The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile radio frequency identification (RFID) systems are being employed in many applications such as supply chain management. Since the communications between RFID-reader and server, RFID-tag and RFID-reader are all wireless, security and privacy attracts more attentions, reflected in the research on authentication protocols. But most of the existing authentications only care about the front end (reader...
In this paper, we implement an Open Flow based fully functional 802.1X access network and an IP based cognitive access network which are interconnected as edge networks to our SDN core. We realize seamless mobility in the WLAN domain and mobility between WLAN and Cognitive networks for the clients with dual band support. The pre-installed flows on the backbone aggregate traffic from access networks...
In a recent paper (IEEE Trans. Wireless Commun., vol. 9, no. 11, 2010), Chang and Tsai presented a self-verified mobile authentication scheme for large-scale wireless networks. In this letter, we show that there is a serious security flaw in the key delegation phase of the scheme: two colluding mobile users can retrieve the long-term secret key of their home server without performing any active attacks...
Aiming at moving aspect of heterogeneous wireless network, The paper puts forward a heterogeneous network mobile management mechanism- Identifiers Split Memory, Substitution Transmission Scheme ISMSTS, introduces the basic theory and the protocol process of ISMSTS detailed, and makes the performance analysis and the contrast with MIPv6 protocol. ISMSTS is the mobile management scheme based on the...
IETF (Internet Engineering Task Force) has proposed a PMIPv6 (Proxy Mobile IPv6) to make up for the weak points caused by handoff delay and signaling overhead. The handoff delay and signaling overhead occur due to frequent binding updates during handoff in the MIPv6 (Mobile IPv6). Although the handoff in the PMIPv6 can be faster than that in the MIPv6, there still exists the handoff delay and packet...
With the great development of computer network and communication technology, smart cards have been used more and more popular. How to ensure its secure application and protect its sensitive information becomes the most important problem. Based on elliptic curve cryptosystem, we proposed a new authentication protocol that is built upon two channel model, where mobile telephone and authentication server...
This paper presents an authentication protocol in handoff for overlapping wireless networks security. Our ultimate goal is to find out the optimum solution which should provide best performance in terms of network parameters such as handoff latency and signalling overhead. The proposed protocol decreases the latency delay and the overhead of the network. The simulation results reveal that the proposed...
IETF (Internet Engineering Task Force) has proposed the use of PMIPv6 (Proxy Mobile IPv6) over Mobile IPv6 which has the problem of handover latency and signaling overhead caused by binding update(BU). However, considering that PMIPv6 provides the fast handover only in intra-domain, not inter-domain. IETF is debating whether to go back to the previously proposed method, MIPv6, which allows handover...
The key technology of mobile value-added services is to design protocol, which can meet the poor computing power as well as being security. This paper proposes an Advanced-RPC protocol by adding hash function with key to the Lowe modified BAN concrete Andrew Secure RPC. The new protocol mends some undesirable properties in the old one, enhances forward security, and improves the running efficiency...
According to the security features of WiMAX-based wireless communication network, a fresh new wireless communication authentication protocol called WCAP was advanced and designed adopting the dual-key authentication scheme based on trusted third party; its security was analyzed by two means of technical realization and formal analysis; the protocol was implemented by devising an integrated security...
In order to overcome the drawbacks and combine the advantages of both 3G packet-switched mobile communication systems and WLAN, wireless broadband Internet (WiBro) system based on 2.3GHz bandwidth and IEEE 802.16e developed in Korea. Recently, the new version of WiBro system, named WiBro-evolution (WiBro-EVO) system which provides higher performance and various multimedia services, is being developed...
We analyze several mutual authentication and key exchange protocols (MAKEPs), and present a number of essential properties of the protocols for secure mobile communications. To address the weaknesses of existing protocols, we propose an improved version of MAKEP known as EC-MAKEP. Besides supporting the essential features present in the existing protocols, the proposed protocol also provides the user...
In this paper we present a solution for providing a fast handover in wireless networks which involve network access control based on the ExtensibleAuthenticationProtocol. We propose an approach based on cryptographically generated identities, which reduces the number of round trips during authentication phase and achieves the objective of reducing the impact on existing EAP deployments.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.