Research Article

Ubi-RKE: A Rhythm Key Based Encryption Scheme for Ubiquitous Devices

Table 2

Security considerations and their descriptions.

Security considerationDescription

Data confidentialityUbiquitous devices use wireless communication to access network services. Attackers attempt data sniffing and data modification at that time. A security technique is required to protect the device from sniffing and modification and ensure data confidentiality.

Data integrityThe receiver of a data communication must verify whether the received message has been modified since it was sent. Data integrity has been protected if the received message is pure. Therefore, technologies such as hash functions are required to ensure the data integrity of received messages.

Device availabilityMost portable devices use a battery for power. The user cannot perform any task on the device if the battery is exhausted. Therefore, minimizing battery drain is an important function on these devices. We should consider mobile device-optimized methods to ensure availability.