Match!

One-Pass Key Establishment Protocol for Wireless Roaming with User Anonymity.

Yuan Wang2
Estimated H-index: 2
,
Duncan S. Wong1
Estimated H-index: 1
,
Liusheng Huang26
Estimated H-index: 26
Abstract
  • References (0)
  • Citations (4)
📖 Papers frequently viewed together
2016ICIST: International Conference on Information Science and Technology
3 Citations
2002
3 Authors (박종애, ..., 장경훈)
78% of Scinapse members use related papers. After signing in, all features are FREE.
References0
Newest
Cited By4
Newest
The cloud-assisted Body Sensor Networks (BSN) often has an architecture of Multi-hop Wireless Networks (MWN) model, in which both the body sensors and the users must be secure to protect the whole infrastructure. Unfortunately, both the information providers and the users are movable and resource-constrained in communication and computation. Thus some new security problems are proposed, such as the light weight-secure authentication caused by limited resource, re-authentication in foreign zone c...
8 CitationsSource
#1Wei Wang (HUST: Huazhong University of Science and Technology)H-Index: 5
#2Peng Xu (HUST: Huazhong University of Science and Technology)H-Index: 6
Last. Laurence T. Yang (HUST: Huazhong University of Science and Technology)H-Index: 44
view all 3 authors...
Key distribution is important to provide security guarantee for mobile services of Internet of Things (IoT). Traditional key distribution methods hardly provide single data server the promise to build multiple high-level secure real-time service channels simultaneously with high efficiency. In this paper we consider real-time data collecting or monitoring scenarios, which is commonly happened in health-care. In these scenarios, traditional key distribution approaches in public-key setting have d...
2 CitationsSource
#1Manoj Ranjan Mishra (KIIT: KIIT University)H-Index: 1
#2Jayaprakash Kar (KAU: King Abdulaziz University)H-Index: 6
Last. Banshidhar Majhi (Techno India)H-Index: 18
view all 3 authors...
The article proposes one-pass authenticated key establishment protocol in random oracles for Wireless Sensor Networks. Security of the protocol relies on Computational Diffie-Hellman Problem on Bilinear Pairings. In one-pass key establishment protocol, the initiator computes a session key and a related message. The key token is to be sent to the intended receiver using receiver's public key and sender secret key. From the received key token the receiver compute the session key, which is the same...
4 CitationsSource
#1Jun Hua KuH-Index: 1
#2Zhi Hua Cai (China University of Geosciences)H-Index: 1
Last. Bing ZhengH-Index: 2
view all 4 authors...
The article proposed one-pass authenticated key establishment protocol from optimal eta pairings in random oracle for Wireless Sensor Networks. Security of the protocol relies on Computational Diffie-Hellman Problem on Optimal Eta Pairings. In one-pass key establishment protocol, the initiator computes a session key and a re1ated message. The key token is to be sent to the intended receiver using receiver's public key and sender secret key. From the received key token the receiver compute the se...
1 CitationsSource