Secure Public Key Protocol for Ad-Hoc Wireless Networks

Download Now
Provided by: International Journal of Computer Science and Network
Topic: Security
Format: PDF
As part of the security within distributed systems, various services and resources need protection from unauthorized use. Remote authentication is the most commonly used method to determine the identity of a remote client. This paper investigates a systematic approach for authenticating clients by three factors, namely password, smart card, and biometrics. A generic and secure framework is proposed to upgrade two-factor authentication to three-factor authentication. In multi hop wireless networks, selfish nodes do not relay other nodes' packets and make use of the cooperative nodes to relay their packets, which has negative impact on the network fairness and performance.
Download Now

Find By Topic