Abstract | ||
---|---|---|
Since, wireless networks make mobile users free from tethers that bind them to fixed places, research topics referred to mobile communications recently become popular. The exposure of signal transmission, however, leads to serious security problems in wireless channels. Engineers must be concerned about illegal attacks such as delusive behaviour and eavesdropping when designing network systems. Furthermore, limitations of mobile devices are also crucial challenges to contrive systems. Hence we propose an efficient method for validating the legitimacy of mobile users. Specifically, our scheme preserves the property of anonymity so that the intruder cannot track the movement history of mobile subscribers. |
Year | DOI | Venue |
---|---|---|
2007 | 10.1504/IJMC.2007.013941 | IJMC |
Keywords | Field | DocType |
mobile communication,mobile user,wireless communication,anonymous authentication scheme,fixed place,wireless network,delusive behaviour,wireless channel,mobile device,efficient method,crucial challenge,mobile subscriber,anonymity,mobility,security,wireless networks,mobile communications,wireless communications | Mobile computing,Wireless network,Eavesdropping,Authentication,Wireless,Computer science,Computer security,Computer network,Mobile device,Anonymity,Mobile telephony | Journal |
Volume | Issue | Citations |
5 | 5 | 4 |
PageRank | References | Authors |
0.49 | 21 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Jung-San Lee | 1 | 353 | 30.52 |
Chin Chen Chang | 2 | 7849 | 725.95 |
Chin Chen Chang | 3 | 7849 | 725.95 |
Pen-Yi Chang | 4 | 4 | 0.49 |