The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This demonstration shows an innovative concept that introduces PKI for mobile operators. A commercial 3G dongle is equipped with an USIM module used for subscriber's authentication. The USIM embeds a tiny SSL stack written for java cards. The 3G modem delivers internet connectivity and realizes strong mutual SSL authentication providing, in the presented use case, seamless access to real OPENID services.
This paper forward a method for making FMIPv6 security and fast handover based on the context transfer protocol. The context transfer protocol realizes foreign network certificates the mobile node MN rapidly and safely without home network participating. Besides, during the transferring period, the paper adopts ECC mechanism to keep the context safe and reliable. At the end of the paper, this method...
In this paper, the security of user domain including mobile terminal (MT) and user in heterogeneous wireless networks (HWN) are paid more attention. We introduce the trusted platform module (TPM) to ensure the terminal trustworthiness, while password, fingerprint and smartcard guarantee userpsilas identity. MT, user, and smartcard have been regarded as three separated entities, as well as the user...
The electronic mail plays an unavoidable role in the humankind communications. With the great interest for the connection via mobile platforms, and the growing number of vulnerabilities and attacks, it is essential to provide suitable security solutions regarding the limitations of resource restricted platforms. Although some solutions such as PGP and S/MIME are currently available for the secure...
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile environments. The traditional public key cryptography involves huge computational costs and is not so suitable for the resource-constrained platforms...
The problem of key management in ad hoc networks was analyzed in this paper. Key management, however, can reveal information about the dynamics of ad hoc network membership, such as the group size and the number of joining and leaving users. Thus, only legitimate members have access to the messages. Once any member in the ad hoc network was going to join or leave the group, the group key would be...
This paper proposes a novel secure binding management protocol for mobile IPv6 networks for use in the implementation of routing optimization. The idea uses the public key of the home network of a mobile node to cryptographically generate the mobile node's home address and the associated private key to sign the mobile node's authentication requests. In addition, the proposed protocol performs reachability...
Short message service (SMS) will play a very vital role in the future business areas whose are popularly known as m-commerce, mobile banking etc. For this future commerce, SMS could make a mobile device in a business tool as it has the availability and the effectiveness. The existing SMS is not free from the eavesdropping, but security is the main concern for any business company such as banks who...
With the popularity of wireless communication, the security of mobile networks becomes more and more important. However, due to the computation limitation, many existing authentication key agreement protocols are not suitable for wireless mobile networks. In 2005, Sui et al. proposed an efficient authentication key agreement protocol, but their protocol can not resist the off-line password guessing...
Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence...
Huge interest and demand on information superhighway have pressed various telecommunications research fronts and lead to a new form of future Internet consisting of wired and wireless segments where resource-constrained devices such as palm pilots and sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous...
Mobile ad-hoc networks (MANET) have found strategic importance in real world applications like environment management, remote explorations, disaster and warfare conditions due to their dynamic, self tailoring and adaptive nature. These networks can be quickly deployed in situations where no infrastructure exists. Effective use of these networks is largely dependent on secure and reliable behavior...
This paper studies key management, a fundamental problem in securing mobile ad hoc networks (MANETs). We present IKM, an ID-based key management scheme as a novel combination of ID-based and threshold cryptography. IKM is a certificateless solution in that public keys of mobile nodes are directly derivable from their known IDs plus some common information. It thus eliminates the need for certificate-based...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.