The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An ad-hoc network is a multi-hop wireless network where all nodes cooperatively maintain network connectivity without a centralized infrastructure. If these nodes change their positions dynamically, it is called a mobile ad-hoc network (MANET). Since the network topology changes frequently, efficient adaptive routing protocols such as AODV, DSR, and NTP are used. As the network is wireless, security...
To provide secure communication for universal mobile telecommunications system (UMTS) Mobile Networks, authentication and key agreement (AKA) is carried out between the user and the home environment, and the authentication protocol is an important primitive for entity authentication and session keys. The current authentication protocol is giving a reasonable security level. However it is overloading...
A mobile ad hoc network is an up-to-date one emerging with the development of wireless communication technology. Nowadays, it has become more and more popular. Along with the development, more and more authentication protocols in ad hoc network have been proposed. But the problem is that how to validate the security and efficiency of these proposed protocols. In this paper, we proposed a general model...
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but its security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against...
In mobile WiMAX (M-WiMAX), while generating cipher-based message authentication code (CMAC) for security, some bits of it are truncated and also while deriving a key hierarchy, some part of keying material is discarded. In this paper, we exploit these discarded information to enhance the security in M-WiMAX, and consider two cases of discarded information. Firstly, we propose to use the truncated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.