2nd International ICST Workshop on Personalized Networks

Research Article

Adaptive Security Architecture based on EC-MQV Algorithm in Personal Network (PN)

  • @INPROCEEDINGS{10.1109/MOBIQ.2007.4451052,
        author={ Albena  Mihovska and Neeli  R. Prasad},
        title={Adaptive Security Architecture based on EC-MQV Algorithm in Personal Network (PN)},
        proceedings={2nd International ICST Workshop on Personalized Networks},
        publisher={IEEE},
        proceedings_a={PERNETS},
        year={2008},
        month={2},
        keywords={Algorithm design and analysis  Computer architecture  Computer networks  Costs  Data privacy  Data security  Elliptic curve cryptography  Elliptic curves  Information security  Land mobile radio cellular systems},
        doi={10.1109/MOBIQ.2007.4451052}
    }
    
  • Albena Mihovska
    Neeli R. Prasad
    Year: 2008
    Adaptive Security Architecture based on EC-MQV Algorithm in Personal Network (PN)
    PERNETS
    IEEE
    DOI: 10.1109/MOBIQ.2007.4451052
Albena Mihovska1,*, Neeli R. Prasad1,*
  • 1: Center for TeleInFrastruktur (CTIF), Aalborg University, Denmark
*Contact email: albena@es.aau.dk, np@es.aau.d

Abstract

Personal networks (PNs) have been focused on in order to support the user's business and private activities without jeopardizing privacy and security of the users and their data. In such a network, it is necessary to produce a proper key agreement method according to the feature of the network. One of the features of the network is that the personal devices have deferent capabilities such as computational ability, memory size, transmission power, processing speed and implementation cost. Therefore an adaptive security mechanism should be contrived for such a network of various device combinations based on user's location and device's capability. The paper proposes new adaptive security architecture with three levels of asymmetric key agreement scheme by using context-aware security manager (CASM) based on elliptic curve cryptosystem (EC-MQV).