Mutual Authentication Method between Wireless Mesh Enabled MSAPs in the Next-generation TICN

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Federated Authentication in Next-Generation Wireless Networks

Next-Generation (NG) Wireless Networks have been viewed as a merger of multiple wireless technologies to enable seamless ubiquitous computing with high-speed data capacities. The current authentication approaches for cellular networks, such as GSM and UMTS networks, mainly rely on one-way or mutual authentication mechanism which are employed between User and Home Environment (HE). Since the NG ...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

Reconfigurable OFDM Receiver for Next Generation Wireless Mesh

Date The final copy of this thesis has been examined by the signatories, and we find that both the content and the form meet acceptable presentation standards of scholarly work in the above mentioned discipline. Performance of current mesh networks suffer due to the lack of an intelligent physical layer. Research and development in higher layer protocols alone cannot reduce the latency and perf...

متن کامل

A Secure Mutual Authentication Protocol for Roaming in Wireless Mesh Networks

Roaming in wireless mesh networks (WMNs) requires that mobile nodes complete access authentication fast while protecting the identities of mobile nodes. In this paper, after analyzing some current authentication protocols for roaming in wireless mesh networks, we propose a new protocol based on multi-signature and three-party key agreement with a zone-based hierarchical network topology and pro...

متن کامل

Distributed User Authentication in Wireless Mesh Networks

Wireless Mesh Networks, WMNs, are foreseen to be an alternative to LANs and lastmile access infrastructures, and they have many unique characteristics, such as ease of deployment and installation, and cost efficiency. Security is crucial for WMNs to be widely accepted as internetworking and access network technologies. Access control, as a security requirement, is one of the most important pill...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Journal of Korea Information and Communications Society

سال: 2012

ISSN: 1226-4717

DOI: 10.7840/kics.2012.37b.5.385