Research Article
Authenticating with Privacy Protection in Opportunistic Networks
@INPROCEEDINGS{10.4108/eai.19-8-2015.2260862, author={Ming-Huang Guo and Horng-Twu Liaw and Meng-Yu Chiu and Li-Ping Tsai}, title={Authenticating with Privacy Protection in Opportunistic Networks}, proceedings={11th EAI International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness}, publisher={IEEE}, proceedings_a={QSHINE}, year={2015}, month={9}, keywords={opportunistic network privacy protection authentication mechanisms}, doi={10.4108/eai.19-8-2015.2260862} }
- Ming-Huang Guo
Horng-Twu Liaw
Meng-Yu Chiu
Li-Ping Tsai
Year: 2015
Authenticating with Privacy Protection in Opportunistic Networks
QSHINE
IEEE
DOI: 10.4108/eai.19-8-2015.2260862
Abstract
In this study, we propose an authentication mechanism with privacy protection for opportunistic networks. It is applied for the short-term and limited-time wireless network environment, and a super node is set to manage node registration. The proposal implements some encryption and security technologies to against security threats and attacks. In the analysis, the proposed mechanism finishes the authentication with less data, and provides anonymity and user privacy in the network.
Copyright © 2015–2024 ICST