The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An Unattended Wireless Sensor Network (UWSN) is a type of sensor network where a trusted sink visits each node periodically to collect the data. Due to the offline nature of this network, every node has to secure its data until the next visit of the sink which makes the network susceptible of attacks focusing on the data collected. In this work, we focus on the data authentication in the presence...
Communication in Mobile Ad-Hoc Network (MANET) is based on mutual trust between the participating nodes. Due to features of open medium, dynamic changing topology, lack of centralized monitoring and management, MANETs are vulnerable to various security attacks. Hence, finding a secure and trustworthy end-to-end path in MANET is a real challenge. The paper presents a solution for trustworthy path discovery...
In recent years, as RFID reader equipments have been widely deployed in handled devices, the security problems between mobile reader and RFID server are important obviously. In this paper, under the assumption of that the communication channel between RFID server and RFID reader is not secure, we propose a novel scheme conforming EPC C1G2 standards which is with low implementation cost. Benefit from...
Privacy and security are two important issues in vehicular networks. Users wish to maintain location privacy and anonymity, meaning the identity, location/direction of move of their vehicles remains unknown to everybody with possible exception law enforcement authorities responsible by law to know and maintain such private information. In this paper, we propose a Pre-broadcast based Time Efficient...
Message authentication, to ensure the receiving message is true and coming from the claimed source, is a key issue in vehicular ad hoc network (VANET) because the message may be life-critical, traffic information, or emergence message transmitted by the strange sources. Due to the nature of realtime and high mobility in VANET message, the traditional PKI security schemes are not suitable for VANET...
Mesh technology has captured the interest of university research and industry, because of its capacity to meet at the same time the requirements of suppliers of wireless access to Internet and of users. But, the architecture and the configuration of this type of network do not ensure a protection against the unauthorized use of the network since the basic security measures used do not include the...
Nowadays, short message service (SMS) is faced with various security threats. Thus, the fields of high confidentiality(e.g., mobile E-commerce) require a higher level of security protection on SMS. Secure communication in incredible mobile network has very important significance. This paper presents a high security communication protocol for SMS. Through authentication, decryption and integrity protection,...
IEEE 802.16 specifications for the mesh mode require the handing over Mesh Client (MC) to process the network entry procedure and to authenticate with the mesh Base Station (BS) in order to issue its request and to be scheduled for data transmission. Besides, the mesh BS does not reserve resources for serving the active connections belonging to the handing over nodes. In this paper, we aim at optimizing...
To provide secure communication for universal mobile telecommunications system (UMTS) Mobile Networks, authentication and key agreement (AKA) is carried out between the user and the home environment, and the authentication protocol is an important primitive for entity authentication and session keys. The current authentication protocol is giving a reasonable security level. However it is overloading...
In this paper we propose two new attacks on UMTS network. Both attacks exploit the UMTS-GSM interworking and are possible in the GSM access area of UMTS network. The first attack allows the attacker to eavesdrop on the entire traffic of the victim UMTS subscriber in the GERAN coverage of the UMTS network. The second attack is an impersonation attack i.e. the attacker impersonates a genuine UMTS subscriber...
Across the globe mobile devices are a facet of everyday life. The technology that is encapsulated within these units is accelerating at a phenomenal rate. The addition of a wide range of network connectivity, from InfraRed (IR) to Wireless Local Area Network (WLAN) and more predominantly Bluetooth, has increased the scope of the applications that can be developed and utilised within this market. The...
This paper describes a method of implementing two factor authentication using mobile phones. The proposed method guarantees that authenticating to services, such as online banking or ATM machines, is done in a very secure manner. The proposed system involves using a mobile phone as a software token for one time password generation. The generated one time password is valid for only a short user-defined...
With the great development of computer network and communication technology, smart cards have been used more and more popular. How to ensure its secure application and protect its sensitive information becomes the most important problem. Based on elliptic curve cryptosystem, we proposed a new authentication protocol that is built upon two channel model, where mobile telephone and authentication server...
In this paper, it first analyzes the present security protocol for mobile communications. Furthermore, a security framework for the Mobile E-Service is proposed. In the mean time, using the inherent security and expansibility of J2ME, we design a security message flow model to support communication protocol for the Mobile E-Service Oriented Architecture (MSOA), which emphasizes the authentication...
Recently, Wu et al. discussed some security flaws of enhanced authentication scheme with anonymity for wireless environments proposed by Lee et al. and showed how to overcome the problems regarding anonymity and backward secrecy. However, in the paper, we will show that Wu et al.'s improved scheme still did not provide user anonymity as they claimed.
With the development of communication network technology, many studies are being conducted on content protection techniques in the mobile digital contents area as well. In this paper, a mobile DRM system is presented for protection of digital contents based on a three-step authentication process. In this approach, we constructed a secure digital contents distribution system through a three-step user...
Efficient broadcast authentication has seen a lot of work in the recent past. Most broadcast authentication protocols rely on an underlying Public Key Infrastructure (PKI) to provide a point of trust from which credentials for more efficient cryptographic mechanisms for broadcast authentication can be derived. Thus, there is a logical dependence of some cryptographic credentials (e.g., verifiers for...
The limitation of each wireless technologies in terms of coverage, bandwidth or delay, has enforced the concept of integrated heterogeneous high speed wireless access. However, with the integration of different technologies provided by different operators, maintaining security remains a challenging proposition. When a mobile device moves in and out of the coverage of one wireless network to another...
In this paper, the security of user domain including mobile terminal (MT) and user in heterogeneous wireless networks (HWN) are paid more attention. We introduce the trusted platform module (TPM) to ensure the terminal trustworthiness, while password, fingerprint and smartcard guarantee userpsilas identity. MT, user, and smartcard have been regarded as three separated entities, as well as the user...
A few of existing multi-path routing protocols also address security issues. In this paper, a concept of plausible-route set is presented. Based on this notion, a definition of security for multiple node-disjoint paths secure source routing protocol is proposed and developed.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.