A new authentication protocol based on pointer forwarding for mobile communications

نویسندگان

  • Cheng-Chi Lee
  • Min-Shiang Hwang
  • I-En Liao
چکیده

Cheng-Chi Lee1,2, Min-Shiang Hwang3∗,† and I-En Liao1 1Department of Computer Science, National Chung Hsing University, 250 Kuo kuang Road, 402 Taichung, Taiwan, Republic of China 2Department of Computer & Communication Engineering, Asia University, No. 500, Lioufeng Road, Wufeng Shiang, Taichung, Taiwan, Republic of China 3Department of Management Information Systems, National chung Hsing university, 250 Kuo Kuang Road, 402 Taichung, Taiwan, Republic of China

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

Mobility Management Ideas for Wireless Mesh Networks Based on Forwarding Techniques

−Wireless Mesh Networks (WMN’s) are achieving swiftly developing focus in current years, and are commonly recognized as an advanced option for nest era wireless networks. Contrasted with regular wireless and mobile networks, eg. Wi-Fi based wireless networks and mobile IP networks, WMN’s have the advantages of low price, easy implementation, self organization and self healing, and being compati...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Wireless Communications and Mobile Computing

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2008