Mobility

An Efficient Authentication Protocol Based on Elliptic Curve Cryptography for Mobile Networks

Download Now Free registration required

Executive Summary

Mobile Networks offer unrestricted mobility devoid of any underlying infrastructure. Typically, mobile networks are deployed in un-trusted environments. Such networks in this day and age have to keep privacy and security of data as a top concern, because eaves dropping peaks here. The root cause behind such eavesdropping is the un-authenticated access of base station on nodes. The eventual outcome is the menace of insecure environment, information misuse, and so on. Cryptosystem is an important technique to identify the authenticity in order to protect the confidential and sensitive data in mobile networks. This paper proposes a simple and efficient authentication protocol for the establishment of secure communication between base station and nodes in mobile networks.

  • Format: PDF
  • Size: 208.2 KB