Pervasive computing is a future technology that provides a user with the capability to compute and communicate from everywhere. In a pervasive computing environment, a user interacts with many smart devices around him to obtain some useful services from them. These smart devices can be either genuine or malicious. Users privacy is at a greater risk, as they are prone to revealing their location, identity and transactions information to such devices. On the other hand, user authentication is also very much required for authorization and service access control. This allows smart devices to provide services to only authorized users. However, authentication and privacy protection are conflicting issues. In order to protect users from invasion of privacy, they must be allowed to interact anonymously with other smart devices. Thus, authenticating and authorizing an anonymous user becomes a challenging task. In this paper, we propose a simple and efficient "capability-based privacypreser...
Divyan M. Konidala, Dang Nguyen Duc, Dongman Lee,