Secure Authentication in Heterogeneous Wireless Networks

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Secure Routing Algorithm for Underwater Wireless Sensor Networks

Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...

متن کامل

Loss tolerant video streaming authentication in heterogeneous wireless networks

Multicast video streaming in heterogeneous networks undergoes to very different physical constraints, in fact, such networks are characterized by different QoS parameters, involving one or more transcoding process between the sender and the receivers. Video streaming authentication algorithms must be robust to transcoding processes and must guarantee the copyright of the video owner/producer. W...

متن کامل

Secure and Efficient Vertical Handover in Heterogeneous Wireless Networks

-------------------------------------------------------------------ABSTRACT-------------------------------------------------------------Handover occurs when a wireless node switches from one network to another. One of the main requirements of this process is to make it secure by using reliable security mechanisms, but it can decrease performance as well. So it is very essential to maintain bala...

متن کامل

Secure and Fast OTP Authentication Protocol for Wireless Networks

Wireless Networks provide more flexibility and connectivity to the users, to be connected with anyone, any time, any where. This feature makes the wireless networks to be wide open to threats and attacks by the intruders. To ensure a reliable and secure wireless environment, suitable authentication protocols have to be employed based on the network infrastructure. The scope of this thesis is to...

متن کامل

A secure authentication and billing architecture for wireless mesh networks

Wireless mesh networks (WMNs) are gaining growing interest as a promising technology for ubiquitous high-speed network access. While much effort has been made to address issues at physical, data link, and network layers, little attention has been paid to the security aspect central to the realistic deployment of WMNs. We propose UPASS, the first known secure authentication and billing architect...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Mobile Information Systems

سال: 2008

ISSN: 1574-017X,1875-905X

DOI: 10.1155/2008/135848