A Confidentiality Proof Wandering - Protocol in Mobile Networks

This method highlights a novel scheme of Hierarchical ID-based wandering protocol in wireless network or MANET for shielding confidentiality of the wandering user. The protocol uses dual-layer hierarchical ID-based cryptosystem in which a trusted party acts as the root authority, each domain server acts as the second-layer authority, and the wandering user is the end user. Such approach can avoid involvement with residence network, and keep the wandering user's identity concealed. Here the root authority is calmed from organization of a large amount of private/public key pairs, but the domain servers are also liberated to generate key pairs for their registered users.

Provided by: International Journal of Engineering Trends and Technology Topic: Security Date Added: Apr 2012 Format: PDF

Find By Topic