The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to the characteristics of mobile ad hoc networks such as lack of infrastructure, shared wireless medium, resource constraints, and highly dynamic topology, a number of challenges to security design arise. In mobile ad hoc networks MANETs, traditional security solutions are not adequate due to the lack of infrastructure and the absence of centralized administration. Distributive key management...
Nowadays, short message service (SMS) is faced with various security threats. Thus, the fields of high confidentiality(e.g., mobile E-commerce) require a higher level of security protection on SMS. Secure communication in incredible mobile network has very important significance. This paper presents a high security communication protocol for SMS. Through authentication, decryption and integrity protection,...
Distribute architecture based on threshold scheme is adopted to provide certification service in Mobile Ad Hoc Networks, due to its characteristics such as no infrastructure, no center. There are some problems in those schemes such as fixed threshold value and conspiracy attack. A certificate signature scheme based on threshold group signature is proposed in this paper, comparing to existing distributed...
The exponential growth of the Short Message Service(SMS) use has led this service to a widespread tool for social, marketing and advertising messaging. The mobile devices are quickly becoming Personal Trust Devices (PTD), embedding personal data, which allow sending/receiving private information from/to the PTD. This paper introduces our Trusted-SMS system, which allows users to exchange non-repudiable...
In this paper, the security of user domain including mobile terminal (MT) and user in heterogeneous wireless networks (HWN) are paid more attention. We introduce the trusted platform module (TPM) to ensure the terminal trustworthiness, while password, fingerprint and smartcard guarantee userpsilas identity. MT, user, and smartcard have been regarded as three separated entities, as well as the user...
Ad hoc network is a collection of wireless mobile nodes that could be self-configured with no aid of any established infrastructure, which, however, is commonly susceptible to various attacks. The relevant researches for ad hoc networks have been currently focused on these aspects mentioned above to further solve various security problems. In this contribution, we briefly survey previous works regarding...
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile environments. The traditional public key cryptography involves huge computational costs and is not so suitable for the resource-constrained platforms...
In the area of mobile communication security, a key agreement protocol with mutual authentication is very essential to the following secure sessions between communicators and more attentions are paid to the provability of the protocol security. Based on Blake-Wilson's work, the new notions of secure AK and AKC protocols are defined. An efficient authenticated key agreement protocol for mobile communication...
With dynamic home agent address discovery (DHAAD), as specified in Mobile IPv6, a Mobile Node can discover the address of a suitable Home Agent on the home link. However, DHAAD suffers from security problems as the signaling is not authenticated nor integrity protected. The IETF has defined SEcure Neighbor Discovery that is providing security for the IPv6 Neighbor Discovery protocol, based on several...
In this paper, we first give an overview of security architecture of mobile WiMAX network. Then, we investigate man-in-the-middle attacks and Denial of Service (DoS) attacks toward 802.16e-based Mobile WiMAX network. We find the initial network procedure is not effectively secured that makes Man-in-the-middle and Dos attacks possible. In addition, we find the resource saving and handover procedure...
Neighbor Discovery protocol can be used to communicate between neighboring nodes in the MobileIPv6 environment. For a secure Neighbor Discovery protocol, the IETF SEND working group standardized a Secure Neighbor Discovery protocol, and a Cryptographically Generated Address protocol. Neighbor Discovery protocol can be provided with secure functions by adding the RSA signature option and the CGA parameter...
Due to the rapid growth of mobile networks, many advanced applications have been deployed. However, security of data will be an important factor for their full adoption. Most of these applications will be utilized on resource constrained devices, which makes security protocols currently used in wired networks not fully applicable to mobile networks. Recently, a number of key agreement protocols have...
The deployment of wireless networks is in permanent growth. To exploit their intrinsic mobility advantages, collaborative networks such as first responder networks (FRNs) have recently adopted wireless networking technologies, Albiet at a small scale. FRNs require the collaboration of heterogeneous and mobile groups. Impeding the wide-scale use of wireless networking in FRNs are the many security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.