Extensions to an authentication technique proposed for the global mobility network

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Overall Cost-effective Authentication Technique for the Global Mobility Network

Designing an efficient and secure authentication technique to detect fraudulent behavior is a very important subject in mobile network systems. However, treating each transaction as a suspect seems to contradict the fact that most communication behaviors are honest. Based on this fact, it is reasonable to design a more efficient authentication protocol despite its loss of efficiency in dishones...

متن کامل

An Authentication Technique Based on Distributed Security Management for the Global Mobility Network

In this paper, we analyse the authentication protocol that has been proposed for the so called global mobility network in the October issue of the IEEE Journal on Selected Areas in Communications. Using a simple logic of authentication, we show that the protocol has aws, and we present three diierent attacks that exploit these. We correct the protocol using a simple design tool that we have dev...

متن کامل

extensions of some polynomial inequalities to the polar derivative

توسیع تعدادی از نامساوی های چند جمله ای در مشتق قطبی

15 صفحه اول

Lightweight and provably secure user authentication with anonymity for the global mobility network

Seamless roaming in the global mobility network (GLOMONET) is highly desirable for mobile users, although their proper authentication is challenging. This is because not only are wireless networks susceptible to attacks, but also mobile terminals have limited computational power. Recently, some authentication schemes with anonymity for the GLOMONET have been proposed. This paper shows some secu...

متن کامل

An efficient and secure anonymous mobility network authentication scheme

The demands of Internet users are steadily increasing. Many users access Internet services through mobile devices via wireless networks. To prevent disclosure of private data, researchers have proposed various anonymous roaming authentication schemes which apply different technologies to provide integral security properties, such as symmetric and asymmetric encryption, digital signature, timest...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Communications

سال: 2000

ISSN: 0090-6778

DOI: 10.1109/26.837039