Anonymous authentication scheme for wireless communications
by Jung-San Lee, Chin-Chen Chang, Pen-Yi Chang, Chin-Chen Chang
International Journal of Mobile Communications (IJMC), Vol. 5, No. 5, 2007

Abstract: Since, wireless networks make mobile users free from tethers that bind them to fixed places, research topics referred to mobile communications recently become popular. The exposure of signal transmission, however, leads to serious security problems in wireless channels. Engineers must be concerned about illegal attacks such as delusive behaviour and eavesdropping when designing network systems. Furthermore, limitations of mobile devices are also crucial challenges to contrive systems. Hence we propose an efficient method for validating the legitimacy of mobile users. Specifically, our scheme preserves the property of anonymity so that the intruder cannot track the movement history of mobile subscribers.

Online publication date: Mon, 04-Jun-2007

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Mobile Communications (IJMC):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com