Please use this identifier to cite or link to this item: http://repository.elizadeuniversity.edu.ng/jspui/handle/20.500.12398/1174
Full metadata record
DC FieldValueLanguage
dc.contributor.authorTom, Joshua J.-
dc.contributor.authorAlese, Boniface K.-
dc.contributor.authorAdewale, Olumide S.-
dc.contributor.authorThompson, Aderonke F.-
dc.date.accessioned2021-06-28T11:37:22Z-
dc.date.available2021-06-28T11:37:22Z-
dc.date.issued2018-02-
dc.identifier.issn2278 – 0882-
dc.identifier.urihttp://repository.elizadeuniversity.edu.ng/jspui/handle/20.500.12398/1174-
dc.descriptionStaff Publicationen_US
dc.description.abstractGroup signature schemes existentially provide anonymity, non-repudiation and can make a mobile device untraceable. But using group signature only in designing anonymous key exchange system is time wasting and consumes much of other computing resources hence the use of it must be minimal especially when deployed on resources-constrained mobile devices. In .this paper, we propose the combined use of group signature because of its inherent security properties which are very important when a mobile user roams in the insecure wireless network and message authentication code to reduce the huge computational burden occasioned by group signature’s expensive public key operations resulting in unbearable authentication latency. In this paper, we built two authenticators, a signature based authenticator and a message authentication code based authenticator. These models are based on the Canetti-Krawczyk model. We implemented the design using Java 8 on Android Studio 2.2 and tested it on Genymotion based emulator on Oracle VM VirtualBox. The experiment result showed a significant reduction in the authentication time when message authentication code based authenticator was executed compared to authentication time result in the group signature based authenticator. We further compared our model with a similar model and find that ours was superior in efficiency measured from authentication latency when a user roams from his home domain to a visited network and other networks subsequently while maintaining same security characteristics.en_US
dc.language.isoenen_US
dc.publisherInternational Journal of Scientific Research Engineering & Technologyen_US
dc.subjectWireless network,en_US
dc.subjectAuthentication,en_US
dc.subjectsecurity,en_US
dc.subjectAnonymity,en_US
dc.subjectuntraceability,en_US
dc.subjectAuthentication latency,en_US
dc.subjectGroup signature,en_US
dc.subjectmessage authentication code,en_US
dc.subjectmobile device,en_US
dc.subjectVisited networken_US
dc.subjectAnonymous key exchangeen_US
dc.subjectRoamingen_US
dc.titleEfficient Anonymous Key Exchange Protocol for Roaming in Wireless Networksen_US
dc.typeArticleen_US
Appears in Collections:Research Articles

Files in This Item:
File Description SizeFormat 
EfficientAnonymousKeyExchangeProtocolforRoaminginWirelessNetworks.pdf592.05 kBAdobe PDFThumbnail
View/Open


Items in EUSpace are protected by copyright, with all rights reserved, unless otherwise indicated.