نتایج جستجو برای: group based handover authentication

تعداد نتایج: 3726165  

Journal: :CoRR 2018
Christian Miranda Georges Kaddoum Elias Bou-Harb

Creating a secure environment for communications is becoming a significantly challenging task in 5G Heterogeneous Networks (HetNets) given the stringent latency and high capacity requirements of 5G networks. This is particularly factual knowing that the infrastructure tends to be highly diversified especially with the continuous deployment of small cells. In fact, frequent handovers in these ce...

Journal: :IEEE Internet of Things Journal 2021

2007
D. Harkins

The HOKEY WG is developing solutions for optimizations as well as security key hierarchy specifications for handovers. The key derivation specifications all draw from a trust relationship that is created as a result of a "2-party" EAP authentication between a peer and a backend server, while distributing the resulting keys to third parties other than the peer and the backend server. This docume...

2014
Alan George Mackenzie Jardine Tristan Page Rob Bethune Philippa Mourant Priya Deol Caitlin Bowden Mark Dahill Claudia Mische Naomi Cornish Victoria Sanders Joanne Lee

While it is widely recognised that communication and handover are a fundamental component in providing safe clinical care for hospital patients (1,2.3). The Royal College of Physicians found that the majority of hospital doctors are dissatisfied with the standard of their handovers (4). These findings were mirrored by the junior staff at the Royal United Hospital, who felt that the weekend hand...

Journal: :International Journal of Network Security & Its Applications 2013

2012
Ronnie D. Caytiles Yvette E. Gelogo Byungjoo Park

Mobile IPv6 is a network-layer solution to node mobility for the IPv6 Internet. It allows a mobile node to maintain a continuous connection from one access point to another. MIPv6 introduces several security vulnerabilities such as the authentication and authorization of Binding Updates (BUs) during the home agent registration process. This paper deals with securing the standard mobile IPv6 han...

Journal: :Telecommunication Systems 2013
Jung-Shian Li Kun-Hsuan Liu

Vehicle handover from one road-side unit to another is a common phenomenon in vehicular ad-hoc networks (VANETs). Authenticating vehicles effectively is the key to success of VANETs. Recently, Li and Liu proposed a lightweight identity authentication protocol for VANETs, which was claimed to integrate efficiency and security. However, in this paper, we show that their protocol is vulnerable to ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید