Issues, requirements and support for location-intensive mobile commerce applications
International Journal of Mobile Communications
A framework for delivering secure mobile location information
International Journal of Mobile Communications
Mobile communications and mobile services
International Journal of Mobile Communications
Location management for wireless networks: issues and directions
International Journal of Mobile Communications
IDMP-based fast handoffs and paging in IP-based 4G mobile networks
IEEE Communications Magazine
Identity theft in the USA: evidence from 2002 to 2006
International Journal of Mobile Communications
Reliable data transmission in mobile ad hoc sensor networks
International Journal of Mobile Communications
A secure and efficient authentication scheme for mobile users
International Journal of Mobile Communications
RFID tags: privacy and security aspects
International Journal of Mobile Communications
Key issues for the design and development of mobile commerce services and applications
International Journal of Mobile Communications
A survey on wired and mobile multicast group membership management protocol
International Journal of Mobile Communications
An effective AKA protocol for UMTS
International Journal of Mobile Communications
Expenditures on consumer protection and business competition
International Journal of Mobile Communications
Hi-index | 0.00 |
Intra-Domain Mobility Management Protocol (IDMP) provides a mobility solution for mobile nodes (MNs) in next-generation wireless networks. It provides a solution for intra-domain mobility without assuming the existence or use of any global mobility management protocol. It is, therefore, necessary to set up security associations between the mobile node and the entities that provide connectivity and mobility in the IDMP environment. In this paper, we propose a security model for Authentication, Authorisation and Accounting (AAA) for IDMP. This AAA architecture provides authentication and encryption for MNs within the home domain as well as in the foreign domain. Simulation results verify the validity of the proposed security model.