Security

Mutual Access Authentication in Wireless Wearable Networks Based on Trusted Platform Module

Download Now Free registration required

Executive Summary

Since communication in a wearable network may not always be conducted over direct but multihop connections, intermediate nodes that make up the connections for communication could become potential sources of security threats. Therefore, access authentication is very crucial for preventing illegitimate, unauthorized or insecure devices from making access to the network. In this paper, the authors propose a new mutual authentication protocol in wireless wearable networks based on several technologies such as ad hoc network model, ECC, (t, n) threshold cryptographic method, EAP and TPM so that both the user and the terminal device can be authenticated before access to the network is allowed.

  • Format: PDF
  • Size: 862.31 KB