In this study, we propose an authentication mechanism with privacy protection for opportunistic networks. It is applied for the short-term and limited-time wireless network environment, and a super node is set to manage node registration. The proposal implements some encryption and security technologies to against security threats and attacks. In the analysis, the proposed mechanism finishes the authentication with less data, and provides anonymity and user privacy in the network.
CITATION STYLE
Guo, M. H., Liaw, H. T., Chiu, M. Y., & Tsai, L. P. (2015). Authenticating with privacy protection in opportunistic networks. In Proceedings of the 11th EAI International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QSHINE 2015 (pp. 375–380). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.4108/eai.19-8-2015.2260862
Mendeley helps you to discover research relevant for your work.