust-based virtual collaborative environment", journal of Digital Information Management, 2008.
  13. Deok Gyu Lee, Jong-Wook Han, Doo Soon Park and Im Yeong Lee, "Intelligent Pervasive Network Authentication: S/Key Based Device Authentication", Consumer Communications and Networking Conference, 2009.
  14. Long Zhao Hua, "Research on Pervasive Computing Security", International Conference on Ubiquitous Intelligence & Computing, 2010.
  15. Tsaur, M. J, Wei-Chi Ku and Hao-Rung Chung, "An Improved Password-Based Authenticated Key Agreement Scheme for Pervasive Applications", IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 2008.
Index Terms

Computer Science
Information Sciences

Keywords

GSM SMS Access Control Remote Access Remote Authentication Resource Sharing AT Commands Pervasive Computing Wireless