Improvement on an Optimized Protocol for Mobile Network Authentication and Security.
Chin-Chen ChangJung-San LeePublished in: CIS (2) (2005)
Keyphrases
- mobile networks
- authentication protocol
- security analysis
- key distribution
- key agreement protocol
- virtual private network
- mutual authentication
- ban logic
- key agreement
- key management
- ad hoc networks
- security protocols
- security requirements
- mobile users
- security properties
- security mechanisms
- security services
- smart card
- user authentication
- cryptographic protocols
- mobile nodes
- wireless networks
- trust negotiation
- provably secure
- mobile devices
- trusted third party
- public key cryptography
- base station
- ip networks
- secret key
- diffie hellman
- security issues
- information security
- mobile ip
- elliptic curve
- public key
- mobile ad hoc networks
- private key
- rfid tags
- key exchange protocol
- security policies
- intrusion detection
- cellular networks
- routing problem
- np hard
- network access
- multimedia content
- network security
- encryption scheme
- network management