A new authentication protocol based on pointer forwarding for mobile communications
نویسندگان
چکیده
Cheng-Chi Lee1,2, Min-Shiang Hwang3∗,† and I-En Liao1 1Department of Computer Science, National Chung Hsing University, 250 Kuo kuang Road, 402 Taichung, Taiwan, Republic of China 2Department of Computer & Communication Engineering, Asia University, No. 500, Lioufeng Road, Wufeng Shiang, Taichung, Taiwan, Republic of China 3Department of Management Information Systems, National chung Hsing university, 250 Kuo Kuang Road, 402 Taichung, Taiwan, Republic of China
منابع مشابه
Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملMobility Management Ideas for Wireless Mesh Networks Based on Forwarding Techniques
−Wireless Mesh Networks (WMN’s) are achieving swiftly developing focus in current years, and are commonly recognized as an advanced option for nest era wireless networks. Contrasted with regular wireless and mobile networks, eg. Wi-Fi based wireless networks and mobile IP networks, WMN’s have the advantages of low price, easy implementation, self organization and self healing, and being compati...
متن کاملA Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Wireless Communications and Mobile Computing
دوره 8 شماره
صفحات -
تاریخ انتشار 2008