This paper proposes a security management system for mobile networks. Since the access network can independently authenticate roaming users, the system is called Independent Security Management (ISM). Based on ISM, a roaming user authentication protocol is designed. Through comparative analysis of the protocols, it can be seen that compared with other security management systems, the outstanding advantages of ISM are clear division of security responsibilities and high authentication efficiency.
You Might Like
Recommended ContentMore
Open source project More
Popular Components
Searched by Users
Just Take a LookMore
Trending Downloads
Trending ArticlesMore