International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 3 | Issue 3 | Year 2012 | Article Id. IJCTT-V3I3P113 | DOI : https://doi.org/10.14445/22312803/IJCTT-V3I3P113

Habitant One-Time Furtive Mechanisms for Quick Common Validation in Mobile Interactions


Anand Yaramala, Dr. S. Sai Satyanarayana Reddy Seelam, Sudheer Babu Kuntumalla

Citation :

Anand Yaramala, Dr. S. Sai Satyanarayana Reddy Seelam, Sudheer Babu Kuntumalla, "Habitant One-Time Furtive Mechanisms for Quick Common Validation in Mobile Interactions," International Journal of Computer Trends and Technology (IJCTT), vol. 3, no. 3, pp. 371-375, 2012. Crossref, https://doi.org/10.14445/22312803/IJCTT-V3I3P113

Abstract

Many security mechanisms for mobile Interactions have been introduced in the literature. Among these mechanisms, Validation plays a quite important role in the entire mobile network system and acts as the first defense against attackers since it ensures the correctness of the identities of distributed communication entities before they engage in any other communication activity. Therefore, in order to guarantee the quality of this advanced service, an efficient (especially user-efficient) and secure Validation scheme is urgently desired.

Keywords

Information security, Common Validation, one-time Furtives, secure mobile communication.

References

[1] D. Brown, “Techniques for privacy and Validation in personal communication systems,” IEEE Personal Commun. , vol. 2, no. 4, pp. 6–10, Aug. 1995.
[2] N. Jefferies, “Security in third-generation mobile systems,” IEE Coll.Security Netw. , pp. 8/1–8/5, 1995.
[3] M. Rahnema, “Overview of the GSM system and protocol architecture,” IEEE Commun. Mag., vol. 31, no. 4, pp. 92– 100, Apr. 1993.
[4] B. Mallinder, “An overview of the GSM system,” in Proc. 3rd Nordic Seminar Digital Land Mobile Radio Commun., Copenhagen, Denmark, 1998, pp. 12–15.
[5] A. Aziz and W. Diffie, “Privacy and Validation for wireless local area networks,” IEEE Personal Commun. , vol. 1, no. 1, pp. 24–31, 1993.
[6] M. S. Hwang, Y. L. Tang, and C. C. Lee, “An efficient Validation protocol for GSM networks,” in Proc. AFCEA/IEEE Euro-Comm, 2000, pp. 326–329.
[7] S. Suzuki and K. Nakada, “An Validation technique based on distributed security management for the global mobility network,” IEEE J. Sel. Areas Commun., vol. 15, no. 8, pp. 1608–1617, Oct. 1997.
[8] C. H. Lee, M. S. Hwang, and W. P. Yang, “Enhanced privacy and Validation for the global system for mobile Interactions,” Wireless Netw., vol. 5, no. 4, pp. 231–243, 1999