An Authentication Model for Wireless Network Services
Authentication is an important component to protect information systems from unauthorised access of malicious sources. Because of resource limitations of mobile devices, it is a challenge to apply current authentication methods in wired networks for wireless networks. It lacks any considerations of...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1003 |
---|---|
container_issue | |
container_start_page | 996 |
container_title | |
container_volume | |
creator | Huy Hoang Ngo Xianping Wu Phu Dung Le Srinivasan, Bala |
description | Authentication is an important component to protect information systems from unauthorised access of malicious sources. Because of resource limitations of mobile devices, it is a challenge to apply current authentication methods in wired networks for wireless networks. It lacks any considerations of security, efficiency, scalability and flexibility in wireless networks. In this paper, an authentication model for individual and group users in wireless network is elaborated. It provides a flexible and scalable model to suit different problem requirements of wireless network services. A realisation of the authentication model using dynamic keys and group key management is proposed and analysed to demonstrate the security and efficiency in wireless networks. |
doi_str_mv | 10.1109/AINA.2010.40 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5474818</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5474818</ieee_id><sourcerecordid>5474818</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-197666aef4001b9061be471b961f6853f20ddd9f7a32da210c28d4b272e127223</originalsourceid><addsrcrecordid>eNpVjMtOwzAURM1LIpTu2LHxD6T4-hkvo4pCpVIWgGBXOfG1MIQE2QHE3xMJNmxmzuhIQ8gZsAUAsxf1elsvOJumZHtkbk0FkkuptdV8nxRcCF4qraqDf06pQ1KAUqyUUj0dk5OcXxgTWhpVEFX3tP4Yn7EfY-vGOPT0ZvDY0TAk-hgTdpgz3eL4NaRXeofpM7aYT8lRcF3G-V_PyMPq8n55XW5ur9bLelNGMGoswRqttcMgGYPGMg0NSjORhqArJQJn3nsbjBPcOw6s5ZWXDTccYQouZuT89zci4u49xTeXvndKGllBJX4Azn5IJw</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>An Authentication Model for Wireless Network Services</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Huy Hoang Ngo ; Xianping Wu ; Phu Dung Le ; Srinivasan, Bala</creator><creatorcontrib>Huy Hoang Ngo ; Xianping Wu ; Phu Dung Le ; Srinivasan, Bala</creatorcontrib><description>Authentication is an important component to protect information systems from unauthorised access of malicious sources. Because of resource limitations of mobile devices, it is a challenge to apply current authentication methods in wired networks for wireless networks. It lacks any considerations of security, efficiency, scalability and flexibility in wireless networks. In this paper, an authentication model for individual and group users in wireless network is elaborated. It provides a flexible and scalable model to suit different problem requirements of wireless network services. A realisation of the authentication model using dynamic keys and group key management is proposed and analysed to demonstrate the security and efficiency in wireless networks.</description><identifier>ISSN: 1550-445X</identifier><identifier>ISBN: 9781424466955</identifier><identifier>ISBN: 1424466954</identifier><identifier>EISSN: 2332-5658</identifier><identifier>EISBN: 9781424466962</identifier><identifier>EISBN: 1424466962</identifier><identifier>EISBN: 076954018X</identifier><identifier>EISBN: 9780769540184</identifier><identifier>DOI: 10.1109/AINA.2010.40</identifier><language>eng</language><publisher>IEEE</publisher><subject>Authentication ; Computer network management ; Cryptography ; Disaster management ; dynamic keys ; group authentication ; Information security ; Information systems ; Information technology ; Protection ; Scalability ; wireless network services ; Wireless networks</subject><ispartof>2010 24th IEEE International Conference on Advanced Information Networking and Applications, 2010, p.996-1003</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5474818$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5474818$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Huy Hoang Ngo</creatorcontrib><creatorcontrib>Xianping Wu</creatorcontrib><creatorcontrib>Phu Dung Le</creatorcontrib><creatorcontrib>Srinivasan, Bala</creatorcontrib><title>An Authentication Model for Wireless Network Services</title><title>2010 24th IEEE International Conference on Advanced Information Networking and Applications</title><addtitle>AINA</addtitle><description>Authentication is an important component to protect information systems from unauthorised access of malicious sources. Because of resource limitations of mobile devices, it is a challenge to apply current authentication methods in wired networks for wireless networks. It lacks any considerations of security, efficiency, scalability and flexibility in wireless networks. In this paper, an authentication model for individual and group users in wireless network is elaborated. It provides a flexible and scalable model to suit different problem requirements of wireless network services. A realisation of the authentication model using dynamic keys and group key management is proposed and analysed to demonstrate the security and efficiency in wireless networks.</description><subject>Authentication</subject><subject>Computer network management</subject><subject>Cryptography</subject><subject>Disaster management</subject><subject>dynamic keys</subject><subject>group authentication</subject><subject>Information security</subject><subject>Information systems</subject><subject>Information technology</subject><subject>Protection</subject><subject>Scalability</subject><subject>wireless network services</subject><subject>Wireless networks</subject><issn>1550-445X</issn><issn>2332-5658</issn><isbn>9781424466955</isbn><isbn>1424466954</isbn><isbn>9781424466962</isbn><isbn>1424466962</isbn><isbn>076954018X</isbn><isbn>9780769540184</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpVjMtOwzAURM1LIpTu2LHxD6T4-hkvo4pCpVIWgGBXOfG1MIQE2QHE3xMJNmxmzuhIQ8gZsAUAsxf1elsvOJumZHtkbk0FkkuptdV8nxRcCF4qraqDf06pQ1KAUqyUUj0dk5OcXxgTWhpVEFX3tP4Yn7EfY-vGOPT0ZvDY0TAk-hgTdpgz3eL4NaRXeofpM7aYT8lRcF3G-V_PyMPq8n55XW5ur9bLelNGMGoswRqttcMgGYPGMg0NSjORhqArJQJn3nsbjBPcOw6s5ZWXDTccYQouZuT89zci4u49xTeXvndKGllBJX4Azn5IJw</recordid><startdate>201004</startdate><enddate>201004</enddate><creator>Huy Hoang Ngo</creator><creator>Xianping Wu</creator><creator>Phu Dung Le</creator><creator>Srinivasan, Bala</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201004</creationdate><title>An Authentication Model for Wireless Network Services</title><author>Huy Hoang Ngo ; Xianping Wu ; Phu Dung Le ; Srinivasan, Bala</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-197666aef4001b9061be471b961f6853f20ddd9f7a32da210c28d4b272e127223</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Authentication</topic><topic>Computer network management</topic><topic>Cryptography</topic><topic>Disaster management</topic><topic>dynamic keys</topic><topic>group authentication</topic><topic>Information security</topic><topic>Information systems</topic><topic>Information technology</topic><topic>Protection</topic><topic>Scalability</topic><topic>wireless network services</topic><topic>Wireless networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Huy Hoang Ngo</creatorcontrib><creatorcontrib>Xianping Wu</creatorcontrib><creatorcontrib>Phu Dung Le</creatorcontrib><creatorcontrib>Srinivasan, Bala</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Huy Hoang Ngo</au><au>Xianping Wu</au><au>Phu Dung Le</au><au>Srinivasan, Bala</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>An Authentication Model for Wireless Network Services</atitle><btitle>2010 24th IEEE International Conference on Advanced Information Networking and Applications</btitle><stitle>AINA</stitle><date>2010-04</date><risdate>2010</risdate><spage>996</spage><epage>1003</epage><pages>996-1003</pages><issn>1550-445X</issn><eissn>2332-5658</eissn><isbn>9781424466955</isbn><isbn>1424466954</isbn><eisbn>9781424466962</eisbn><eisbn>1424466962</eisbn><eisbn>076954018X</eisbn><eisbn>9780769540184</eisbn><abstract>Authentication is an important component to protect information systems from unauthorised access of malicious sources. Because of resource limitations of mobile devices, it is a challenge to apply current authentication methods in wired networks for wireless networks. It lacks any considerations of security, efficiency, scalability and flexibility in wireless networks. In this paper, an authentication model for individual and group users in wireless network is elaborated. It provides a flexible and scalable model to suit different problem requirements of wireless network services. A realisation of the authentication model using dynamic keys and group key management is proposed and analysed to demonstrate the security and efficiency in wireless networks.</abstract><pub>IEEE</pub><doi>10.1109/AINA.2010.40</doi><tpages>8</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1550-445X |
ispartof | 2010 24th IEEE International Conference on Advanced Information Networking and Applications, 2010, p.996-1003 |
issn | 1550-445X 2332-5658 |
language | eng |
recordid | cdi_ieee_primary_5474818 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Authentication Computer network management Cryptography Disaster management dynamic keys group authentication Information security Information systems Information technology Protection Scalability wireless network services Wireless networks |
title | An Authentication Model for Wireless Network Services |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T06%3A59%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=An%20Authentication%20Model%20for%20Wireless%20Network%20Services&rft.btitle=2010%2024th%20IEEE%20International%20Conference%20on%20Advanced%20Information%20Networking%20and%20Applications&rft.au=Huy%20Hoang%20Ngo&rft.date=2010-04&rft.spage=996&rft.epage=1003&rft.pages=996-1003&rft.issn=1550-445X&rft.eissn=2332-5658&rft.isbn=9781424466955&rft.isbn_list=1424466954&rft_id=info:doi/10.1109/AINA.2010.40&rft_dat=%3Cieee_6IE%3E5474818%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781424466962&rft.eisbn_list=1424466962&rft.eisbn_list=076954018X&rft.eisbn_list=9780769540184&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5474818&rfr_iscdi=true |