Authenticating with privacy protection in opportunistic networks

12Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

In this study, we propose an authentication mechanism with privacy protection for opportunistic networks. It is applied for the short-term and limited-time wireless network environment, and a super node is set to manage node registration. The proposal implements some encryption and security technologies to against security threats and attacks. In the analysis, the proposed mechanism finishes the authentication with less data, and provides anonymity and user privacy in the network.

Cite

CITATION STYLE

APA

Guo, M. H., Liaw, H. T., Chiu, M. Y., & Tsai, L. P. (2015). Authenticating with privacy protection in opportunistic networks. In Proceedings of the 11th EAI International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QSHINE 2015 (pp. 375–380). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.4108/eai.19-8-2015.2260862

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free