Mobile Networks and Information security
Permanent URI for this collection
Mobile Networks and Information security
Browse
Recent Submissions
- ItemData Integrity Mechanism Using Hashing Verification(2014-09-20) Hamamreh, Rushdi A.; Jamoos, Mohammed A.In this paper, we propose a new One-Way Hash Algorithm, which is also obtains better efficiency and security, compared with a particular conventional hash algorithm, Hash algorithm can be used to determine if two values are equal, a hash function maps keys to small values[1]. DILH algorithm using linear combination of matrices to find non-invertible matrix, that takes advantage about of the compact representation of a set of numbers in a matrix, and fast calculations.
- ItemSecuring End-to-End Wireless Mesh Networks Ticket-Based Authentication(2011-02-02) Hamamreh, Rushdi A.; Melhem, Anas M.Hybrid wireless mesh network (WMN) consists of two types of nodes: Mesh Routers which are relatively static and energy-rich devices, and Mesh Clients which are relatively dynamic and power constrained devices. In this paper we present a new model for WMN end-to-end security which divide authentication process into two phases: Mesh Access Point phase which based on asymmetric cryptography and Mesh Client phase which based on a server-side certificate such as EAP-TTLS and PEAP.
- ItemSWMPT: Securing Wireless Mesh Networks Protocol Based on Ticket Authentication(2011-01-06) Hamamreh, Rushdi A.; Melhem, Anas M.Wireless mesh network (WMN) consists of two parts: mesh access points which are relatively static and energy-rich devices, and mesh clients which are relatively dynamic and power constrained. In this paper, we present a new model for WMN end-to-end security which divides authentication process into two phases: Mesh Access Point which is based on asymmetric cryptography and Mesh Client which is based on a server-side certificate such as EAP-TTLS.