Anonymous authentication scheme for wireless communications Online publication date: Mon, 04-Jun-2007
by Jung-San Lee, Chin-Chen Chang, Pen-Yi Chang, Chin-Chen Chang
International Journal of Mobile Communications (IJMC), Vol. 5, No. 5, 2007
Abstract: Since, wireless networks make mobile users free from tethers that bind them to fixed places, research topics referred to mobile communications recently become popular. The exposure of signal transmission, however, leads to serious security problems in wireless channels. Engineers must be concerned about illegal attacks such as delusive behaviour and eavesdropping when designing network systems. Furthermore, limitations of mobile devices are also crucial challenges to contrive systems. Hence we propose an efficient method for validating the legitimacy of mobile users. Specifically, our scheme preserves the property of anonymity so that the intruder cannot track the movement history of mobile subscribers.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Mobile Communications (IJMC):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com