SlideShare a Scribd company logo
1 of 4
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 01 | Jan-2015, Available @ http://www.ijret.org 328
ANALYSIS OF SECURITY ROAMING NETWORK AND PRIVACY
PRESERVING MECHANISM
Ashwini A. Lokhande1
, Sonali U. Nimbhorkar2
1
Dept. of Computer Science & Engineering, G.H. Raisoni College of Engineering, Nagpur
2
Dept. of Computer Science & Engineering, G.H. Raisoni College of Engineering, Nagpur
Abstract
The Progression in various wireless network, such as roaming network which enables mobile subscriber to enjoy internet service
anytime anywhere. Seamless roaming over wireless networks is highly desirable to mobile users, but ensuring the security and
efficiency of this process is challenging. The communication systems in roaming services have special requirements and
vulnerabilities, and therefore deserve special attention. Privacy-preserving authentication mechanism for Roaming services is
presented in this paper. CPAL resists various security threats and provides more flexible privacy preservation compared to the
existing schemes. The challenges which are unique to roaming service are discuss. The resistance against the denial of service
attack in roaming service is describe.
Keywords:-Roaming network, Privacy preserving, Authentication mechanism, CPAL, Denial of service Attack.
------------------------------------------------------------------***-------------------------------------------------------------------
1. INTRODUCTION
With the Progression in various mobile and wireless
networks, including universal mobile telecommunication
systems, wireless local area networks, roadside-to-vehicle
communication systems [1], and satellite networks,
ubiquitous computing becomes a reality. Users can access
network services anywhere and anytime. However, within
the heterogeneous networks, ensuring the secure and
efficient roaming service is still difficult [4], [5], because
different networks have different security policies and
authentication protocols. Subsequently, any secure roaming
scheme committed for only one type of network technology
cannot fulfill the security needs from the heterogeneous
networks.
In heterogeneous networks, user privacy preservation has
become an important and challenging issue in the roaming
service, and has been widely considered by researchers. In
most existing secure roaming schemes, the privacy
preservation only equates with anonymity, i.e., hiding users’
identities. However, this may not be suitable for diverse
privacy needs in real world [6], [7]–[9].
Moreover, there may be a large number of mobile users that
need to be revoked in the network anytime due to various
reasons, e.g., when any illegal or exceptional events occur.
However, the existing secure roaming schemes [9], [10] do
not support this function. This will significantly increase the
burden of the home authentication server and potentially
reduce the efficiency of the whole network. Therefore,
efficient user revocation for dynamic membership in the
secure roaming services is important. The General roaming
scenario for wireless networks for communication is shown
in Fig. 1. It involves three parties: a roaming user U, a
visited foreign server V, and a home server H of which U is
a subscriber. Normally, V and H have a roaming agreement,
So U can access its subscribed services through V when U is
in a foreign network administered by V. Before U can access
resources provided by V, an appropriate authentication
process between U and V must be carried out. This process
is of great importance.
Fig 1 Overview of roaming services
2. RELATED WORK
The existing roaming schemes for secure communication
can mainly be classified into three categories: symmetric-
cryptosystem-based (SCbased), asymmetric-cryptosystem-
based (AC-based), and hybrid schemes. The SC-based
secure roaming schemes,such as EAP-based authentication
and key agreement protocols [26],[27], are designed based
on standard protocols [28], [29]. SC-based schemes are
mostly accepted because they are compatible with standard
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 01 | Jan-2015, Available @ http://www.ijret.org 329
protocols. However, they require the interaction between the
foreign server and the home server, which may lead to the
single point of failure [30], and induce large authentication
transmission overhead because of the long distance between
the foreign server and the home server. Jiang and Shi [31],
[32] propose several mutual authentication and key
exchange schemes for roaming services. In [31] and [32],
public key cryptography such as digital signature and
Diffie– Hellman key exchange, is adopted on the basis of
SC-based Schemes, which can further enhance the security
of roaming Service. The limitations of SC-based schemes
have greatly stimulated the research of AC-based schemes
[9], [10], [20],[33], because AC-based schemes can provide
more security, stronger privacy preservation, and require
fewer communication rounds. These advantages have led to
the recent increasing popularity of the AC-based secure
roaming schemes. One of the important security properties
in the AC-based secure roaming schemes is strong user
anonymity, which includes user anonymity and user
untraceablility. They point that a privacy-preserving and
user authentication scheme should satisfy the following
requirements for communication in the roaming network:
server authentication, subscription validation, provision of
user revocation function, key establishment, user anonymity,
and untraceablility. However, the existing privacy-
preserving authentication schemes for roaming service used
for communication cannot provide anonymous user
linkability that makes the authorized entities, e.g., FN
operators or service providers; have the ability to
anonymously link the access information from the user for
statistical purposes. This may not be enough for diverse
applications in the roaming service.
3. CHALLENGES AND REQUIREMENTS OF
SECURE ROAMING SERVICES
Many security and efficiency challenges exist in roaming
services, mainly due to the resource constraints of mobile
users, the authentication delay constraint, and the
demanding security requirements of roaming applications.
A. Server Authentication: Roaming users should be
allowed to authenticate the foreign server they visit
to avoid potential deception and other malicious
attacks.
B. Subscription Validation: A visited foreign network
must authenticate mobile users to ensure their
legitimacy.
C. Provision of User Revocation: Services to a
roaming user should be terminated once its
subscription period ends.
D. Key Establishment: A session key should be
established between a roaming user and a visited
foreign server to protect subsequent data exchanged
between them.
E. Low Computation Complexity and
Communication cost: A mobile user is generally
constrained in terms of power, processing capability,
and storage space. The degree of the resource
limitation is different for various mobile devices
(e.g., laptop PC, smart phone, PDA). Therefore, a
roaming authentication process should be
computationally efficient. At the same time, such a
process should be fast enough to maintain persistent
connectivity for mobile users.
F. Basic User Anonymity and Non-Traceability: A
user should be anonymous, and its activities must
not be linkable by eavesdroppers. Non-linkability
means that an adversary cannot link the
communication activities of a particular user
together and thus establish the user’s profile.
G. Attack Resistance: The roaming protocol should
have the ability to resist various attacks in wireless
networks (e.g., denial of service [DoS] attack, replay
attack, deposit case attack) such that it can be
applied in the real world.
4. RESISTANCE AGAINST DOS ATTACKS
To prevent the DoS attack, in roaming network for
communication have suggested that the message-specific
puzzles of [18] can be Incorporated into current roaming
authentication protocols (e.g., [11-16]) in the following way.
When a foreign server finds no evidence of the attack (e.g.,
the arrival rate of bogus access requests is less than a
predefined threshold), it Processes access requests normally
(i.e., indiscriminately). However, when it suspects itself of
being attacked, it only performs expensive verification on
access requests selectively. In particular, the server attaches
a unique puzzle into the beacon messages and requires the
solution of the puzzle to be attached to each access request
message. The server commits resources to process an access
request only when the solution is correct.
In general, solving a puzzle requires a brute force search in
the solution space, while solution verification is very fast.
Additionally, puzzles are deployed in conjunction with
conventional time-outs on server resources. Thus, in order to
create an interruption in services, an adversary must have
abundant resources to be able to promptly compute a large
enough number of puzzle solutions in line with its sending
rate of illegal access requests. In contrast, although puzzles
slightly increase legitimate users’ computational load when
the server is under attack, they are still able to Obtain
network access regardless of the existence of the attack.
5. CPAL:-DESIGN GOALS
Design goal to develop a CPAL (Conditional Privacy –
Preserving Authentication Mechanism) for roaming service
is as follows.
A. Strong Anonymous Access Authentication: First,
the proposed scheme should provide strong
anonymous access authentication. Specifically, it
requires that authentication messages, which are
interacted by the MS and the VAS, have not been
altered during the transmission, i.e., if the adversary
A forges and/or modifies the authentication
messages, the malicious operations should be
detected. Meanwhile, the identity of the MS cannot
be revealed to adversary A or the VAS.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 01 | Jan-2015, Available @ http://www.ijret.org 330
B. User Tracking on a Disputed Access Request: An
important and challenging issue for roaming service
with efficient privacy preservation is to maintain
traceability for all the access messages in the
presence of the anonymous access authentication.
Without the tracking function, the above anonymous
access authentication can only prevent an outside
attack, but cannot deal with an inside one. For
instance, an inside attacker could launch a Denial of
Service (DoS) attack or impersonation attack,
provided with no traceability by the HAC. In a DoS
attack, the adversary sends a large number of fake
access messages to jam the channel or to consume
the rare computation resources of the VAC; while in
an impersonation attack, the adversary actively
pretends to be another MS to send false access
request messages.
C. Anonymous User Linking: In order to provide
CPAL, i.e., anonymity can be flexibly or elaborately
controlled according to the corresponding
requirements, the network operators or service
providers that are authorized by the HAC or MS can
acquire MS’s statistics on the usage of services,
while MS’s identity will not be revealed.
D. Efficient User Revocation for Dynamic
Membership: Due to some reasons (e.g., the
subscription period of a user has expired or a user’s
secret key has been compromised), an efficient user
revocation function should be proposed, especially
for dynamic membership. That means the user
revocation function can revoke a group of users
simultaneously, which makes the whole scheme
more flexible and efficient. Meanwhile, CPAL can
provide a universal secure roaming service. That
means the proposed CPAL and its signaling flows
can be used in any roaming scenario regardless of
the type of networks that the MS is visiting.
Moreover, the proposed CPAL scheme should meet
all security requirements in previous schemes.
6. CONCLUSION
Roaming services in wireless networks provide people with
attractive flexibility and convenience for communication. A
set of mechanisms to complement existing work for
defending against DoS attacks, efficient authentication,
flexible roaming in mobile contexts is describe here. CPAL-
Condition Privacy Preserving Authentication with Access
Linkability resists various security threats and provides
more flexible and elaborate privacy preservation including
user tracking, anonymous user linking, joining, and
revocation function for dynamic membership.
REFERENCES
[1] Chengzhe Lai, , Hui Li, Xiaohui Liang, Rongxing
Lu, Kuan Zhang, , and Xuemin Shen, ―CPAL: A
Conditional Privacy- Preserving Authentication
With Access Linkability for Roaming Service‖ IEEE
internet of things journal, vol. 1, no. 1, february
2014.
[2] Y. Soh, T. Quek, M. Kountouris, and H. Shin,
“Energy efficient heterogeneous cellular networks,”
IEEE J. Sel. Areas Commun., vol. 31, no. 5, pp.
840–850, May 2013.
[3] Huang, X. Hong, and M. Gerla, “Situation-Aware
Trust Architecture for Vehicular Networks,” IEEE
Communication.. Mag., vol. 48, no. 11, 2010, pp.
128–35.
[4] A. Bikos and N. Sklavos, “LTE/SAE security issues
on 4G wireless networks,” IEEE Security. Privacy,
vol. 11, no. 2, pp. 55–62, Mar./Apr. 2013.
[5] D. He, C. Chen, J. Bu, S. Chan, and Y. Zhang,
“Security and efficiency in roaming services for
wireless networks: Challenges, approaches, and
prospects,”IEEE Communication. Mag., vol. 51, no.
2, pp. 142–150, Feb. 2013.
[6] R. Lu, X. Lin, H. Zhu, P. Ho, and X. Shen, “ECPP:
Efficient conditional privacy preservation protocol
for secure vehicular communications,” in Proc.
IEEE INFOCOM, 2008, pp. 1229–1237.
[7] R. Lu, X. Lin, and X. Shen, “SPOC: A secure and
privacy preserving opportunistic computing
framework for mobile-healthcare emergency,” IEEE
Trans. Parallel Distribute. Syst., vol. 24, no. 3, pp.
614–624, Mar. 2013.
[8] X. Liang, X. Li, H. Luan, R. Lu, X. Lin, and X.
Shen, “Morality-driven data forwarding with privacy
preservation in mobile social networks,” IEEE
Trans. Technol., vol. 61, no. 7, pp. 3209–3221, Sep.
2012.
[9] Yang, Q. Huang, D. Wong, and X. Deng, “Universal
authentication protocols for anonymous wireless
communications,” IEEE Trans. Wireless
Communication.., vol. 9, no. 1, pp. 168–174, Jan.
2010.
[10] D. He, J. Bu, S. Chan, C. Chen, and M. Yin,
“Privacy-preserving universal authentication
protocol for wireless communications,” IEEE Trans.
Wireless Communication.., vol. 10, no. 2, pp. 431–
436, Feb. 2011.
[11] G. Yang, D. S. Wong, and X. Deng, “Anonymous
and Authenticated Key Exchange for Roaming
Networks,” IEEE Trans. Wireless Communication..,
vol. 6, no. 9, Sept. 2007, pp. 3461–72.
[12] Z. Wan, K. Ren, and B. Preneel, “A Secure Privacy-
Preserving Roaming Protocol based on Hierarchical
Identity- based Encryption for Mobile Networks,”
Proc. ACM WiSec ’08, 2008, pp. 62–67.
[13] Yang et al., “Universal Authentication Protocols for
Anonymous Wireless Communications,” IEEE
Trans. Wireless Communication.., vol. 9, no. 1, Jan.
2010, pp. 168–74.
[14] D. He et al., “Privacy-Preserving Universal
Authentication Protocol for Wireless
Communications,” IEEE Trans. Wireless
Communication.., vol. 10, no. 2, Feb. 2011, pp. 431–
36.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 01 | Jan-2015, Available @ http://www.ijret.org 331
[15] D. He et al., “Secure and Efficient Handover
Authentication based on Bilinear Pairing Functions,”
IEEE Trans. Wireless Communication.., vol. 11, no.
1, Jan. 2012, pp. 48–53.
[16] D. He et al., “Handauth: Efficient Handover
Authentication with Conditional Privacy for
Wireless Networks,” IEEE Trans. Computers,
published online 27 Dec. 2011.
[17] D. He et al., “Strong Roaming Authentication
Technique for Wireless and Mobile Networks,”
Int’l. J. Communication. Systems, published online 4
Jan. 2012.
[18] A. Juels and J. Brainard, “Client Puzzles: A
Cryptographic Countermeasure against Connection
Depletion Attacks,” Proc. NDSS ’99, 1999, pp. 151–
65.
[19] K. Zeng, K. Govindan, and P. Mohapatra, “Non-
Cryptographic Authentication and Identification in
Wireless Networks,” IEEE Wireless
Communication.., vol. 17, no. 5, Oct. 2010, pp. 56–
62.
[20] M. Chuang, J. Lee, and M. Chen, “SPAM: A secure
password authentication mechanism for seamless
handover in proxy mobile IPv6 networks,” IEEE
Syst. J., vol. 7, no. 1, pp. 102–113, Mar. 2013.
[21] Z. Wan, K. Ren, and B. Preneel, “A secure privacy-
preserving roaming protocol based on hierarchical
identity-based encryption for mobile networks,” in
Proc. 1st ACM Conf. Wireless Network. Security,
2008, pp. 62–67.
[22] Y. Kim, W. Ren, J. Jo, Y. Jiang, and J. Zheng,
“SFRIC: A secure fast roaming scheme in wireless
LAN using ID-based cryptography,” in Proc. IEEE
ICC, 2007, pp. 1570–1575.
[23] Ren and L. Harn, “An efficient threshold
anonymous authentication scheme for privacy-
preserving communications,” IEEE Trans. Wireless
Communication.., vol. 12, no. 3, pp. 1018–1025,
Mar. 2013.
[24] A.Menezes, P. V. Oorschot, and S. Vanstone,
Handbook of Applied Cryptography. Boca Raton,
FL, USA: CRC press, 2010.
[25] R. Lu, X. Liang, X. Li, X. Lin, and X. Shen, “EPPA:
An efficient and privacy preserving aggregation
scheme for secure smart grid communications,”
IEEETrans. Parallel Distribute. Syst., vol. 23, no. 9,
pp. 1621–1631, Sep. 2012.
[26] C. Fan, Y. Lin, and R. Hsu, “Complete EAP
method: User efficient and forward secure
authentication protocol for IEEE 802.11 wireless
LANs,” IEEE Trans. Parallel Distribute. Syst., vol.
24, no. 4, pp. 672–680,Apr. 2013
[27] M. Zhang and Y. Fang, “Security analysis and
enhancements of 3GPP authentication and key
agreement protocol,” IEEE Trans. Wireless
Communication.., vol. 4, no. 2, pp. 734–742, Mar.
2005.
[28] D. Zhang, “3GPP TS 33.401 V12.5.0, 3GPP System
Architecture Evolution (SAE); Security
Architecture,” Sep. 2012.
[29] J. Arkko and H. Haverinen, “Extensible
Authentication Protocol Method for Third
Generation Authentication and Key Agreement
(EAP-AKA), IETF RFC 4187,” Jan. 2006.
[30] K. Dooley, Designing Large Scale LANs.
Sebastopol, CA, USA: Reilly Media, 2009
[31] Y. Jiang, C. Lin, X. Shen, and M. Shi, “Mutual
authentication and key exchange protocols for
roaming services in wireless mobile networks,”
IEEE Trans. Wireless Communication.., vol. 5, no.
9, pp. 2569–2577, Sep. 2006.
[32] M. Shi, H. Rutagemwa, X. Shen, J. Mark, and A.
Saleh, “A service-agent based roaming architecture
for WLAN/Cellular integrated networks,” IEEE
Trans. Veh. Technol., vol. 56, no. 5, pp. 3168–3181,
Sep. 2007.
[33] J. Ren and L. Harn, “An efficient threshold
anonymous authentication scheme for privacy-
preserving communications,” IEEE Trans. Wireless
Communication.., vol. 12, no. 3, pp. 1018–1025,
Mar. 2013.

More Related Content

What's hot

Security Issues Of Virtual Private Networks: A Survey
Security Issues Of Virtual Private Networks: A SurveySecurity Issues Of Virtual Private Networks: A Survey
Security Issues Of Virtual Private Networks: A SurveyIJCSIS Research Publications
 
Virtual private network a veritable tool for network security
Virtual private network a veritable tool for network securityVirtual private network a veritable tool for network security
Virtual private network a veritable tool for network securityeSAT Publishing House
 
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM ijcseit
 
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments IJITCA Journal
 
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...IJNSA Journal
 
A Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS BankingA Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS BankingIRJET Journal
 
PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS
PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS
PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS cscpconf
 
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICESUSER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICESnexgentechnology
 
AnuuTech Whitepaper.pdf
AnuuTech Whitepaper.pdfAnuuTech Whitepaper.pdf
AnuuTech Whitepaper.pdfAnuuTech
 
A novel paradigm in authentication system
A novel paradigm in authentication systemA novel paradigm in authentication system
A novel paradigm in authentication systemIJNSA Journal
 
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...Nexgen Technology
 
IRJET- Design of Anonymous Publish-Subscribe Messaging System in a P2P Networ...
IRJET- Design of Anonymous Publish-Subscribe Messaging System in a P2P Networ...IRJET- Design of Anonymous Publish-Subscribe Messaging System in a P2P Networ...
IRJET- Design of Anonymous Publish-Subscribe Messaging System in a P2P Networ...IRJET Journal
 
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public CloudA Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public Cloudrahulmonikasharma
 
DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...
DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...
DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...IJNSA Journal
 

What's hot (16)

Security Issues Of Virtual Private Networks: A Survey
Security Issues Of Virtual Private Networks: A SurveySecurity Issues Of Virtual Private Networks: A Survey
Security Issues Of Virtual Private Networks: A Survey
 
Virtual private network a veritable tool for network security
Virtual private network a veritable tool for network securityVirtual private network a veritable tool for network security
Virtual private network a veritable tool for network security
 
If3614251429
If3614251429If3614251429
If3614251429
 
546 220-228
546 220-228546 220-228
546 220-228
 
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
 
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments
 
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...
 
A Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS BankingA Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS Banking
 
PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS
PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS
PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS
 
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICESUSER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES
 
AnuuTech Whitepaper.pdf
AnuuTech Whitepaper.pdfAnuuTech Whitepaper.pdf
AnuuTech Whitepaper.pdf
 
A novel paradigm in authentication system
A novel paradigm in authentication systemA novel paradigm in authentication system
A novel paradigm in authentication system
 
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
 
IRJET- Design of Anonymous Publish-Subscribe Messaging System in a P2P Networ...
IRJET- Design of Anonymous Publish-Subscribe Messaging System in a P2P Networ...IRJET- Design of Anonymous Publish-Subscribe Messaging System in a P2P Networ...
IRJET- Design of Anonymous Publish-Subscribe Messaging System in a P2P Networ...
 
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public CloudA Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
 
DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...
DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...
DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...
 

Viewers also liked

Cantilever type switch design
Cantilever type switch designCantilever type switch design
Cantilever type switch designeSAT Journals
 
State space vector based advanced direct power control of matrix converter as...
State space vector based advanced direct power control of matrix converter as...State space vector based advanced direct power control of matrix converter as...
State space vector based advanced direct power control of matrix converter as...eSAT Journals
 
Pattern of embedded bluetooth information broadcast system
Pattern of embedded bluetooth information broadcast systemPattern of embedded bluetooth information broadcast system
Pattern of embedded bluetooth information broadcast systemeSAT Journals
 
Utilization of industrial waste in the construction industry
Utilization of industrial waste in the construction industryUtilization of industrial waste in the construction industry
Utilization of industrial waste in the construction industryeSAT Journals
 
Development of a floating tow body for shallow water bottom and sub bottom im...
Development of a floating tow body for shallow water bottom and sub bottom im...Development of a floating tow body for shallow water bottom and sub bottom im...
Development of a floating tow body for shallow water bottom and sub bottom im...eSAT Journals
 
Influence of volume fraction, size, cracking, clustering of particulates and ...
Influence of volume fraction, size, cracking, clustering of particulates and ...Influence of volume fraction, size, cracking, clustering of particulates and ...
Influence of volume fraction, size, cracking, clustering of particulates and ...eSAT Journals
 
Numerical study of disk drive rotating flow structure in the cavity
Numerical study of disk drive rotating flow structure in the cavityNumerical study of disk drive rotating flow structure in the cavity
Numerical study of disk drive rotating flow structure in the cavityeSAT Journals
 
Effect of specimen diameter and notch diameter on the fracture toughness of a...
Effect of specimen diameter and notch diameter on the fracture toughness of a...Effect of specimen diameter and notch diameter on the fracture toughness of a...
Effect of specimen diameter and notch diameter on the fracture toughness of a...eSAT Journals
 
Analysis of precast shear wall connection state of the art review
Analysis of precast shear wall connection  state of the art reviewAnalysis of precast shear wall connection  state of the art review
Analysis of precast shear wall connection state of the art revieweSAT Journals
 
Digital image hiding algorithm for secret communication
Digital image hiding algorithm for secret communicationDigital image hiding algorithm for secret communication
Digital image hiding algorithm for secret communicationeSAT Journals
 
Modeling and analysis of naca 66 206 aerofoil propeller
Modeling and analysis of naca 66 206 aerofoil propellerModeling and analysis of naca 66 206 aerofoil propeller
Modeling and analysis of naca 66 206 aerofoil propellereSAT Journals
 
A hybrid approach for ipfc location and parameters optimization for congestio...
A hybrid approach for ipfc location and parameters optimization for congestio...A hybrid approach for ipfc location and parameters optimization for congestio...
A hybrid approach for ipfc location and parameters optimization for congestio...eSAT Journals
 
Effect of variation of compression ratio and injection pressure on performanc...
Effect of variation of compression ratio and injection pressure on performanc...Effect of variation of compression ratio and injection pressure on performanc...
Effect of variation of compression ratio and injection pressure on performanc...eSAT Journals
 
Effect of cryogenic treatment on tool steel (aisi ¬d2)
Effect of cryogenic treatment on tool steel (aisi  ¬d2)Effect of cryogenic treatment on tool steel (aisi  ¬d2)
Effect of cryogenic treatment on tool steel (aisi ¬d2)eSAT Journals
 
A case study on characteristics of solid waste & leachate treatment of ok...
A case study on characteristics of solid waste & leachate treatment of ok...A case study on characteristics of solid waste & leachate treatment of ok...
A case study on characteristics of solid waste & leachate treatment of ok...eSAT Journals
 
Comparative analysis of direct and four indirect methods for determination of...
Comparative analysis of direct and four indirect methods for determination of...Comparative analysis of direct and four indirect methods for determination of...
Comparative analysis of direct and four indirect methods for determination of...eSAT Journals
 
Seismic analysis of high damping rubber bearings for base isolation
Seismic analysis of high damping rubber bearings for base isolationSeismic analysis of high damping rubber bearings for base isolation
Seismic analysis of high damping rubber bearings for base isolationeSAT Journals
 
Effect of configuration on lateral displacement and cost of the structure for...
Effect of configuration on lateral displacement and cost of the structure for...Effect of configuration on lateral displacement and cost of the structure for...
Effect of configuration on lateral displacement and cost of the structure for...eSAT Journals
 

Viewers also liked (18)

Cantilever type switch design
Cantilever type switch designCantilever type switch design
Cantilever type switch design
 
State space vector based advanced direct power control of matrix converter as...
State space vector based advanced direct power control of matrix converter as...State space vector based advanced direct power control of matrix converter as...
State space vector based advanced direct power control of matrix converter as...
 
Pattern of embedded bluetooth information broadcast system
Pattern of embedded bluetooth information broadcast systemPattern of embedded bluetooth information broadcast system
Pattern of embedded bluetooth information broadcast system
 
Utilization of industrial waste in the construction industry
Utilization of industrial waste in the construction industryUtilization of industrial waste in the construction industry
Utilization of industrial waste in the construction industry
 
Development of a floating tow body for shallow water bottom and sub bottom im...
Development of a floating tow body for shallow water bottom and sub bottom im...Development of a floating tow body for shallow water bottom and sub bottom im...
Development of a floating tow body for shallow water bottom and sub bottom im...
 
Influence of volume fraction, size, cracking, clustering of particulates and ...
Influence of volume fraction, size, cracking, clustering of particulates and ...Influence of volume fraction, size, cracking, clustering of particulates and ...
Influence of volume fraction, size, cracking, clustering of particulates and ...
 
Numerical study of disk drive rotating flow structure in the cavity
Numerical study of disk drive rotating flow structure in the cavityNumerical study of disk drive rotating flow structure in the cavity
Numerical study of disk drive rotating flow structure in the cavity
 
Effect of specimen diameter and notch diameter on the fracture toughness of a...
Effect of specimen diameter and notch diameter on the fracture toughness of a...Effect of specimen diameter and notch diameter on the fracture toughness of a...
Effect of specimen diameter and notch diameter on the fracture toughness of a...
 
Analysis of precast shear wall connection state of the art review
Analysis of precast shear wall connection  state of the art reviewAnalysis of precast shear wall connection  state of the art review
Analysis of precast shear wall connection state of the art review
 
Digital image hiding algorithm for secret communication
Digital image hiding algorithm for secret communicationDigital image hiding algorithm for secret communication
Digital image hiding algorithm for secret communication
 
Modeling and analysis of naca 66 206 aerofoil propeller
Modeling and analysis of naca 66 206 aerofoil propellerModeling and analysis of naca 66 206 aerofoil propeller
Modeling and analysis of naca 66 206 aerofoil propeller
 
A hybrid approach for ipfc location and parameters optimization for congestio...
A hybrid approach for ipfc location and parameters optimization for congestio...A hybrid approach for ipfc location and parameters optimization for congestio...
A hybrid approach for ipfc location and parameters optimization for congestio...
 
Effect of variation of compression ratio and injection pressure on performanc...
Effect of variation of compression ratio and injection pressure on performanc...Effect of variation of compression ratio and injection pressure on performanc...
Effect of variation of compression ratio and injection pressure on performanc...
 
Effect of cryogenic treatment on tool steel (aisi ¬d2)
Effect of cryogenic treatment on tool steel (aisi  ¬d2)Effect of cryogenic treatment on tool steel (aisi  ¬d2)
Effect of cryogenic treatment on tool steel (aisi ¬d2)
 
A case study on characteristics of solid waste & leachate treatment of ok...
A case study on characteristics of solid waste & leachate treatment of ok...A case study on characteristics of solid waste & leachate treatment of ok...
A case study on characteristics of solid waste & leachate treatment of ok...
 
Comparative analysis of direct and four indirect methods for determination of...
Comparative analysis of direct and four indirect methods for determination of...Comparative analysis of direct and four indirect methods for determination of...
Comparative analysis of direct and four indirect methods for determination of...
 
Seismic analysis of high damping rubber bearings for base isolation
Seismic analysis of high damping rubber bearings for base isolationSeismic analysis of high damping rubber bearings for base isolation
Seismic analysis of high damping rubber bearings for base isolation
 
Effect of configuration on lateral displacement and cost of the structure for...
Effect of configuration on lateral displacement and cost of the structure for...Effect of configuration on lateral displacement and cost of the structure for...
Effect of configuration on lateral displacement and cost of the structure for...
 

Similar to Analysis of security roaming network and privacy preserving mechanism

Dynamic Routing to Alleviate Congestion with Authentication for Mobile Wirele...
Dynamic Routing to Alleviate Congestion with Authentication for Mobile Wirele...Dynamic Routing to Alleviate Congestion with Authentication for Mobile Wirele...
Dynamic Routing to Alleviate Congestion with Authentication for Mobile Wirele...ijbuiiir1
 
Irrational node detection in multihop cellular
Irrational node detection in multihop cellularIrrational node detection in multihop cellular
Irrational node detection in multihop cellulareSAT Publishing House
 
Irrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting centerIrrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting centereSAT Journals
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
IRJET- Pesudonymous and Rapid Roaming Verification using Group Signature
IRJET-  	  Pesudonymous and Rapid Roaming Verification using Group SignatureIRJET-  	  Pesudonymous and Rapid Roaming Verification using Group Signature
IRJET- Pesudonymous and Rapid Roaming Verification using Group SignatureIRJET Journal
 
Enhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hocEnhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hoceSAT Publishing House
 
Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...eSAT Publishing House
 
To Improve Data Storage Security Levels in the Cloud
To Improve Data Storage Security Levels in the CloudTo Improve Data Storage Security Levels in the Cloud
To Improve Data Storage Security Levels in the Cloudrahulmonikasharma
 
An assessment of cloud computing
An assessment of cloud computingAn assessment of cloud computing
An assessment of cloud computingeSAT Journals
 
An assessment of cloud computing evolution
An assessment of cloud computing evolutionAn assessment of cloud computing evolution
An assessment of cloud computing evolutioneSAT Publishing House
 
Report based payment scheme for multihop wireless networks
Report based payment scheme for multihop wireless networksReport based payment scheme for multihop wireless networks
Report based payment scheme for multihop wireless networkseSAT Publishing House
 
Report based payment scheme for multihop wireless networks
Report based payment scheme for multihop wireless networksReport based payment scheme for multihop wireless networks
Report based payment scheme for multihop wireless networkseSAT Journals
 
Eport based payment scheme for multihop wireless networks
Eport based payment scheme for multihop wireless networksEport based payment scheme for multihop wireless networks
Eport based payment scheme for multihop wireless networkseSAT Journals
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditorijsrd.com
 
Survey on confidentiality of the user and query processing on spatial network
Survey on confidentiality of the user and query processing on spatial networkSurvey on confidentiality of the user and query processing on spatial network
Survey on confidentiality of the user and query processing on spatial networkeSAT Journals
 
Survey on reliable sla based monitoring for billing scheme in cloud computing
Survey on reliable sla based monitoring for billing scheme in cloud computingSurvey on reliable sla based monitoring for billing scheme in cloud computing
Survey on reliable sla based monitoring for billing scheme in cloud computingeSAT Journals
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...eSAT Journals
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...eSAT Publishing House
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...eSAT Journals
 

Similar to Analysis of security roaming network and privacy preserving mechanism (20)

Dynamic Routing to Alleviate Congestion with Authentication for Mobile Wirele...
Dynamic Routing to Alleviate Congestion with Authentication for Mobile Wirele...Dynamic Routing to Alleviate Congestion with Authentication for Mobile Wirele...
Dynamic Routing to Alleviate Congestion with Authentication for Mobile Wirele...
 
Irrational node detection in multihop cellular
Irrational node detection in multihop cellularIrrational node detection in multihop cellular
Irrational node detection in multihop cellular
 
Irrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting centerIrrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting center
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
IRJET- Pesudonymous and Rapid Roaming Verification using Group Signature
IRJET-  	  Pesudonymous and Rapid Roaming Verification using Group SignatureIRJET-  	  Pesudonymous and Rapid Roaming Verification using Group Signature
IRJET- Pesudonymous and Rapid Roaming Verification using Group Signature
 
Enhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hocEnhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hoc
 
Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...
 
To Improve Data Storage Security Levels in the Cloud
To Improve Data Storage Security Levels in the CloudTo Improve Data Storage Security Levels in the Cloud
To Improve Data Storage Security Levels in the Cloud
 
An assessment of cloud computing
An assessment of cloud computingAn assessment of cloud computing
An assessment of cloud computing
 
An assessment of cloud computing evolution
An assessment of cloud computing evolutionAn assessment of cloud computing evolution
An assessment of cloud computing evolution
 
Report based payment scheme for multihop wireless networks
Report based payment scheme for multihop wireless networksReport based payment scheme for multihop wireless networks
Report based payment scheme for multihop wireless networks
 
Report based payment scheme for multihop wireless networks
Report based payment scheme for multihop wireless networksReport based payment scheme for multihop wireless networks
Report based payment scheme for multihop wireless networks
 
Eport based payment scheme for multihop wireless networks
Eport based payment scheme for multihop wireless networksEport based payment scheme for multihop wireless networks
Eport based payment scheme for multihop wireless networks
 
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party AuditorSecurity Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
 
Survey on confidentiality of the user and query processing on spatial network
Survey on confidentiality of the user and query processing on spatial networkSurvey on confidentiality of the user and query processing on spatial network
Survey on confidentiality of the user and query processing on spatial network
 
Survey on reliable sla based monitoring for billing scheme in cloud computing
Survey on reliable sla based monitoring for billing scheme in cloud computingSurvey on reliable sla based monitoring for billing scheme in cloud computing
Survey on reliable sla based monitoring for billing scheme in cloud computing
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
 
1426742816
14267428161426742816
1426742816
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 

Analysis of security roaming network and privacy preserving mechanism

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 01 | Jan-2015, Available @ http://www.ijret.org 328 ANALYSIS OF SECURITY ROAMING NETWORK AND PRIVACY PRESERVING MECHANISM Ashwini A. Lokhande1 , Sonali U. Nimbhorkar2 1 Dept. of Computer Science & Engineering, G.H. Raisoni College of Engineering, Nagpur 2 Dept. of Computer Science & Engineering, G.H. Raisoni College of Engineering, Nagpur Abstract The Progression in various wireless network, such as roaming network which enables mobile subscriber to enjoy internet service anytime anywhere. Seamless roaming over wireless networks is highly desirable to mobile users, but ensuring the security and efficiency of this process is challenging. The communication systems in roaming services have special requirements and vulnerabilities, and therefore deserve special attention. Privacy-preserving authentication mechanism for Roaming services is presented in this paper. CPAL resists various security threats and provides more flexible privacy preservation compared to the existing schemes. The challenges which are unique to roaming service are discuss. The resistance against the denial of service attack in roaming service is describe. Keywords:-Roaming network, Privacy preserving, Authentication mechanism, CPAL, Denial of service Attack. ------------------------------------------------------------------***------------------------------------------------------------------- 1. INTRODUCTION With the Progression in various mobile and wireless networks, including universal mobile telecommunication systems, wireless local area networks, roadside-to-vehicle communication systems [1], and satellite networks, ubiquitous computing becomes a reality. Users can access network services anywhere and anytime. However, within the heterogeneous networks, ensuring the secure and efficient roaming service is still difficult [4], [5], because different networks have different security policies and authentication protocols. Subsequently, any secure roaming scheme committed for only one type of network technology cannot fulfill the security needs from the heterogeneous networks. In heterogeneous networks, user privacy preservation has become an important and challenging issue in the roaming service, and has been widely considered by researchers. In most existing secure roaming schemes, the privacy preservation only equates with anonymity, i.e., hiding users’ identities. However, this may not be suitable for diverse privacy needs in real world [6], [7]–[9]. Moreover, there may be a large number of mobile users that need to be revoked in the network anytime due to various reasons, e.g., when any illegal or exceptional events occur. However, the existing secure roaming schemes [9], [10] do not support this function. This will significantly increase the burden of the home authentication server and potentially reduce the efficiency of the whole network. Therefore, efficient user revocation for dynamic membership in the secure roaming services is important. The General roaming scenario for wireless networks for communication is shown in Fig. 1. It involves three parties: a roaming user U, a visited foreign server V, and a home server H of which U is a subscriber. Normally, V and H have a roaming agreement, So U can access its subscribed services through V when U is in a foreign network administered by V. Before U can access resources provided by V, an appropriate authentication process between U and V must be carried out. This process is of great importance. Fig 1 Overview of roaming services 2. RELATED WORK The existing roaming schemes for secure communication can mainly be classified into three categories: symmetric- cryptosystem-based (SCbased), asymmetric-cryptosystem- based (AC-based), and hybrid schemes. The SC-based secure roaming schemes,such as EAP-based authentication and key agreement protocols [26],[27], are designed based on standard protocols [28], [29]. SC-based schemes are mostly accepted because they are compatible with standard
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 01 | Jan-2015, Available @ http://www.ijret.org 329 protocols. However, they require the interaction between the foreign server and the home server, which may lead to the single point of failure [30], and induce large authentication transmission overhead because of the long distance between the foreign server and the home server. Jiang and Shi [31], [32] propose several mutual authentication and key exchange schemes for roaming services. In [31] and [32], public key cryptography such as digital signature and Diffie– Hellman key exchange, is adopted on the basis of SC-based Schemes, which can further enhance the security of roaming Service. The limitations of SC-based schemes have greatly stimulated the research of AC-based schemes [9], [10], [20],[33], because AC-based schemes can provide more security, stronger privacy preservation, and require fewer communication rounds. These advantages have led to the recent increasing popularity of the AC-based secure roaming schemes. One of the important security properties in the AC-based secure roaming schemes is strong user anonymity, which includes user anonymity and user untraceablility. They point that a privacy-preserving and user authentication scheme should satisfy the following requirements for communication in the roaming network: server authentication, subscription validation, provision of user revocation function, key establishment, user anonymity, and untraceablility. However, the existing privacy- preserving authentication schemes for roaming service used for communication cannot provide anonymous user linkability that makes the authorized entities, e.g., FN operators or service providers; have the ability to anonymously link the access information from the user for statistical purposes. This may not be enough for diverse applications in the roaming service. 3. CHALLENGES AND REQUIREMENTS OF SECURE ROAMING SERVICES Many security and efficiency challenges exist in roaming services, mainly due to the resource constraints of mobile users, the authentication delay constraint, and the demanding security requirements of roaming applications. A. Server Authentication: Roaming users should be allowed to authenticate the foreign server they visit to avoid potential deception and other malicious attacks. B. Subscription Validation: A visited foreign network must authenticate mobile users to ensure their legitimacy. C. Provision of User Revocation: Services to a roaming user should be terminated once its subscription period ends. D. Key Establishment: A session key should be established between a roaming user and a visited foreign server to protect subsequent data exchanged between them. E. Low Computation Complexity and Communication cost: A mobile user is generally constrained in terms of power, processing capability, and storage space. The degree of the resource limitation is different for various mobile devices (e.g., laptop PC, smart phone, PDA). Therefore, a roaming authentication process should be computationally efficient. At the same time, such a process should be fast enough to maintain persistent connectivity for mobile users. F. Basic User Anonymity and Non-Traceability: A user should be anonymous, and its activities must not be linkable by eavesdroppers. Non-linkability means that an adversary cannot link the communication activities of a particular user together and thus establish the user’s profile. G. Attack Resistance: The roaming protocol should have the ability to resist various attacks in wireless networks (e.g., denial of service [DoS] attack, replay attack, deposit case attack) such that it can be applied in the real world. 4. RESISTANCE AGAINST DOS ATTACKS To prevent the DoS attack, in roaming network for communication have suggested that the message-specific puzzles of [18] can be Incorporated into current roaming authentication protocols (e.g., [11-16]) in the following way. When a foreign server finds no evidence of the attack (e.g., the arrival rate of bogus access requests is less than a predefined threshold), it Processes access requests normally (i.e., indiscriminately). However, when it suspects itself of being attacked, it only performs expensive verification on access requests selectively. In particular, the server attaches a unique puzzle into the beacon messages and requires the solution of the puzzle to be attached to each access request message. The server commits resources to process an access request only when the solution is correct. In general, solving a puzzle requires a brute force search in the solution space, while solution verification is very fast. Additionally, puzzles are deployed in conjunction with conventional time-outs on server resources. Thus, in order to create an interruption in services, an adversary must have abundant resources to be able to promptly compute a large enough number of puzzle solutions in line with its sending rate of illegal access requests. In contrast, although puzzles slightly increase legitimate users’ computational load when the server is under attack, they are still able to Obtain network access regardless of the existence of the attack. 5. CPAL:-DESIGN GOALS Design goal to develop a CPAL (Conditional Privacy – Preserving Authentication Mechanism) for roaming service is as follows. A. Strong Anonymous Access Authentication: First, the proposed scheme should provide strong anonymous access authentication. Specifically, it requires that authentication messages, which are interacted by the MS and the VAS, have not been altered during the transmission, i.e., if the adversary A forges and/or modifies the authentication messages, the malicious operations should be detected. Meanwhile, the identity of the MS cannot be revealed to adversary A or the VAS.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 01 | Jan-2015, Available @ http://www.ijret.org 330 B. User Tracking on a Disputed Access Request: An important and challenging issue for roaming service with efficient privacy preservation is to maintain traceability for all the access messages in the presence of the anonymous access authentication. Without the tracking function, the above anonymous access authentication can only prevent an outside attack, but cannot deal with an inside one. For instance, an inside attacker could launch a Denial of Service (DoS) attack or impersonation attack, provided with no traceability by the HAC. In a DoS attack, the adversary sends a large number of fake access messages to jam the channel or to consume the rare computation resources of the VAC; while in an impersonation attack, the adversary actively pretends to be another MS to send false access request messages. C. Anonymous User Linking: In order to provide CPAL, i.e., anonymity can be flexibly or elaborately controlled according to the corresponding requirements, the network operators or service providers that are authorized by the HAC or MS can acquire MS’s statistics on the usage of services, while MS’s identity will not be revealed. D. Efficient User Revocation for Dynamic Membership: Due to some reasons (e.g., the subscription period of a user has expired or a user’s secret key has been compromised), an efficient user revocation function should be proposed, especially for dynamic membership. That means the user revocation function can revoke a group of users simultaneously, which makes the whole scheme more flexible and efficient. Meanwhile, CPAL can provide a universal secure roaming service. That means the proposed CPAL and its signaling flows can be used in any roaming scenario regardless of the type of networks that the MS is visiting. Moreover, the proposed CPAL scheme should meet all security requirements in previous schemes. 6. CONCLUSION Roaming services in wireless networks provide people with attractive flexibility and convenience for communication. A set of mechanisms to complement existing work for defending against DoS attacks, efficient authentication, flexible roaming in mobile contexts is describe here. CPAL- Condition Privacy Preserving Authentication with Access Linkability resists various security threats and provides more flexible and elaborate privacy preservation including user tracking, anonymous user linking, joining, and revocation function for dynamic membership. REFERENCES [1] Chengzhe Lai, , Hui Li, Xiaohui Liang, Rongxing Lu, Kuan Zhang, , and Xuemin Shen, ―CPAL: A Conditional Privacy- Preserving Authentication With Access Linkability for Roaming Service‖ IEEE internet of things journal, vol. 1, no. 1, february 2014. [2] Y. Soh, T. Quek, M. Kountouris, and H. Shin, “Energy efficient heterogeneous cellular networks,” IEEE J. Sel. Areas Commun., vol. 31, no. 5, pp. 840–850, May 2013. [3] Huang, X. Hong, and M. Gerla, “Situation-Aware Trust Architecture for Vehicular Networks,” IEEE Communication.. Mag., vol. 48, no. 11, 2010, pp. 128–35. [4] A. Bikos and N. Sklavos, “LTE/SAE security issues on 4G wireless networks,” IEEE Security. Privacy, vol. 11, no. 2, pp. 55–62, Mar./Apr. 2013. [5] D. He, C. Chen, J. Bu, S. Chan, and Y. Zhang, “Security and efficiency in roaming services for wireless networks: Challenges, approaches, and prospects,”IEEE Communication. Mag., vol. 51, no. 2, pp. 142–150, Feb. 2013. [6] R. Lu, X. Lin, H. Zhu, P. Ho, and X. Shen, “ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications,” in Proc. IEEE INFOCOM, 2008, pp. 1229–1237. [7] R. Lu, X. Lin, and X. Shen, “SPOC: A secure and privacy preserving opportunistic computing framework for mobile-healthcare emergency,” IEEE Trans. Parallel Distribute. Syst., vol. 24, no. 3, pp. 614–624, Mar. 2013. [8] X. Liang, X. Li, H. Luan, R. Lu, X. Lin, and X. Shen, “Morality-driven data forwarding with privacy preservation in mobile social networks,” IEEE Trans. Technol., vol. 61, no. 7, pp. 3209–3221, Sep. 2012. [9] Yang, Q. Huang, D. Wong, and X. Deng, “Universal authentication protocols for anonymous wireless communications,” IEEE Trans. Wireless Communication.., vol. 9, no. 1, pp. 168–174, Jan. 2010. [10] D. He, J. Bu, S. Chan, C. Chen, and M. Yin, “Privacy-preserving universal authentication protocol for wireless communications,” IEEE Trans. Wireless Communication.., vol. 10, no. 2, pp. 431– 436, Feb. 2011. [11] G. Yang, D. S. Wong, and X. Deng, “Anonymous and Authenticated Key Exchange for Roaming Networks,” IEEE Trans. Wireless Communication.., vol. 6, no. 9, Sept. 2007, pp. 3461–72. [12] Z. Wan, K. Ren, and B. Preneel, “A Secure Privacy- Preserving Roaming Protocol based on Hierarchical Identity- based Encryption for Mobile Networks,” Proc. ACM WiSec ’08, 2008, pp. 62–67. [13] Yang et al., “Universal Authentication Protocols for Anonymous Wireless Communications,” IEEE Trans. Wireless Communication.., vol. 9, no. 1, Jan. 2010, pp. 168–74. [14] D. He et al., “Privacy-Preserving Universal Authentication Protocol for Wireless Communications,” IEEE Trans. Wireless Communication.., vol. 10, no. 2, Feb. 2011, pp. 431– 36.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 01 | Jan-2015, Available @ http://www.ijret.org 331 [15] D. He et al., “Secure and Efficient Handover Authentication based on Bilinear Pairing Functions,” IEEE Trans. Wireless Communication.., vol. 11, no. 1, Jan. 2012, pp. 48–53. [16] D. He et al., “Handauth: Efficient Handover Authentication with Conditional Privacy for Wireless Networks,” IEEE Trans. Computers, published online 27 Dec. 2011. [17] D. He et al., “Strong Roaming Authentication Technique for Wireless and Mobile Networks,” Int’l. J. Communication. Systems, published online 4 Jan. 2012. [18] A. Juels and J. Brainard, “Client Puzzles: A Cryptographic Countermeasure against Connection Depletion Attacks,” Proc. NDSS ’99, 1999, pp. 151– 65. [19] K. Zeng, K. Govindan, and P. Mohapatra, “Non- Cryptographic Authentication and Identification in Wireless Networks,” IEEE Wireless Communication.., vol. 17, no. 5, Oct. 2010, pp. 56– 62. [20] M. Chuang, J. Lee, and M. Chen, “SPAM: A secure password authentication mechanism for seamless handover in proxy mobile IPv6 networks,” IEEE Syst. J., vol. 7, no. 1, pp. 102–113, Mar. 2013. [21] Z. Wan, K. Ren, and B. Preneel, “A secure privacy- preserving roaming protocol based on hierarchical identity-based encryption for mobile networks,” in Proc. 1st ACM Conf. Wireless Network. Security, 2008, pp. 62–67. [22] Y. Kim, W. Ren, J. Jo, Y. Jiang, and J. Zheng, “SFRIC: A secure fast roaming scheme in wireless LAN using ID-based cryptography,” in Proc. IEEE ICC, 2007, pp. 1570–1575. [23] Ren and L. Harn, “An efficient threshold anonymous authentication scheme for privacy- preserving communications,” IEEE Trans. Wireless Communication.., vol. 12, no. 3, pp. 1018–1025, Mar. 2013. [24] A.Menezes, P. V. Oorschot, and S. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL, USA: CRC press, 2010. [25] R. Lu, X. Liang, X. Li, X. Lin, and X. Shen, “EPPA: An efficient and privacy preserving aggregation scheme for secure smart grid communications,” IEEETrans. Parallel Distribute. Syst., vol. 23, no. 9, pp. 1621–1631, Sep. 2012. [26] C. Fan, Y. Lin, and R. Hsu, “Complete EAP method: User efficient and forward secure authentication protocol for IEEE 802.11 wireless LANs,” IEEE Trans. Parallel Distribute. Syst., vol. 24, no. 4, pp. 672–680,Apr. 2013 [27] M. Zhang and Y. Fang, “Security analysis and enhancements of 3GPP authentication and key agreement protocol,” IEEE Trans. Wireless Communication.., vol. 4, no. 2, pp. 734–742, Mar. 2005. [28] D. Zhang, “3GPP TS 33.401 V12.5.0, 3GPP System Architecture Evolution (SAE); Security Architecture,” Sep. 2012. [29] J. Arkko and H. Haverinen, “Extensible Authentication Protocol Method for Third Generation Authentication and Key Agreement (EAP-AKA), IETF RFC 4187,” Jan. 2006. [30] K. Dooley, Designing Large Scale LANs. Sebastopol, CA, USA: Reilly Media, 2009 [31] Y. Jiang, C. Lin, X. Shen, and M. Shi, “Mutual authentication and key exchange protocols for roaming services in wireless mobile networks,” IEEE Trans. Wireless Communication.., vol. 5, no. 9, pp. 2569–2577, Sep. 2006. [32] M. Shi, H. Rutagemwa, X. Shen, J. Mark, and A. Saleh, “A service-agent based roaming architecture for WLAN/Cellular integrated networks,” IEEE Trans. Veh. Technol., vol. 56, no. 5, pp. 3168–3181, Sep. 2007. [33] J. Ren and L. Harn, “An efficient threshold anonymous authentication scheme for privacy- preserving communications,” IEEE Trans. Wireless Communication.., vol. 12, no. 3, pp. 1018–1025, Mar. 2013.