Ming-Huang Guo, H. Liaw, Meng-Yu Chiu, Li-Ping Tsai
{"title":"机会主义网络中的身份验证与隐私保护","authors":"Ming-Huang Guo, H. Liaw, Meng-Yu Chiu, Li-Ping Tsai","doi":"10.4108/EAI.19-8-2015.2260862","DOIUrl":null,"url":null,"abstract":"In this study, we propose an authentication mechanism with privacy protection for opportunistic networks. It is applied for the short-term and limited-time wireless network environment, and a super node is set to manage node registration. The proposal implements some encryption and security technologies to against security threats and attacks. In the analysis, the proposed mechanism finishes the authentication with less data, and provides anonymity and user privacy in the network.","PeriodicalId":152628,"journal":{"name":"2015 11th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"Authenticating with privacy protection in opportunistic networks\",\"authors\":\"Ming-Huang Guo, H. Liaw, Meng-Yu Chiu, Li-Ping Tsai\",\"doi\":\"10.4108/EAI.19-8-2015.2260862\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this study, we propose an authentication mechanism with privacy protection for opportunistic networks. It is applied for the short-term and limited-time wireless network environment, and a super node is set to manage node registration. The proposal implements some encryption and security technologies to against security threats and attacks. In the analysis, the proposed mechanism finishes the authentication with less data, and provides anonymity and user privacy in the network.\",\"PeriodicalId\":152628,\"journal\":{\"name\":\"2015 11th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE)\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-11-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 11th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4108/EAI.19-8-2015.2260862\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 11th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4108/EAI.19-8-2015.2260862","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Authenticating with privacy protection in opportunistic networks
In this study, we propose an authentication mechanism with privacy protection for opportunistic networks. It is applied for the short-term and limited-time wireless network environment, and a super node is set to manage node registration. The proposal implements some encryption and security technologies to against security threats and attacks. In the analysis, the proposed mechanism finishes the authentication with less data, and provides anonymity and user privacy in the network.