Extensions to an authentication technique proposed for the global mobility network
نویسندگان
چکیده
منابع مشابه
An Overall Cost-effective Authentication Technique for the Global Mobility Network
Designing an efficient and secure authentication technique to detect fraudulent behavior is a very important subject in mobile network systems. However, treating each transaction as a suspect seems to contradict the fact that most communication behaviors are honest. Based on this fact, it is reasonable to design a more efficient authentication protocol despite its loss of efficiency in dishones...
متن کاملAn Authentication Technique Based on Distributed Security Management for the Global Mobility Network
In this paper, we analyse the authentication protocol that has been proposed for the so called global mobility network in the October issue of the IEEE Journal on Selected Areas in Communications. Using a simple logic of authentication, we show that the protocol has aws, and we present three diierent attacks that exploit these. We correct the protocol using a simple design tool that we have dev...
متن کاملextensions of some polynomial inequalities to the polar derivative
توسیع تعدادی از نامساوی های چند جمله ای در مشتق قطبی
15 صفحه اولLightweight and provably secure user authentication with anonymity for the global mobility network
Seamless roaming in the global mobility network (GLOMONET) is highly desirable for mobile users, although their proper authentication is challenging. This is because not only are wireless networks susceptible to attacks, but also mobile terminals have limited computational power. Recently, some authentication schemes with anonymity for the GLOMONET have been proposed. This paper shows some secu...
متن کاملAn efficient and secure anonymous mobility network authentication scheme
The demands of Internet users are steadily increasing. Many users access Internet services through mobile devices via wireless networks. To prevent disclosure of private data, researchers have proposed various anonymous roaming authentication schemes which apply different technologies to provide integral security properties, such as symmetric and asymmetric encryption, digital signature, timest...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Communications
سال: 2000
ISSN: 0090-6778
DOI: 10.1109/26.837039