9,100 Hits in 4.3 sec


Abdurahem El Atman Igrair
2017 International Journal of Advanced Research in Computer Science  
Additionally, the efficiency of such networks is mainly depends on use of authentication protocols in mobile ip .  ...  For roaming services in mobile networks, Priauth authentication protocol schema recent designed which is showing the efficient performance in terms of time and overhead parameters.  ...  The intent is that, in this paper we are presenting the novel method for wireless networks privacy preserving, authentication and secure communication.  ... 
doi:10.26483/ijarcs.v8i7.4264 fatcat:5q53z3lyurbfpcxf7ef73uw7mm


Ashwini A. Lokhande .
2015 International Journal of Research in Engineering and Technology  
Privacy-preserving authentication mechanism for Roaming services is presented in this paper.  ...  The Progression in various wireless network, such as roaming network which enables mobile subscriber to enjoy internet service anytime anywhere.  ...  INTRODUCTION With the Progression in various mobile and wireless networks, including universal mobile telecommunication systems, wireless local area networks, roadside-to-vehicle communication systems  ... 
doi:10.15623/ijret.2015.0401049 fatcat:g37b3dwa3rcoham7vir33e3phu

Rethinking Authentication on Smart Mobile Devices

Ding Wang, Jian Shen, Joseph K. Liu, Kim-Kwang Raymond Choo
2018 Wireless Communications and Mobile Computing  
The launch of this special issue was in 4 Wireless Communications and Mobile Computing part supported by the National Key Research and Development Plan under Grants Nos. 2016YFB0800600, and by the National  ...  It is our hope that this special issue will advance the understanding and research of User Authentication on Smart Mobile Devices. We hope you enjoy the papers. Ding Wang Jian Shen Joseph K.  ...  Xie et al. gives an efficient message authentication in a Vehicular cloud network (VCN) setting. The scheme is shown to be secure and achieves conditional privacy-preserving.  ... 
doi:10.1155/2018/7079037 fatcat:v52bgxp5enbqddcqy557hilstm

Lightweight Cryptographic Techniques for Automotive Cybersecurity

Ahmer Khan Jadoon, Licheng Wang, Tong Li, Muhammad Azam Zia
2018 Wireless Communications and Mobile Computing  
This article presents a survey about developments in vehicular networks from the perspective of lightweight cryptographic protocols and privacy preserving algorithms.  ...  Consequently, security requirements related to vehicular networks are more complex as compared to mobile networks and conventional wireless networks.  ...  Efficient Conditional Privacy Preservation (ECPP) protocol is proposed by Liu et al. [61] .  ... 
doi:10.1155/2018/1640167 fatcat:nitjuwgn2jffjjdcif5fez7t4u

EPPAA- Enhanced Privacy Preserving - Anonymity Authentication Model with QPSO for Wireless Mobile Networks

Senthil Thillaigovindan, Prabakaran Subramaniyan
2019 International Journal of Intelligent Engineering and Systems  
In Wireless Mobile Networks (WMN), the proliferation of mobile devices and smart phones stimulates an array of personalized information services that exploits the user's personal data for processing.  ...  Kerberos based Authentication for Inter-domain Roaming (KAIR), Privacy Preserving Nearest Neighbor Queries(PPNNQ) and Efficient Mobile Authentication Scheme (EMAS).  ...  Proposed model In the proposed Enhanced Privacy Preserving-Anonymity Authentication (EPPAA) model, the mobile services are provided to the user by the network operators that are autonomous from the location  ... 
doi:10.22266/ijies2019.0430.14 fatcat:l2ivmf4ljvb3xoxg6urngfgqj4

Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes [article]

Mohamed Amine Ferrag, Leandros Maglaras, Antonios Argyriou, Dimitrios Kosmanos, Helge Janicke
2017 arXiv   pre-print
In addition, we provide a taxonomy and comparison of authentication and privacy-preserving schemes for 4G and 5G cellular networks in form of tables.  ...  This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks.  ...  In this article we survey authentication and privacy preserving protocols for 4G/5G networks.  ... 
arXiv:1708.04027v1 fatcat:lozrjocwq5eblkams72kk4rv6i

Conditional privacy-preserving authentication with access likability for roaming service over internet of things

P S Uma Priyadarsini, P Sriramya
2018 International Journal of Engineering & Technology  
In order to provide universal roaming service which is secure and privacy preserving at the multilevel, this paper proposes a privacy-preserving validation which is conditional with access likability called  ...  Comprehensive analysis of CPAL demonstrates that it can withstand many security threats and more adjustable in privacy preservation as compared to the other techniques.  ...  A trust and privacy preserving handover authentication protocol for wireless networks is presented in this paper.  ... 
doi:10.14419/ijet.v7i1.9.9731 fatcat:evwffv6jdvdrzknq46dhybpgym

Security and Privacy in Emerging Wireless Networks

Qing Yang, Rongxing Lu, Yacine Challal, Maryline Laurent
2017 Security and Communication Networks  
Acknowledgments We would also like to thank all the reviewers who have participated in the review process of the articles submitted to this special issue.  ...  The paper titled "Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities" studies how to achieve secure and privacy-preserving data sharing in  ...  The paper titled "An Efficient Context-Aware Privacy Preserving Approach for Smartphones" makes attempt to achieve a context-aware privacy preserving for smartphone.  ... 
doi:10.1155/2017/5618742 fatcat:klu7wh6qwjda5oplbdz3qandjy

Review on Secure Routing in Wireless Adhoc Networks

Ugendhar Addagatla, Dr. V. Janaki
2016 International Journal Of Engineering And Computer Science  
This paper, outlines the methods developed towards secure routing for robust and reliable routing in wireless adhoc network.  ...  To achieve the objective of optimal routing based on node characteristic and network property, various methods were developed in past.  ...  In [24] a lightweight protocol for securing route establishment, data transmission, and preserving users privacy in hybrid ad hoc wireless network is presented.  ... 
doi:10.18535/ijecs/v5i5.05 fatcat:mtluv5fatbf37pl7w4gw3bk6ju

IEEE Access Special Section Editorial: Internet-of-Things Big Data Trust Management

Yulei Wu, Zheng Yan, Kim-Kwang Raymond Choo, Laurence T. Yang
2019 IEEE Access  
The authors of ''An efficient and certificateless conditional privacy-preserving authentication scheme for wireless body area networks big data services,'' by Ji, et al., proposed a certificateless conditional  ...  privacy-preserving authentication scheme, based on elliptic curve cryptography.  ... 
doi:10.1109/access.2019.2915489 fatcat:duhaq23h2rbejboby3hhxvnzse

A comprehensive review on the users' identity privacy for 5G networks

Mamoon M. Saeed, Mohammad Kamrul Hasan, Ahmed J. Obaid, Rashid A. Saeed, Rania A. Mokhtar, Elmustafa Sayed Ali, Md Akhtaruzzaman, Sanaz Amanlou, A. K. M. Zakir Hossain
2022 IET Communications  
The key concern to many scholars in the field of mobile networking is user privacy, which is long-term subscription identifier as International Mobiles Subscribers Identifiers (IMSIs) and short-term subscription  ...  This article discusses the various privacy issues in the 5G network that use IMSI in clear text or temporary identities such as TMSI & C-RNTI with IMSI to disclose user identity privacy.  ...  [97] introduced a new efficient energy location privacy preservation (EELPP) mechanism in vehicular network. Three novel techniques are based on ELPP.  ... 
doi:10.1049/cmu2.12327 fatcat:p2mr37l7azelrcyiyyuf6r25ay

A Novel Privacy Preservation Schemes in Wireless Network

Mayur R. Tawalare, Sonali Nimbhorkar
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
Wireless sensor network is used widely and it is a key technique in the application of military which are used in daily life.  ...  As the time two tier wireless sensor network have some advantages related to the security that is the major concern in the two tier architecture.  ...  The existing privacy preservation techniques in wireless sensor network mainly focuses on location privacy, data privacy and network privacy.  ... 
doi:10.23956/ijarcsse/v7i4/0112 fatcat:guz45kwrhnf57lxelo7woce2gi

Advances of Security and Privacy Techniques in Emerging Wireless Networks

Xiaodong Lin, Mohsen Guizani, Xiaojiang Du, Cheng-Kang Chu, Yong Yu
2020 IEEE wireless communications  
In "Trust2Privacy: A Novel Fuzzy Trust-to-Privacy Mechanism for Mobile Social Networks", the authors propose a mechanism of the transformation from trust to privacy for the privacy preservation of users  ...  To tackle the security and privacy challenges in wireless networks, we organized this Special Issue focusing on security and privacy in emerging wireless networks.  ... 
doi:10.1109/mwc.2020.9116080 fatcat:l5rnfitu2vaynfmqheggvqlepe

An Anonymous Authentication and Communication Protocol for Wireless Mesh Networks [article]

Jaydip Sen
2011 arXiv   pre-print
The security protocol ensures secure authentication and encryption in access and the backbone networks.  ...  In this paper, we propose a security and privacy protocol that provides security and user anonymity while maintaining communication efficiency in a WMN.  ...  The proposed security protocol ensures security in both the access and the backbone networks, whereas the privacy protocol enables anonymous authentication of the users.  ... 
arXiv:1107.5538v1 fatcat:vjv5nv6najbbvk7nyxnz64bg3u

A survey on Privacy Preserving Data Aggregation Schemes in People Centric Sensing Systems and Wireless Domains

K. R. Jansi, S. V. Kasmir Raja
2016 Indian Journal of Science and Technology  
The technological advances in mobile and wireless communication have paved way for a new era of large scale sensing network.  ...  This paper focuses on a study about the various privacy preserving aggregation schemes existing in other domains of the wireless network including people centric sensing.  ...  Wireless Sensor Networks PDA 9 In wireless sensor network, preserving privacy during data aggregation is a challenging issue.  ... 
doi:10.17485/ijst/2016/v9i37/102072 fatcat:6qqalqugurhvfje5dusf45fctm
« Previous Showing results 1 — 15 out of 9,100 results