A Confidentiality Proof Wandering - protocol in mobile networks

  ijett-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2012 by IJETT Journal
Volume-3 Issue-2                          
Year of Publication : 2012
Authors :  Rajesh kumar Yadav, Deepak Panwar, Vaibhav Doshi


Rajesh kumar Yadav, Deepak Panwar, Vaibhav Doshi. " A Confidentiality Proof Wandering - protocol in mobile networks". International Journal of Engineering Trends and Technology (IJETT). V3(2):221-226 Mar-Apr 2012. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group


This method highlights a novel s ch eme of Hierarchical ID - based wandering protocol in wireless network or MANET for shielding confidentiality of the wan dering user. The protocol uses dual - layer hierarchical ID - based cryptosystem in which a trusted party acts as the root authority, each domain server acts as the second - layer authority, and the wandering user is the end user. Such approach can avoid involve ment with residence network, and keep the wandering user’s identity concealed . Here the root authority is calmed from organization of a large amount of private/public key pairs, but the domain servers are also liberated to generate key pairs for their regi stered users. The application also can use hash chains along with ID - based signatures to achieve non - repudiation for service payment. One of the significance of this research is that the protocols used have no involvement of the user’s home server. This en ables the protocol to save a large fraction of communication cost. Simulation is designed to evaluate the security and confidentiality factors for the stoutness of the application.


[1] Kim, S.H., Mims, C., & Holmes, K.P. (2006). An introduction to current trends and benefits of mobile wireless technology use in higher edu cation. AACE Journal, 14(1),77 - 100. ,
[2] Ngozi Oriaku, The Challenges And Opportunities Of Wireless Technologies In The Classroom: Related Standards And Regulations, College T eaching Methods & Styles Journal – April 2008
[3] Journal, Evolution of Wireless Applications and services, Qualcomm,Dec - 2007
[4] Guest Editorial Special Section on Wireless Technologies in Factory and Industrial Automation — Part I, IEEE transactions on i ndustrial informatics, VOL. 3, NO. 2, May 2007
[5] Doina Bein, Wireless Communication in Ubiquitous Environments, an easy target to attack, Computer Networks: The International Journal of Computer and Telecommunications Networking, Volume 51 Issue 4
[6] Mehmet S. Kuran, Tuna Tugcu, A survey on emerging broadband wireless access technologies, ScienceDirect, Computer Networks (2007)
[7] Abdul Bais, Walter T. Penzhorn, Peter Palensky, Evaluation of UMTS security architecture and services, 2006 IEEE
[8] Em eline Hufschmitt, David Lefranc and Herv ́e Sibert, A Zero - Knowledge Identification Scheme in Gap Diffie - Hellman Groups, Information Security and Privacy Lecture Notes in Computer Science , 2005 ,
[9] Duncan S. Wong, Security Analysis of Two Anonymous Authen tication Protocols for Distributed Wireless Networks, Proc. of the Third IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops), 8 - 12 March 2005, Kauai Island, Hawaii.
[10] Jon Callas, Identity - Based Encr yption with Conventional Public - Key Infrastructure, Information Security and Privacy Lecture Notes in Computer Science , 2005 ,
[11] Shin - Jia, Hwang and Ming - Jhang, Cai, A Secure Dynamic Conference Scheme with Anonymity for Mobile Communications, WSEAS Tran sactions on Information Science and Applications, 2005
[12] Yixin Jiang, Chuang Lin, Minghui Shi, Xuemin Sherman Shen, A self - encryption authentication protocol for teleconference services, Int. J. Security and Networks, Vol. 1, Nos. 3/4, 2006
[13] Gunth er Horn, keith M. Martin, Chris J. Mitchell, Authentication Protocols for Mobile Network Environment Value - added Services, IEEE Transaction on vehicular technology, 2002
[14] M. Ridwan Effendi, Implementation of wavelet packet for digital mobile communica tions, Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08. 4th International Conference on 2008
[15] Joel Reardon, The Strong Diffie - Hellman Problem, April 3, 2007

Nomadic Protocols, confidentiality, Mobile Networks , confidentiality , MANET