Ubiquitous ID Architecture
ثبت نشده
چکیده
منابع مشابه
A Virtual Architecture based on the ID/Locator Split Concept for Future Wireless Networks (FWNs)
Future Wireless Networks (FWNs) will be a convergence of many fixed and mobile networking technologies including cellular, wireless LANs, and traditional wired networks. This united ubiquitous network will consist of billions of networkable devices with different networking interfaces. A common networking protocol is required to communicate among these devices and interfaces; System Architectur...
متن کاملA secure authentication and billing architecture for wireless mesh networks
Wireless mesh networks (WMNs) are gaining growing interest as a promising technology for ubiquitous high-speed network access. While much effort has been made to address issues at physical, data link, and network layers, little attention has been paid to the security aspect central to the realistic deployment of WMNs. We propose UPASS, the first known secure authentication and billing architect...
متن کاملVirtualization architecture using the ID/Locator split concept for Future Wireless Networks (FWNs)
Future Wireless Networks (FWNs) will be a convergence of many fixed and mobile networking technologies including cellular, wireless LANs, and traditional wired networks. This united ubiquitous network will consist of billions of networkable devices with different networking interfaces. A common networking protocol is required to communicate among these devices and interfaces; System Architectur...
متن کاملRequirements Analysis for Identity Management in Ambient Environments: The HYDRA Approach
The research field of Ambient Environments and Ubiquitous Computing aims toward the future vision of intelligent mobile and wireless network scenarios. In such environments where the wireless network consists of numerous nodes, like intelligent devices, sensors and mobile devices, a highly secured and well defined Identity (ID) Management System is required that deals with issues like virtual a...
متن کاملA Dynamic ID-Based Authentication Scheme for M2M Communication of Healthcare Systems
M2M (machine to machine) applications involving intelligence to ubiquitous environment have been in existence for the past many years. However, its provisioning using mobile technologies raises a new security challenge. Security services such as authentication and key establishment are critical in M2M, especially for healthcare systems. We proposed a simple architecture M2M service to apply any...
متن کامل