Learn More
This paper proposes novel concepts and architectures for location-aware seamless authentication and roaming in the new interworking system between third-generation (3G) mobile networks and wireless local area networks (WLANs) where local mobility movements (micromobility) are handled together with global movements (macro-mobility). We introduce location as(More)
Many Internet applications use public key infrastructure (PKI) to enable the secure transaction of confidential messages. However, the use of PKI is not consistent with the ideas of peer-to-peer networks. In this paper, we propose public key management framework to distribute public key safely without PKI infrastructure for two-tier super peer architecture.(More)
In this paper, we introduce a new security paradigm, called security clustering, for pervasive computing environment that enables network-wide defend against increasing evolutionary attacks on the heterogeneous network and hosts. Security clustering make use of dynamic security context exchange between cluster members and distributed information sharing to(More)