KCI-resilient anonymous wireless link-layer authentication protocols
نویسندگان
چکیده
منابع مشابه
Quantifying and Preventing Privacy Threats in Wireless Link Layer Protocols
The proliferation of mobile wireless devices enables or magnifies several privacy threats that traditional link layer confidentiality mechanisms, such as payload encryption, do not protect against: user tracking, profiling, and traffic analysis. For example, it is well known that the exposure of long-lived, unique device addresses can be used to track users over time. Although these addresses c...
متن کاملAnonymous Client Authentication for Transport Layer Security
Nowadays, anonymity and privacy protecting mechanisms are becoming more and more important. The anonymity of platforms and the privacy of users operating in the Internet are major concerns of current research activities. Although different techniques for protecting anonymity exist, standard protocols like Transport Layer Security are still missing adequate support for these technologies. In thi...
متن کاملAnonymous channel and authentication in wireless communications
In this paper, we propose a scheme for providing anonymous channel service in wireless communications. By this service, many interesting applications, such as electronic elections, anonymous group discussions, with user identification confidential can be easily realized. No one can trace a sender’s identification and no one but the authority centre can distinguish an anonymous message from a no...
متن کاملToward New Link Layer Protocols
This paper describes an experimental new link layer protocol for amateur packet radio use. It extends my earlier MACA scheme for dealing with hidden terminals by incorporating a powerful forward error correction (FEC) scheme: convolutional coding with sequential decoding. The resulting hybrid protocol combines the best of the FEC and retransmission (ARQ) techniques. It should perform very well ...
متن کاملAuthentication Protocols in Wireless Communications
This paper examines authentication protocols used for wireless communications, especially in the multi-operator environment, to see what security services they provide and how they do it. Weaknesses of each protocol and differences among them will also be discussed.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mathematical and Computer Modelling
سال: 2012
ISSN: 0895-7177
DOI: 10.1016/j.mcm.2012.01.018