Efficient Hierarchical Authentication Protocol for Multiserver Architecture
نویسندگان
چکیده
منابع مشابه
Efficient Message Authentication Protocol for WSN
This paper describes a solution for nodes and message authentication problems in wireless sensor networks, this solution allows effectively avoiding node-impersonation and messaging falsification among the WSN nodes. The resulting protocol address authentication at two level using identity based cryptography and message authentication codes with SHA-1, for node and message authentication respec...
متن کاملAn efficient authentication protocol for mobile communications
In this paper, a new Global System of Mobile Communications (GSM) authentication protocol is proposed to improve some drawbacks of the current GSM authentication protocol for roaming users including: (a) communication overhead between VLR; (b) huge bandwidth consumption between VLR and HLR; (c) storage space overhead in VLR; (d) overloaded in HLR with authentication of mobile stations; and (e) ...
متن کاملAn Efficient Authentication Protocol for Mobile Networks
Many existing authentication protocols supporting inter-domain authentication on the Internet require their clients to communicate with every involved key distribution center (KDC) directly. This is inefficient and costly when the client side is a wireless mobile unit, for wireless transmission has relatively lower bandwidth, and a mobile unit is battery powered. In this paper, we present a mob...
متن کاملHierarchical ECC-Based RFID Authentication Protocol
RFID (Radio Frequency Identification) technology enables readers to scan remote RFID tags, and label the objects and people to which they are attached. Current cryptographic authentication protocols deployed in heterogeneous environments are often not compatible, or reveal too much information to the RFID readers. To tackle this problem, we introduce the concept of RFID groups and propose a hie...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2020
ISSN: 1939-0114,1939-0122
DOI: 10.1155/2020/2523834