Ubi-RKE: A Rhythm Key Based Encryption Scheme for Ubiquitous Devices
Table 2
Security considerations and their descriptions.
Security consideration
Description
Data confidentiality
Ubiquitous devices use wireless communication to access network services. Attackers attempt data sniffing and data modification at that time. A security technique is required to protect the device from sniffing and modification and ensure data confidentiality.
Data integrity
The receiver of a data communication must verify whether the received message has been modified since it was sent. Data integrity has been protected if the received message is pure. Therefore, technologies such as hash functions are required to ensure the data integrity of received messages.
Device availability
Most portable devices use a battery for power. The user cannot perform any task on the device if the battery is exhausted. Therefore, minimizing battery drain is an important function on these devices. We should consider mobile device-optimized methods to ensure availability.