The search functionality is under construction.

Keyword Search Result

[Keyword] personal networks(2hit)

1-2hit
  • A New Security Architecture for Personal Networks and Its Performance Evaluation

    SeongHan SHIN  Hanane FATHI  Kazukuni KOBARA  Neeli R. PRASAD  Hideki IMAI  

     
    PAPER-Network

      Vol:
    E91-B No:7
      Page(s):
    2255-2264

    The concept of personal networks is very user-centric and representative for the next generation networks. However, the present security mechanism does not consider at all what happens whenever a mobile node (device) is compromised, lost or stolen. Of course, a compromised, lost or stolen mobile node (device) is a main factor to leak stored secrets. This kind of leakage of stored secrets remains a great danger in the field of communication security since it can lead to the complete breakdown of the intended security level. In order to solve this problem, we propose a 3-way Leakage-Resilient and Forward-Secure Authenticated Key Exchange (3LRFS-AKE) protocol and its security architecture suitable for personal networks. The 3LRFS-AKE protocol guarantees not only forward secrecy of the shared key between device and its server as well as providing a new additional layer of security against the leakage of stored secrets. The proposed security architecture includes two different types of communications: PN wide communication and communication between P-PANs of two different users. In addition, we give a performance evaluation and numerical results of the delay generated by the proposed security architecture.

  • European Research towards Future Wireless Communications

    Flemming Bjerge FREDERIKSEN  Ramjee PRASAD  Gert F. PEDERSEN  Istvan Z. KOVACS  

     
    INVITED PAPER

      Vol:
    E88-B No:6
      Page(s):
    2259-2267

    This paper presents an overview of four on-going European research projects in the field of mobile and wireless communications leading to the next generations of wireless communications. The projects started in 2004. They investigate requirements and definition of access technology, network architecture, antennas and propagation, security, services, applications and socio-economic impact.