Enhanced wireless roaming security using three-party authentication and tunnels.
Damien LeroyMark ManulisOlivier BonaventurePublished in: U-NET@CoNEXT (2009)
Keyphrases
- wireless local area network
- security mechanisms
- security requirements
- identity authentication
- wireless networks
- authentication protocol
- mobile users
- user authentication
- fuzzy vault
- trust relationships
- authentication mechanism
- network access
- security analysis
- data encryption
- access control
- integrity verification
- authentication systems
- authentication scheme
- security issues
- encryption decryption
- security services
- biometric data
- public key infrastructure
- wireless communication
- identity management
- biometric template
- access points
- smart card
- factor authentication
- virtual private network
- information security
- security systems
- trusted third party
- security policies
- internet access
- security protocols
- elliptic curve cryptography
- cloud computing
- key distribution
- secure communication
- electronic payment
- cellular networks
- security level
- network security
- resource constrained
- key management
- trust negotiation
- wireless technologies
- wifi
- mobile networks
- key agreement protocol
- physical layer
- biometric authentication
- mobile devices