Identity-based key management in mobile ad hoc networks: techniques and applications
FREE-DOWNLOAD E Da Silva, A Dos Santos… – Wireless …, 2008 – . Poor physical security is another issue. Mobile nodes are not limited to a room. . The identity-based authentication and key exchange (IDAKE) scheme [10] consists of two techniques: a basic MANET-IDAKE and a fully self-organized MANET-IDAKE.
Proximity-based authentication of mobile devices
FREE-DOWNLOAD A Scannell, A Varshavsky, A LaMarca… – International Journal of …, 2009 . The key advantages of our technique are that it does not require any additional hardware . on the devices beyond the radios that are already used for communication, it does . Keywords: proximity-based authentication; security; secure pairing; radio authentication; mobile devices.
An overall cost-effective authentication technique for the global mobility network
FREE-DOWNLOAD CK Yeh… – International Journal of Network Security, 2009 Designing an efficient and secure authentication technique to detect fraudulent behavior is a very important subject in mobile network systems. However, treating each trans- action as a suspect seems to contradict the fact that most communication behaviors are honest.