An Authentication Model for Wireless Network Services

Authentication is an important component to protect information systems from unauthorised access of malicious sources. Because of resource limitations of mobile devices, it is a challenge to apply current authentication methods in wired networks for wireless networks. It lacks any considerations of...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Srinivasan, Bala
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1003
container_issue
container_start_page 996
container_title
container_volume
creator Huy Hoang Ngo
Xianping Wu
Phu Dung Le
Srinivasan, Bala
description Authentication is an important component to protect information systems from unauthorised access of malicious sources. Because of resource limitations of mobile devices, it is a challenge to apply current authentication methods in wired networks for wireless networks. It lacks any considerations of security, efficiency, scalability and flexibility in wireless networks. In this paper, an authentication model for individual and group users in wireless network is elaborated. It provides a flexible and scalable model to suit different problem requirements of wireless network services. A realisation of the authentication model using dynamic keys and group key management is proposed and analysed to demonstrate the security and efficiency in wireless networks.
doi_str_mv 10.1109/AINA.2010.40
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5474818</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5474818</ieee_id><sourcerecordid>5474818</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-197666aef4001b9061be471b961f6853f20ddd9f7a32da210c28d4b272e127223</originalsourceid><addsrcrecordid>eNpVjMtOwzAURM1LIpTu2LHxD6T4-hkvo4pCpVIWgGBXOfG1MIQE2QHE3xMJNmxmzuhIQ8gZsAUAsxf1elsvOJumZHtkbk0FkkuptdV8nxRcCF4qraqDf06pQ1KAUqyUUj0dk5OcXxgTWhpVEFX3tP4Yn7EfY-vGOPT0ZvDY0TAk-hgTdpgz3eL4NaRXeofpM7aYT8lRcF3G-V_PyMPq8n55XW5ur9bLelNGMGoswRqttcMgGYPGMg0NSjORhqArJQJn3nsbjBPcOw6s5ZWXDTccYQouZuT89zci4u49xTeXvndKGllBJX4Azn5IJw</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>An Authentication Model for Wireless Network Services</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Huy Hoang Ngo ; Xianping Wu ; Phu Dung Le ; Srinivasan, Bala</creator><creatorcontrib>Huy Hoang Ngo ; Xianping Wu ; Phu Dung Le ; Srinivasan, Bala</creatorcontrib><description>Authentication is an important component to protect information systems from unauthorised access of malicious sources. Because of resource limitations of mobile devices, it is a challenge to apply current authentication methods in wired networks for wireless networks. It lacks any considerations of security, efficiency, scalability and flexibility in wireless networks. In this paper, an authentication model for individual and group users in wireless network is elaborated. It provides a flexible and scalable model to suit different problem requirements of wireless network services. A realisation of the authentication model using dynamic keys and group key management is proposed and analysed to demonstrate the security and efficiency in wireless networks.</description><identifier>ISSN: 1550-445X</identifier><identifier>ISBN: 9781424466955</identifier><identifier>ISBN: 1424466954</identifier><identifier>EISSN: 2332-5658</identifier><identifier>EISBN: 9781424466962</identifier><identifier>EISBN: 1424466962</identifier><identifier>EISBN: 076954018X</identifier><identifier>EISBN: 9780769540184</identifier><identifier>DOI: 10.1109/AINA.2010.40</identifier><language>eng</language><publisher>IEEE</publisher><subject>Authentication ; Computer network management ; Cryptography ; Disaster management ; dynamic keys ; group authentication ; Information security ; Information systems ; Information technology ; Protection ; Scalability ; wireless network services ; Wireless networks</subject><ispartof>2010 24th IEEE International Conference on Advanced Information Networking and Applications, 2010, p.996-1003</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5474818$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5474818$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Huy Hoang Ngo</creatorcontrib><creatorcontrib>Xianping Wu</creatorcontrib><creatorcontrib>Phu Dung Le</creatorcontrib><creatorcontrib>Srinivasan, Bala</creatorcontrib><title>An Authentication Model for Wireless Network Services</title><title>2010 24th IEEE International Conference on Advanced Information Networking and Applications</title><addtitle>AINA</addtitle><description>Authentication is an important component to protect information systems from unauthorised access of malicious sources. Because of resource limitations of mobile devices, it is a challenge to apply current authentication methods in wired networks for wireless networks. It lacks any considerations of security, efficiency, scalability and flexibility in wireless networks. In this paper, an authentication model for individual and group users in wireless network is elaborated. It provides a flexible and scalable model to suit different problem requirements of wireless network services. A realisation of the authentication model using dynamic keys and group key management is proposed and analysed to demonstrate the security and efficiency in wireless networks.</description><subject>Authentication</subject><subject>Computer network management</subject><subject>Cryptography</subject><subject>Disaster management</subject><subject>dynamic keys</subject><subject>group authentication</subject><subject>Information security</subject><subject>Information systems</subject><subject>Information technology</subject><subject>Protection</subject><subject>Scalability</subject><subject>wireless network services</subject><subject>Wireless networks</subject><issn>1550-445X</issn><issn>2332-5658</issn><isbn>9781424466955</isbn><isbn>1424466954</isbn><isbn>9781424466962</isbn><isbn>1424466962</isbn><isbn>076954018X</isbn><isbn>9780769540184</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpVjMtOwzAURM1LIpTu2LHxD6T4-hkvo4pCpVIWgGBXOfG1MIQE2QHE3xMJNmxmzuhIQ8gZsAUAsxf1elsvOJumZHtkbk0FkkuptdV8nxRcCF4qraqDf06pQ1KAUqyUUj0dk5OcXxgTWhpVEFX3tP4Yn7EfY-vGOPT0ZvDY0TAk-hgTdpgz3eL4NaRXeofpM7aYT8lRcF3G-V_PyMPq8n55XW5ur9bLelNGMGoswRqttcMgGYPGMg0NSjORhqArJQJn3nsbjBPcOw6s5ZWXDTccYQouZuT89zci4u49xTeXvndKGllBJX4Azn5IJw</recordid><startdate>201004</startdate><enddate>201004</enddate><creator>Huy Hoang Ngo</creator><creator>Xianping Wu</creator><creator>Phu Dung Le</creator><creator>Srinivasan, Bala</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201004</creationdate><title>An Authentication Model for Wireless Network Services</title><author>Huy Hoang Ngo ; Xianping Wu ; Phu Dung Le ; Srinivasan, Bala</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-197666aef4001b9061be471b961f6853f20ddd9f7a32da210c28d4b272e127223</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Authentication</topic><topic>Computer network management</topic><topic>Cryptography</topic><topic>Disaster management</topic><topic>dynamic keys</topic><topic>group authentication</topic><topic>Information security</topic><topic>Information systems</topic><topic>Information technology</topic><topic>Protection</topic><topic>Scalability</topic><topic>wireless network services</topic><topic>Wireless networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Huy Hoang Ngo</creatorcontrib><creatorcontrib>Xianping Wu</creatorcontrib><creatorcontrib>Phu Dung Le</creatorcontrib><creatorcontrib>Srinivasan, Bala</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Huy Hoang Ngo</au><au>Xianping Wu</au><au>Phu Dung Le</au><au>Srinivasan, Bala</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>An Authentication Model for Wireless Network Services</atitle><btitle>2010 24th IEEE International Conference on Advanced Information Networking and Applications</btitle><stitle>AINA</stitle><date>2010-04</date><risdate>2010</risdate><spage>996</spage><epage>1003</epage><pages>996-1003</pages><issn>1550-445X</issn><eissn>2332-5658</eissn><isbn>9781424466955</isbn><isbn>1424466954</isbn><eisbn>9781424466962</eisbn><eisbn>1424466962</eisbn><eisbn>076954018X</eisbn><eisbn>9780769540184</eisbn><abstract>Authentication is an important component to protect information systems from unauthorised access of malicious sources. Because of resource limitations of mobile devices, it is a challenge to apply current authentication methods in wired networks for wireless networks. It lacks any considerations of security, efficiency, scalability and flexibility in wireless networks. In this paper, an authentication model for individual and group users in wireless network is elaborated. It provides a flexible and scalable model to suit different problem requirements of wireless network services. A realisation of the authentication model using dynamic keys and group key management is proposed and analysed to demonstrate the security and efficiency in wireless networks.</abstract><pub>IEEE</pub><doi>10.1109/AINA.2010.40</doi><tpages>8</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1550-445X
ispartof 2010 24th IEEE International Conference on Advanced Information Networking and Applications, 2010, p.996-1003
issn 1550-445X
2332-5658
language eng
recordid cdi_ieee_primary_5474818
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Authentication
Computer network management
Cryptography
Disaster management
dynamic keys
group authentication
Information security
Information systems
Information technology
Protection
Scalability
wireless network services
Wireless networks
title An Authentication Model for Wireless Network Services
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T06%3A59%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=An%20Authentication%20Model%20for%20Wireless%20Network%20Services&rft.btitle=2010%2024th%20IEEE%20International%20Conference%20on%20Advanced%20Information%20Networking%20and%20Applications&rft.au=Huy%20Hoang%20Ngo&rft.date=2010-04&rft.spage=996&rft.epage=1003&rft.pages=996-1003&rft.issn=1550-445X&rft.eissn=2332-5658&rft.isbn=9781424466955&rft.isbn_list=1424466954&rft_id=info:doi/10.1109/AINA.2010.40&rft_dat=%3Cieee_6IE%3E5474818%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781424466962&rft.eisbn_list=1424466962&rft.eisbn_list=076954018X&rft.eisbn_list=9780769540184&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5474818&rfr_iscdi=true