thumbnail

Wireless Networks

  1572-8196

 

 

Cơ quản chủ quản:  Springer Netherlands , SPRINGER

Lĩnh vực:
Electrical and Electronic EngineeringInformation SystemsComputer Networks and Communications

Các bài báo tiêu biểu

Multicluster, mobile, multimedia radio network
Tập 1 Số 3 - Trang 255-265 - 1995
Mário Gerla, Jack Tzu-Chieh Tsai
TTDD: Two-Tier Data Dissemination in Large-Scale Wireless Sensor Networks
- 2005
Haiyun Luo, Fan Ye, Jerry Cheng, Songwu Lu, Lixia Zhang
AIRMAIL: A link-layer protocol for wireless networks
Tập 1 Số 1 - Trang 47-60 - 1995
Ender Ayanoǧlu, Sanjoy Kumar Paul, Thomas F. LaPorta, Krishan K. Sabnani, Richard D. Gitlin
Cloud-assisted body area networks: state-of-the-art and future challenges
- 2014
Giancarlo Fortino, Giuseppe Di Fatta, Mukaddim Pathan, Athanasios V. Vasilakos
Dynamic mobile user location update for wireless PCS networks
Tập 1 Số 2 - Trang 187-196 - 1995
Ian F. Akyildiz, Johnny C. Ho
Enhanced privacy and authentication for the global system for mobile communications
- 1999
Chii‐Hwa Lee, Min‐Shiang Hwang, Wei‐Pang Yang
The Global System for Mobile Communications (GSM) is widely recognized as the modern digital mobile network architecture. Increasing market demands point toward the relevancy of security‐related issues in communications. The security requirements of mobile communications for the mobile users include: (1) the authentication of the mobile user and Visitor Location Register/Home Location Register; (2) the data confidentiality between mobile station and Visitor Location Register, and the data confidentiality between Visitor Location Register and Visitor Location Register/Home Location Register (VLR/HLR); (3) the location privacy of mobile user. However, GSM does not provide enough security functions to meet these requirements. We propose three improved methods to enhance the security, to reduce the storage space, to eliminate the sensitive information stored in VLR, and consequently to improve the performance of the system. Proposed methods include an improved authentication protocol for the mobile station, a data confidentiality protocol, and a location privacy protocol. The merit of the proposed methods is to improve but not to alter the existing architecture of the system. Furthermore, this study also performs computational and capacity analyses to evaluate the original GSM system and proposed approaches on a comparative basis.
IBLEACH: intra-balanced LEACH protocol for wireless sensor networks
- 2014
Ahmed Salim, Walid Osamy, Ahmed M. Khedr