The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The 3rd Generation Partnership Project published the specifications of heterogeneous cellular and wireless local area networks interworking, enabling to provide high-speed data services along with anywhere, anytime connectivity to mobile users. In order to achieve the required security properties in such settings, Extensible Authentication Protocol-Authentication and Key Agreement (EAP-AKA) is adopted...
Recently, many works have been focusing on solving the problem of privacy protection at link-layer level by randomizing all bits of the frames at link layer so that it makes difficult for unintended recipients to associate sequences of packets to their source transmitters. Most existing schemes however assume either the pre-setup for shared secrets between communication entities or the use of public-key...
Recently, the problem of protecting privacy at link-layer is of great importance in wireless environments, mainly due to the fact that the wireless link layer is not protected by current technologies used in wireless networks. This leads to many potential threats to security and user privacy. Very recently, Lu et al. proposed an authentication scheme for wireless link-layer privacy which is based...
In 2007, Chen et al. proposed a RFID authentication protocol for anti-counterfeiting and privacy protection. A feasible security mechanism for anti-counterfeiting and privacy protection was proposed using XOR and random number shifting operations to enhance RFID tags security providing a low cost. However, their authentication protocol has some drawbacks and security problems because they did not...
Security and privacy on authentication protocol are very important in RFID (Radio Frequency Identification) systems which will become an important part of our daily life. However, the low-cost RFID tags can't perform effective cost cryptographic authentication due to limitation of power and storage resources. In this paper, we propose an efficient authentication protocol in terms of both communication...
Okubo et al. proposed a hash-chain based authentication protocol which protects users' location privacy and anonymity with strong forward security. However, Li et al. claimed that the hash-chain calculation must be a burden on low-cost RFID tags and gives back-end servers heavy calculation loads since the numbers for hash computation are required in a hash chaining technique. Thus, the non-group cellular...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.