TITLE

Secure Mutual Authentication for Ad hoc Wireless Networks

AUTHOR(S)
Kim, Byung-Gi; Hong, Sang-Sun
PUB. DATE
July 2005
SOURCE
Journal of Supercomputing;Jul2005, Vol. 33 Issue 1/2, p123
SOURCE TYPE
Academic Journal
DOC. TYPE
Editorial
ABSTRACT
As wireless LANs and wireless terminals deployed, security and authentication, among other things, became important. We propose a mutual authentication scheme for access security among wireless terminals. We use user identification together with hardware identification in creating a certificate for the wireless access. And authentication is performed based on the certificate. It enables reliable user authentication, establishment and check of access rights (when a terminal is managed in connection with a network gateway), Peer-to-Peer access with authentication, and international roaming of terminals.
ACCESSION #
16903518

 

Related Articles

  • Big File, Slow Connection. Kissell, Joe // Macworld;Mar2006, Vol. 23 Issue 3, p78 

    The article presents information about several ways for sending a big computer file when the Internet connection is slow. The first step is to compress the file to ensure the size of the file. The next step is to find out the speed of the available Internet connection. If the cell phone supports...

  • Analysis of Ongoing SIP Session with Resource Reservation in Vertical Handover Scenario. Moon, Bongkyo // Wireless Personal Communications;Nov2013, Vol. 72 Issue 4, p2481 

    Typically, WiFi-to-3G handover is time-critical depending on mobility and speed of mobile host (MH) while 3G-to-WiFi handover is optional for better quality of service and less cost. In this paper, a WiFi-to-3G vertical handover scheme is proposed in order to reduce the total handover delay and...

  • A Game Changer for Wireless LANs. Hulme, George // CRN;6/16/2008 Channel Advisor, p14 

    The article offers information on the adoption of the 802.11n wireless LAN standard. It states that this new standard improves on earlier 802.11a/b/g standards with its new multiple-input, multiple-output (MIMO) technology. Moreover, 802.11n is said to be most appealing in environments that...

  • Securing your wireless LAN electronically and physically. Thompson, Scott D. // Cabling Installation & Maintenance;May2005, Vol. 13 Issue 5, p32 

    Provides information about securing wireless local area networks (WLANs) electronically and physically. Standard for wireless authentication, authorization, accounting and encryption with a Layer 2 extension for WLANs; Recommendation to have WLANs as a separate segment from the wired network;...

  • Wired or Wireless? You Make the Call. Policastro, Ellen Fussell // InTech;Feb2006, Vol. 53 Issue 2, p34 

    The article examines the pros and cons to wireless and hardwired Ethernet technology. Wired Ethernet has been available longer and people tend to be more comfortable with it. Furthermore, it has fewer variables for problems, thus considering it safer, more reliable and its greatest advantage at...

  • Speed boost for 802.11g wireless LANs.  // Electronics Weekly;4/21/2004, Issue 2143, p16 

    U.S. Robotics Corp. is offering a firmware upgrade and driver update for its 802.11g wireless LAN products which will lift bandwidth performance from 100Mbit/s up to 125Mbit/s. By June, 2004, the 125Mbit/s upgrade will ship with all the firm's 802.11g Wireless Turbo products.

  • ADAPTACIÓN DE UN EQUIPO DE BAJO COSTO PARA LA MEDICIÓN DEL USO DE WIFI UTILIZANDO LA METODOLOGÍA "DRIVE TEST". MÉNDEZ, GUEFRY LEIDER AGREDO; MUÑOZ, VIRGINIA SOLARTE; VÉLEZ, DIEGO SALCEDO // Gerencia Tecnologica Informatica;2011, Vol. 10 Issue 26, p51 

    The ISM band (Industrial, Scientific and Medical) is a band for free use, in that operate the systems WiFi IEEE 802.11b and IEEE 802.11g. For a long time, users did not paid attention to the need to adapt and correctly choose the channels that are used to establish networks and wireless links,...

  • A Robust and Efficient Cross-Layer Optimal Design in Wireless Sensor Networks. Li, Mingwei; Jing, Yuanwei; Li, Chengtie // Wireless Personal Communications;Nov2013, Vol. 72 Issue 4, p1889 

    When using wireless sensor networks (WSNs) for data transmission, some critical respects should be considered. These respects are limited computational power, storage capability and energy consumption. To save the energy in WSNs and prolong the network lifetime, we design for the signal control...

  • On the Performance of Cellular Two-Way Relay Systems with Analog Network Coding and Multiuser Diversity. Upadhyay, Prabhat; Yadav, Suneel // Wireless Personal Communications;Nov2013, Vol. 72 Issue 4, p2705 

    We consider a cellular two-way relaying system in which a multi-antenna base station (BS) communicates bidirectionally with one of several single-antenna mobile stations (MSs) via a single-antenna relay using analog network coding. We employ MS selection coupled with beamforming at the BS so as...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics