Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 2 SI
Page No. 6201 - 6207

Efficient Authentication Scheme and Secure Communication for Mobile IP Networks under Varying Mobility Speed

Authors : Abdurahem El Atman Igrair and RaghavYadav Yadav

References

Abdelgadir, O.A., A.B.A. Nabi and A.G.E. Abdalla, 2013. Security overview on mobile IP networks. Intl. J. Sci. Res., 4: 1328-1337.

Balakrishnan, R., 2007. An acknowledgement based approach for the detection of routing misbehavior in MANETs. IEEE. Trans. Mob. Comput., 6: 536-550.
CrossRef  |  Direct Link  |  

Chang, J.M., P.C. Tsou, I. Woungang, H.C. Chao and C.F. Lai, 2015. Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE Syst. J., 9: 65-75.
CrossRef  |  Direct Link  |  

Deng, R.H., J. Zhou and F. Bao, 2002. Defending against redirect attacks in mobile IP. Proceedings of the 9th ACM Conference on Computer and Communications Security, November 18-22, 2002, ACM, Washington, USA., ISBN:1-58113-612-9, pp: 59-67.

He, D. and S. Chan, 2010. Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wirel. Pers. Commun., 61: 465-476.
CrossRef  |  Direct Link  |  

He, D., J. Bu, S. Chan, C. Chen and M. Yin, 2011. Privacy-preserving universal authentication protocol for wireless communications. IEEE Trans. Wireless Commun., 10: 431-436.
CrossRef  |  

He, D., M. Ma, Y. Zhang, C. Chen and J. Bu, 2010. A strong user authentication scheme with smart cards for wireless communications. Comput. Commun., 34: 367-374.
Direct Link  |  

Igrair, A.E.A. and R. Yadav, 2016. Review: Privacy Preserving Authentication (PPA) protocols for wireless mobile networks. Intl. J. Adv. Res. Comput. Sci. Software Eng., 6: 1-6.

Marti, S. and S. Miglani, 2012. Analysis of mobile IP protocols security. Intl. J. Comput. Appl., 46: 1-9.

Sheltami, T., A. Al-Roubaiey, E. Shakshuki and A. Mahmoud, 2009. Video transmission enhancement in presence of misbehaving nodes in MANETs. Int. J. Multimedia Syst., 15: 273-282.
CrossRef  |  Direct Link  |  

Yang, G., D.S. Wong and X. Deng, 2007. Anonymous and authenticated key exchange for roaming networks. IEEE. Trans. Wirel. Commun., 6: 3461-3472.
CrossRef  |  Direct Link  |  

Yang, G., Q. Huang, D.S. Wong and X. Deng, 2010. Universal authentication protocols for anonymous wireless communications. IEEE. Trans.Wirel. Commun., 9: 168-174.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved