A Confidentiality Proof Wandering - Protocol in Mobile Networks
This method highlights a novel scheme of Hierarchical ID-based wandering protocol in wireless network or MANET for shielding confidentiality of the wandering user. The protocol uses dual-layer hierarchical ID-based cryptosystem in which a trusted party acts as the root authority, each domain server acts as the second-layer authority, and the wandering user is the end user. Such approach can avoid involvement with residence network, and keep the wandering user's identity concealed. Here the root authority is calmed from organization of a large amount of private/public key pairs, but the domain servers are also liberated to generate key pairs for their registered users.