The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper investigates cooperative jamming for secure connection in wireless networks. A cooperative jamming strategy is proposed to thwart eavesdroppers anywhere in the network, even if they are located close to the source or the destination. The basic idea is to defeat eavesdroppers by a divide and conquer strategy, and exploit the helpful interference from the source and the destination to circumvent...
In recent years, since people pay more and more attention to the protection of their privacy, anonymous authentication in wireless networks has become a hot topic. Currently, most anonymous authentication schemes are based on the asymmetric keys whose tedious computation leads to serious resource consumption, therefore, they are unsuitable for mobile devices with limited capacity. To solve this problem,...
Not only user identities but also the platforms need to be authenticated in wireless networks under trusted computing environment. Based on direct anonymous attestation of trusted computing, a wireless anonymous authentication scheme is proposed, the platform of the mobile node was verified by the foreign network agent and the identity of the mobile node user was authenticated by the home network...
The vertical handoff is highly time-sensitive in the heterogeneous wireless environment. The most available handoff decision methods are based on a few network parameters, and so the prediction of network parameters can intensely improve the efficiency of the vertical handoff. This paper focuses on improving the prediction model based on cost function. We first propose an adaptive network parameter...
The IMS (IP Multimedia Subsystem) can provide multimedia services between heterogeneous wireless networks. But the efficiency of the service session handoff will bring a significant impact to user experience. For the integration of heterogeneous wireless networks, we propose a SIP-based multimedia service session handoff method named MS2HM. To reduce the handoff delay between heterogeneous wireless...
With the fast growth of various mobile terminals, the heterogeneous terminals that have different capabilities and resources are required and mixed in the deployment. Using this feature, we can improve the routing protocol. The available routing protocols for mobile Ad Hoc networks are designed mainly for homogeneous wireless networks. The heterogeneous wireless networks are now needed urgently in...
Authentication and key distribution (AKD) protocols become more and more important in the design of wireless networks. The design criteria of the AKD protocols include the scalability, the communication efficiency, the computational efficiency and the robustness of security. In this paper, we first analyze the vulnerabilities of an AKD protocol for wireless networks under three types of attacks. Then,...
This paper analyzes the mobile model and communication mode of the hierarchical wireless networks, and proposes a new hybrid routing protocol(HRP) for the heterogeneous wireless networks. The routing protocol divides the network coverage area into many units, and selects the nodes which have high energy, long transmission radius and strong reliability as the bone nodes. This paper also presents the...
Delay tolerant networking (DTN) is a new store-and-forward architecture and protocol suite for the networks which is intermittent connectivity. Depending on the nodes ability of store and forward, the messages are delivered to their destination with the proper choice of routing protocol by nodes' mobility. In order to successful delivery, many routing protocols use multiply copies methods. Although...
This paper analyzes the mobile model and communication mode of the hierarchical wireless networks, and proposes a new hybrid routing protocol (HRP) for the heterogeneous wireless networks. The routing protocol divides the network coverage area into many units, and selects the nodes which have high energy, long transmission radius and strong reliability as the bone nodes. This paper also presents the...
In this paper, a collusion-resistant matrix system (CRMS) for group key managements is presented. The CRMS is defined as a collection of subsets of users, and the keys held by users in CRMS are organized in a hierarchical matrix manner. After describing the join and leave protocols, we prove that CRMS has lceil2N/trceil-collusion resistant capability. Moreover, the suggestion of how to select the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.