The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Authentication and key distribution (AKD) protocols become more and more important in the design of wireless networks. The design criteria of the AKD protocols include the scalability, the communication efficiency, the computational efficiency and the robustness of security. In this paper, we first analyze the vulnerabilities of an AKD protocol for wireless networks under three types of attacks. Then,...
Jamming attack by adversaries is the critical threat in Network Centric Warfare that uses tactical wireless networks. Thus research on developing new networking protocols that are resilient to such attacks are of high importance. Geocasting is a prominent routing mechanism in tactical networks to send critical messages such as alarm about chemical attack, guerrilla detection etc, to the nodes within...
An efficient authenticating mobile user protocol for wireless communications was proposed in this paper. The most important feature of our proposed protocol has the property of authenticating mobile user. In this scheme, the mobile stations must be authenticated by visit network. We use the pre-computing, unbalanced technique in which mobile stations have far less computational and communication requirements...
The following topics are dealt with: wireless communications; wireless networks; networks convergence; social mobility; mobile technology; wireless technology; protocols; mobile network deployment; cognitive vehicular networks; cooperative networks; security; spectrum allocation; radio interfaces; traffic and congestion control; QoS; and resource management.
Designing a user authentication protocol with anonymity for the global mobility network (GLOMONET) is a difficult task because wireless networks are more susceptible to attacks and each user has limited energy, processing and storage resources. Recently, some authentication schemes with user anonymity for the GLOMONET have been proposed. This paper shows some weaknesses in those schemes. As the main...
Tang and Wu proposed an efficient mobile authentication scheme for wireless networks, and claimed the scheme can effectively defend all known attacks to mobile networks including the denial-of-service attack. This article shows an existential replication attack on the scheme and, as a result, an attacker can obtain the communication key between a mobile user and the accessed VLR. Fortunately, we improve...
Increasing numbers of mobile users are being allowed to use wireless networks, and universal access is being promoted. In the absent of a single, trusted authentication server, it is a great challenge to ensure the inter-domain security, which makes it feasible for users to migrate into foreign domains. Thus, an authentication mechanism is needed between mobile users and foreign servers, and an authenticated...
Security protocols are not as secure as we assumed. In this paper, we identified a practical way to launch DoS attacks on security protocols by triggering exceptions. Through experiments, we show that even the latest strongly authenticated protocols such as PEAP, EAP-TLS and EAP-TTLS are vulnerable to these attacks. Real attacks have been implemented and tested against TLS-based EAP protocols, the...
This paper presents a distributed authentication architecture based on peer-to-peer networking paradigms to minimise the delays in authenticating and authorising mobile nodes roaming across different wireless networks. The fundamental principle is to provide a mechanism to shift elements required for authentication closer to the mobile node's current point of access thus reducing the need for interaction...
Multicasting has not been widely adopted until now, due to lack of receiver or end user (EU) access control. We have developed the Internet group management protocol with access control (IGMP-AC), an extended version of IGMPv3, which provides EU access control by incorporating the AAA framework into the existing multicast service model. Furthermore, IGMP-AC works as an extensible authentication protocol...
Recently, secure group-oriented applications have grown very rapidly. In order to provide secure group communication, WMNs (Wireless Mesh Network) are required to establish a secret key which is shared with all participants. Recently, Tseng proposed an authenticated group key agreement for regarding mobile networks. This mobile network is an asymmetric wireless network which includes many low-power...
Due to the rapid growth of mobile networks, many advanced applications have been deployed. However, security of data will be an important factor for their full adoption. Most of these applications will be utilized on resource constrained devices, which makes security protocols currently used in wired networks not fully applicable to mobile networks. Recently, a number of key agreement protocols have...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.