Mobile Networks and Information security

Permanent URI for this collection

Mobile Networks and Information security

Browse

Recent Submissions

Now showing 1 - 3 of 3
  • Item
    Data Integrity Mechanism Using Hashing Verification
    ( 2014-09-20) Hamamreh, Rushdi A. ; Jamoos, Mohammed A.
    In this paper, we propose a new One-Way Hash Algorithm, which is also obtains better efficiency and security, compared with a particular conventional hash algorithm, Hash algorithm can be used to determine if two values are equal, a hash function maps keys to small values[1]. DILH algorithm using linear combination of matrices to find non-invertible matrix, that takes advantage about of the compact representation of a set of numbers in a matrix, and fast calculations.
  • Item
    Securing End-to-End Wireless Mesh Networks Ticket-Based Authentication
    ( 2011-02-02) Hamamreh, Rushdi A. ; Melhem, Anas M.
    Hybrid wireless mesh network (WMN) consists of two types of nodes: Mesh Routers which are relatively static and energy-rich devices, and Mesh Clients which are relatively dynamic and power constrained devices. In this paper we present a new model for WMN end-to-end security which divide authentication process into two phases: Mesh Access Point phase which based on asymmetric cryptography and Mesh Client phase which based on a server-side certificate such as EAP-TTLS and PEAP.
  • Item
    SWMPT: Securing Wireless Mesh Networks Protocol Based on Ticket Authentication
    ( 2011-01-06) Hamamreh, Rushdi A. ; Melhem, Anas M.
    Wireless mesh network (WMN) consists of two parts: mesh access points which are relatively static and energy-rich devices, and mesh clients which are relatively dynamic and power constrained. In this paper, we present a new model for WMN end-to-end security which divides authentication process into two phases: Mesh Access Point which is based on asymmetric cryptography and Mesh Client which is based on a server-side certificate such as EAP-TTLS.