ACM Transactions on Computer Systems (TOCS)
IP-based protocols for mobile internetworking
SIGCOMM '91 Proceedings of the conference on Communications architecture & protocols
MACAW: a media access protocol for wireless LAN's
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
Cryptographic security Techniques for wireless networks
ACM SIGOPS Operating Systems Review
Security and fraud detection in mobile and wireless networks
Handbook of wireless networks and mobile computing
Authentication of Mobile Users in Third Generation Mobile Systems
Wireless Personal Communications: An International Journal
On Security Study of Two Distance Vector Routing Protocols or Mobile Ad Hoc Networks
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Security design for a new local area network AULWLAN
CompSysTech '03 Proceedings of the 4th international conference conference on Computer systems and technologies: e-Learning
Security in wireless mobile and sensor networks
Wireless communications systems and networks
Hi-index | 0.00 |
Mobile computing is a major area of current research. A variety of wirelessly networked mobile devices now make it possible for a physically untethered computer to function in a fully networked manner. Recent research has focussed on providing the mobile user a seamless environment of wired and wireless networks. One of the major hurdles in providing such a seamless environment is that wireless media are inherently less secure.In this paper, we propose a security scheme for wireless media which permits secure communication over a single wireless channel. Our scheme allows both communicating parties to authenticate each other and establish a shared key for secure communication. An unauthorized snooper cannot even discover the identity of the communicating parties. Mobile computers are thus provided a highly secure wireless environment. We describe an efficient practical implementation of the scheme and prove its correctness.