Mutual Authentication of B3G devices within Personal Distributed Environments

نویسندگان

  • Karen Louise Billington
  • Allan Tomlinson
چکیده

The Personal Distributed Environment (PDE) is a new concept arising in personal communications beyond 3G (B3G). This paper briefly describes the environment, surveys the protocols available to provide PDE authentication, and assesses their suitability for adaptation to the PDE.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

A Protocol for Secrecy and Authentication within Proxy-Based SPKI/SDSI Mobile Networks

Resource-constrained mobile devices are becoming increasingly popular within distributed networks, but introduce a weak point of security. Existing protocols for distributed mobile device networks, such as SPKI/SDSI, are emerging standards and lack built-in confidentiality, mutual authorisation and mutual authentication. Our research addresses the above-mentioned security limitations of an exis...

متن کامل

An Efficient and Secure ID-Based Mutual Authentication with Key Agreement Scheme Based on ECC for Mobile Devices

Mobile devices (e.g., cell phone, PDA and notebook PC) have gained increasingly popularity due to their portability nature. People use these small mobile devices to accomplish the electronic transactions anytime and anywhere. Accordingly, it makes human life more convenient.Users can use to access many applications, for example internet banking, online shopping, mobile pay TV, are accomplished ...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

IEEE 802 . 21 : Media - Independent Handover Services

P opular mobile devices now ship with several integrated wired and wireless network interfaces. Personal Digital Assistants (PDAs) and smartphones, for example, are increasingly supporting communications through both cellular technologies and Wireless LANs (WLANs); laptops typically come with built-in Ethernet, Wi-Fi, and Bluetooth[1]. As multiaccess devices proliferate, we move closer to a net...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004