Authentication in Ubiquitous Networking

Authentication in Ubiquitous Networking

Abdullah Mohammed Almuhaideb (College of Computer Science and IT, King Faisal University, Alahsa, Saudi Arabia) and Bala Srinivasan (Faculty of Information Technology, Monash University, Melbourne, Australia)
Copyright: © 2015 |Pages: 27
DOI: 10.4018/IJISP.2015070104
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Mobile authentication is an essential service to ensure the security of engaging parties in a ubiquitous wireless network environment. Several solutions have been proposed mainly based on both centralised and distributed authentication models to allow ubiquitous mobile access authentication; however, limitations still exist in these approaches, namely flexibility, security and performance issues and vulnerabilities. These shortcomings are influenced by the resource limitations of both wireless networks and the mobile devices together with inter-technology and inter-provider challenges. In this paper, the authors reviewed the major techniques in the field of ubiquitous mobile access authentication, which has attracted many researchers in the past decade. After investigating existing mobile authentication models and approaches, the common challenges are summarised to serve as the solution key requirements. The identified key solution requirements allow analysing and evaluating mobile authentication approaches.
Article Preview

2. Existing Models On Ubiquitous Networks Authentication

In ubiquitous networking, a mobile user is required to be authenticated to control access to network resources. Mobile user receives authentication credentials from the network provider to assist in the identification process such as Subscriber Identity Module (SIM) card for Global System for Mobile Communications (GSM) network. However, since mobile user demand is to be connected anywhere anytime, authenticating mobile users to multiple wireless technologies operated by multiple network providers is a challenge. There are a number of approaches which have been proposed to resolve this problem based on different models.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 12: 4 Issues (2018): 1 Released, 3 Forthcoming
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing