Techniques for Authentication Protocols and Key Distribution on Wireless ATM Networks

2Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

With the growing acceptance of ATM as the standard for broadband networking and the increasing importance of wireless devices, it has become appropriate to extend ATM application to wireless platforms. Adding a wireless network to existing wired network creates a set of problems. Security functions have to be reconsidered since wired network security did not account for the open medium, mobile roaming. A necessary foundation for securing a network is the ability to authenticate entities. There is a need to authenticate users of the system so that the resources would not be misused by nonsubscribers. After authentication by authentication protocol, two parties who involves in communications should be able and entitle to believe that they are communicating with each other and not with intruders. In mobile networks, normally secret-key cryptography is used for authentication. In this paper, both secret key and public key are attempted to be used in wireless ATM network.

Cite

CITATION STYLE

APA

Patiyoot, D., & Shepherd, S. J. (1998). Techniques for Authentication Protocols and Key Distribution on Wireless ATM Networks. Operating Systems Review (ACM), 32(4), 25–32. https://doi.org/10.1145/302350.302357

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free