1,125 research outputs found

    Security on Medical Wireless Sensor Networks

    Get PDF
    Wireless technology is fast becoming a very important tool for all aspects of communication. An area that lacks a strong implementation for wireless communication is the medical field. Wireless systems could be used by clinicians to be better able to diagnose and monitor patients. The reason behind the lack of adoption in healthcare is due to the need to meet the legislated and perceived requirements of security and privacy when dealing with clinical information. The current methods of wireless authentication are investigated and an existing issue in mobile networks is described and solved with two novel solutions; one solution within GSM and the other within UMTS. Strong authentication protocols are developed based on the existing wireless protocols, while using minimal messages and symmetric operations to limit resource utilization to meet the needs of the healthcare environment. To ensure the quality of the protocol a BAN (Burrows-Abadi-Needham logic) analysis is performed which verifies that the desired goals of the protocols are appropriately met within the results analysis. The developed security protocol is shown to be secure, uses minimal messages to maintain efficiency and meets the legal requirements to be used in medical wireless sensor networks

    Development of Secure Mobile Cloud Computing Using Improved Identity Management Protocol

    Get PDF
    The convergence of Internet and mobile computing enables personalized access to online services anywhere and anytime. Entities (e.g., users , services) have to authenticate themselves to service providers in order to use their services. An entity provides personally identifiable information that uniquely identifies it to an SP. Due to the rapid spread of smart phones and social network service, the use of Interne applications has increased and their need for bandwidth has begun to exceed the capacity of 3G networks. This has caused a re duction in speed and service quality. The increase in mobile network users has caused identity management probl ems for mobile service providers. Therefore, in this paper, proposed system is designed t o overcome this problem Improved Identity Management protocol is used to breaks up loads, which are allowed by the existing Identity Management 3G protocols mutual authentication via mobile operator process, by sending some parts to an Internet application service provider to enhance mobile and ID management at the service provider and by reducing the network and process loads from information handling and packet trans mission

    Analysis of UMTS (3G) Authentication and Key Agreement Protocol (AKA) for LTE (4G) Network

    Get PDF
    Technological and security enhancements in third generation (3G) architecture led to the development of the fourth generation (4G) technology. 4G is developed and standardized by the 3GPP which is a fully IP based topology and also referred to as the future communication technology. 3GPP provided LTE (Long Term Evolution) usually referred to as the standard for fourth generation telecommunications. This paper reviews the core architecture of the 4G network and also reviews the Authentication and key agreement (AKA) protocol as the access mechanism to a 4G network which shows the strong security aspects of the fourth generation technology. DOI: 10.17762/ijritcc2321-8169.16048

    Kerberos based authentication for inter-domain roaming in wireless heterogeneous network

    Get PDF
    AbstractAn increased demand in ubiquitous high speed wireless access has led integration of different wireless technologies provided by different administrative domains creating truly a heterogeneous network. Security is one of the major hurdles in such network environment. As a mobile station moves in and out of the coverage area of one wireless network to another, it needs to be authenticated. The existing protocols for authentication of a mobile station are typically centralized, where the home network participates in each authentication process. It requires home network to maintain roaming agreement with all other visiting networks. Moreover, the round trip time to home network results high latency. This paper is focused on developing authentication protocol for wireless network irrespective of the technologies or the administrative domain. We propose a secure protocol which adopts strong features of Kerberos based on tickets for rigorous mutual authentication and session key establishment along with issuance of token so that the mobile station can have access to not only the roaming partner of home network but also to the roaming partner of previous visited networks. The performance evaluation and comparative analysis of the proposed protocol is carried out with the already implemented standard protocols and most remarkable research works till date to confirm the solidity of the results presented

    On the security of an anonymous roaming protocol in UMTS mobile networks

    Get PDF
    In this communication, we first show that the privacy-preserving roaming protocol recently proposed for mobile networks cannot achieve the claimed security level. Then we suggest an improved protocol to remedy its security problems
    • …
    corecore