کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
453873 695046 2008 11 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Efficient, anonymous, and authenticated conference key setup in cellular wireless networks
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر شبکه های کامپیوتری و ارتباطات
پیش نمایش صفحه اول مقاله
Efficient, anonymous, and authenticated conference key setup in cellular wireless networks
چکیده انگلیسی

Conference call is a key functionality that a wireless network should support. When a conference call is set up in a wireless network, conference attendees should be authenticated. In many applications, the attendees also need to be anonymous. In this paper, we propose a very efficient protocol for authenticated and anonymous conference key setup. Our protocol uses only symmetric-key encryptions/decryptions and hashing and is thus much faster than any existing protocol using public-key cryptography. In addition to the conference key setup protocol, we also present two protocols, for authenticated call setup and authenticated handoff, respectively. These two protocols are also much faster than existing protocols based on public-key cryptography. Consequently, a system using the three protocols presented in this paper will have both high security and high efficiency.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Computers & Electrical Engineering - Volume 34, Issue 5, September 2008, Pages 357–367
نویسندگان
,