Symmetric-key Inter-domain end-to-end Authentication Protocols for Mobile System

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 9

Abstract

Our goal is to propose and design a symmetric-key interdomain end-to-end authentication protocols for a mobile system. We will be considering three mobile service domains; each has an authentication server. We denote by AS1,AS2 and AS3 corresponding authentication servers. For simplicity, let AS1, AS2 ,AS3 represent those three domains. This mobile system can provide mobile communication services to a large number of users. For simplicity, we assume three mobile users (A, B and C) in the system only, where A has registered with AS1 and B has registered with AS2 and C has registered with AS3.

Authors and Affiliations

Rajarshi Roy Chowdhury , Subramanian Azhaguvel

Keywords

Related Articles

Optimization of Transmission Conditions for Thin Interphase Layer Based on Imperialist Competitive Algorithm

The imperialist competitive algorithm (ICA) that was recently introduced has shown its good performance in optimization problems. In this paper a novel optimization algorithm based on ICA is used for obtaining transmissi...

COMPARITIVE ANALYSIS OF FLLT AND JSEG

The main key point of preferential image segmentation is to segment object of user interest based on intensities, boundaries and texture and ignoring the remaining portions. It explains the trees of shapes to represent i...

DISCOVERING AND VALIDATING MISSING LINKS IN THE INTERNET TOPOLOGY

The topology of the Internet at the Autonomous System (AS) level is not yet fully discovered despite significant research activity. The community still does not know how many links are missing, where these links are and...

DIGITAL IMAGE PROCESSING TECHNIQUES FOR DETECTION AND REMOVAL OF NOISE IN IMAGES IMPLEMENTING BLIND SOURCE SEPARATION

In different fields, the problem of Blind Source Separation (BSS) is known as a collection of linear combinations of unknown sources and worse the coefficients of the linear combinations that are unknown. The main proble...

USE OF OPEN SOURCE TECHNOLOGIES FOR ENTERPRISE SERVER MONITORING USING SNMP

This paper focuses on the evolving trend of Data Center Monitoring in enterprise using SNMP protocol & open source platforms for proactive server monitoring and data center management. It also focuses on the need of...

Download PDF file
  • EP ID EP119042
  • DOI -
  • Views 127
  • Downloads 0

How To Cite

Rajarshi Roy Chowdhury, Subramanian Azhaguvel (2010). Symmetric-key Inter-domain end-to-end Authentication Protocols for Mobile System. International Journal on Computer Science and Engineering, 2(9), 2795-2800. https://europub.co.uk/articles/-A-119042