Article Preview
TopOur survey would emphasize on the protocols proposed for privacy and security in a manner of describing the evolution in design of security protocols.
In Al-Muhtadi (2002) a framework for authentication was proposed to preserve privacy and prevent eavesdropping. An extension of Kerberos (Neumann & Ts’o, 1994) and utilizing the location privacy as provided by Mist (Al-Muhtadi, Campbell, Kapadia, Mickunas & Yi, 2002). Multiple levels of authentication were done to build the confidence level of a device which can be any of the smart wrist watches, a smart jewelry, and active badges and so on. Further in the same line many security models were proposed based on cryptographic techniques. Some of which include, Identity-Based Encryption (Hengartner & Steenkiste, 2003; Hengartner & Steenkiste, 2005), Trusted Platform Module (Balfe, Li, & Zhou, 2006), Interaction History model (Bussard, Roudier & Molva, 2004) and so on. The common issue with cryptographic techniques is the high usage of computing resources in a resource constraint environment. Security, privacy and authentication in smart environment using cryptographic techniques are complicated, as it relays on a central authority.