The rapid progress of the wireless network technology has great convenience on the people’s life and work.
However, because of its openness, the mobility of the terminal and the changing topology, the wireless network is more
susceptible to security attacks. Authentication and key agreement is the base of the network security. The authentication
and key agreement mechanism can prevent the unauthorized user from accessing the network, resist malicious network
to deceive the lawful user, encrypt the session data by using the exchange key and provide the identification of the data
origination. Based on characteristics of the wireless network, this paper proposed a key agreement protocol for wireless
network. The authentication of protocol is based on Elliptic Curve Cryptosystems and Diffie-Hellman.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.