Research Article
Adaptive Security Architecture based on EC-MQV Algorithm in Personal Network (PN)
@INPROCEEDINGS{10.1109/MOBIQ.2007.4451052, author={ Albena Mihovska and Neeli R. Prasad}, title={Adaptive Security Architecture based on EC-MQV Algorithm in Personal Network (PN)}, proceedings={2nd International ICST Workshop on Personalized Networks}, publisher={IEEE}, proceedings_a={PERNETS}, year={2008}, month={2}, keywords={Algorithm design and analysis Computer architecture Computer networks Costs Data privacy Data security Elliptic curve cryptography Elliptic curves Information security Land mobile radio cellular systems}, doi={10.1109/MOBIQ.2007.4451052} }
- Albena Mihovska
Neeli R. Prasad
Year: 2008
Adaptive Security Architecture based on EC-MQV Algorithm in Personal Network (PN)
PERNETS
IEEE
DOI: 10.1109/MOBIQ.2007.4451052
Abstract
Personal networks (PNs) have been focused on in order to support the user's business and private activities without jeopardizing privacy and security of the users and their data. In such a network, it is necessary to produce a proper key agreement method according to the feature of the network. One of the features of the network is that the personal devices have deferent capabilities such as computational ability, memory size, transmission power, processing speed and implementation cost. Therefore an adaptive security mechanism should be contrived for such a network of various device combinations based on user's location and device's capability. The paper proposes new adaptive security architecture with three levels of asymmetric key agreement scheme by using context-aware security manager (CASM) based on elliptic curve cryptosystem (EC-MQV).