Habitant One-Time Furtive Mechanisms for Quick Common Validation in Mobile Interactions
| ||International Journal of Computer Trends and Technology (IJCTT)|| |
|© - Issue 2012 by IJCTT Journal|
|Volume-3 Issue-3 |
|Year of Publication : 2012|
|Authors :Anand Yaramala, Dr. S. Sai Satyanarayana Reddy Seelam, Sudheer Babu Kuntumalla|
Anand Yaramala, Dr. S. Sai Satyanarayana Reddy Seelam, Sudheer Babu Kuntumalla "Habitant One-Time Furtive Mechanisms for Quick Common Validation in Mobile Interactions"International Journal of Computer Trends and Technology (IJCTT),V3(3):371-375 Issue 2012 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract: -Many security mechanisms for mobile Interactions have been introduced in the literature. Among these mechanisms, Validation plays a quite important role in the entire mobile network system and acts as the first defense against attackers since it ensures the correctness of the identities of distributed communication entities before they engage in any other communication activity. Therefore, in order to guarantee the quality of this advanced service, an efficient (especially user-efficient) and secure Validation scheme is urgently desired.
 D. Brown, “Techniques for privacy and Validation in personal communication systems,” IEEE Personal Commun. , vol. 2, no. 4, pp. 6–10, Aug. 1995.
 N. Jefferies, “Security in third-generation mobile systems,” IEE Coll.Security Netw. , pp. 8/1–8/5, 1995.
 M. Rahnema, “Overview of the GSM system and protocol architecture,” IEEE Commun. Mag., vol. 31, no. 4, pp. 92– 100, Apr. 1993.
 B. Mallinder, “An overview of the GSM system,” in Proc. 3rd Nordic Seminar Digital Land Mobile Radio Commun., Copenhagen, Denmark, 1998, pp. 12–15.
 A. Aziz and W. Diffie, “Privacy and Validation for wireless local area networks,” IEEE Personal Commun. , vol. 1, no. 1, pp. 24–31, 1993.
 M. S. Hwang, Y. L. Tang, and C. C. Lee, “An efficient Validation protocol for GSM networks,” in Proc. AFCEA/IEEE Euro-Comm, 2000, pp. 326–329.
 S. Suzuki and K. Nakada, “An Validation technique based on distributed security management for the global mobility network,” IEEE J. Sel. Areas Commun., vol. 15, no. 8, pp. 1608–1617, Oct. 1997.
 C. H. Lee, M. S. Hwang, and W. P. Yang, “Enhanced privacy and Validation for the global system for mobile Interactions,” Wireless Netw., vol. 5, no. 4, pp. 231–243, 1999
KeywordsInformation security, Common Validation, one-time Furtives, secure mobile communication