A Study on Security Mechanism for Resource Identifiers in Ubiquitous Network

Article Preview

Abstract:

Due to the openness of Ubiquitous Network, there is high risk for sensitive information leaked by users if any misuse of the resource identifier exists, regarding quantity, usage, storage, and content, which leads to a variety of security concerns. This article puts forward a means of protection against URI attacks in UNRI which is based on authentication, MD5 encryption and redirected URI. Through these methods, latent security threats can be guarded against effectively. Compared with other methods, the mechanism proposed by the author features shorter encryption time, yet more encryption parameters, which guarantees its wider application in ubiquitous business environment.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 989-994)

Pages:

4827-4831

Citation:

Online since:

July 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] M. Zhou, The Research and Implementation of Key Technologies of Telecommunication Protocol between Gateway and Platform in Ubiquitous Network Based on Web, M.S. degree thesis, Beijing University of Posts and Telecommunications, Beijing, (2013).

Google Scholar

[2] E. Du, Secure Link Method for Preventing URL Attack and Fine Granularity Rights Management, Journal of Computer Applications, 2009(8): 2230-2232.

DOI: 10.3724/sp.j.1087.2009.02230

Google Scholar

[3] G. Liu, The Algorithm Design for Preventing URL Modified Based on MD5, Journal of Science & Technology Information, 2011 (3): 88-89.

Google Scholar

[4] G. Qin, T. He, J. Chen, Model of preventing URL attacks based on artificial immunity, Journal of Computer Applications, 2012, 32(5): 1400-1403.

DOI: 10.3724/sp.j.1087.2012.01400

Google Scholar

[5] S. Liu, X. Li, Improvements of Network Security for IPv6, Video Engineering, 2007, 31(2): 58-59.

Google Scholar

[6] R. Moskowitz, P. Nikander, IETF Internet Standard, RFC4423—2006. Host Identity Protocol (HIP)Architecture[S].

DOI: 10.17487/rfc4423

Google Scholar