Learn More
— Two novel mutual authentication and key exchange protocols with anonymity are proposed for different roaming scenarios in the global mobility network. The new features in the proposed protocols include identity anonymity and one-time session key renewal. Identity anonymity protects mobile users privacy in the roaming network environment. One-time session(More)
—Wireless metropolitan area sharing networks (WMSNs) are wide-area wireless networks with nodes owned and managed by independent wireless Internet service providers (WISPs). To support seamless roaming in emerging WMSNs, in this paper, we propose a localized and distributed authentication and billing architecture that aims at enabling efficient and(More)
—In this paper, we propose a robust and efficient signature scheme for Vehicle-to-Infrastructure communications, called Binary Authentication Tree (BAT). The BAT scheme can effectively eliminate the performance bottleneck when verifying a mass of signatures within a rigorously required interval, even under adverse scenarios with bogus messages. Given any n(More)
A novel key distribution scheme with time-limited node revocation is proposed for secure group communications in wireless sensor networks. The proposed scheme offers two important security properties: the seal-healing re-keying message distribution which features periodic one-way re-keying with implicitly authentication, efficient tolerance for the lost(More)
—In this paper, an agent-based integrated service model for wireless local area network (WLAN)/cellular networks and the relevant authentication and event tracking for billing support schemes are proposed. The service model does not require inefficient peer-to-peer roaming agreements to provide seamless user roaming between the WLAN hotspots and the(More)
The integration of wireless local area network (WLAN) hotspot and the 3G cellular networks is imminently the future mode of public access networks. One of the key elements for the successful integration is vertical handoff between the two heterogeneous networks. Service disruption may occur during the vertical handoff because of the IP layer handoff(More)
A novel authentication protocol for teleconference service is proposed. The main features of the proposed protocol include identity anonymity, one-time Pseudonym Identity (PID) renewal and location intracability. Identity anonymity is achieved by concealing the real identity of a mobile conferee in a prearranged PID. One-time PID Renewal mechanism, in which(More)