About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
2nd International ICST Workshop on Personalized Networks

Research Article

Adaptive Security Architecture based on EC-MQV Algorithm in Personal Network (PN)

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/MOBIQ.2007.4451052,
        author={ Albena  Mihovska and Neeli  R. Prasad},
        title={Adaptive Security Architecture based on EC-MQV Algorithm in Personal Network (PN)},
        proceedings={2nd International ICST Workshop on Personalized Networks},
        publisher={IEEE},
        proceedings_a={PERNETS},
        year={2008},
        month={2},
        keywords={Algorithm design and analysis  Computer architecture  Computer networks  Costs  Data privacy  Data security  Elliptic curve cryptography  Elliptic curves  Information security  Land mobile radio cellular systems},
        doi={10.1109/MOBIQ.2007.4451052}
    }
    
  • Albena Mihovska
    Neeli R. Prasad
    Year: 2008
    Adaptive Security Architecture based on EC-MQV Algorithm in Personal Network (PN)
    PERNETS
    IEEE
    DOI: 10.1109/MOBIQ.2007.4451052
Albena Mihovska1,*, Neeli R. Prasad1,*
  • 1: Center for TeleInFrastruktur (CTIF), Aalborg University, Denmark
*Contact email: albena@es.aau.dk, np@es.aau.d

Abstract

Personal networks (PNs) have been focused on in order to support the user's business and private activities without jeopardizing privacy and security of the users and their data. In such a network, it is necessary to produce a proper key agreement method according to the feature of the network. One of the features of the network is that the personal devices have deferent capabilities such as computational ability, memory size, transmission power, processing speed and implementation cost. Therefore an adaptive security mechanism should be contrived for such a network of various device combinations based on user's location and device's capability. The paper proposes new adaptive security architecture with three levels of asymmetric key agreement scheme by using context-aware security manager (CASM) based on elliptic curve cryptosystem (EC-MQV).

Keywords
Algorithm design and analysis Computer architecture Computer networks Costs Data privacy Data security Elliptic curve cryptography Elliptic curves Information security Land mobile radio cellular systems
Published
2008-02-12
Publisher
IEEE
Modified
2011-08-09
http://dx.doi.org/10.1109/MOBIQ.2007.4451052
Copyright © 2007–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL