نتایج جستجو برای: group based handover authentication
تعداد نتایج: 3726165 فیلتر نتایج به سال:
Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communicati...
Enabling a seamless experience for mobile users while dealing with multi-access networks is a great challenge for wireless access providers. Towards this goal, the IEEE 802.21 Working Group is elaborating the needed mechanisms and the standardization effort has led to a Media Independent Handover Services (MIHS) framework that is now ready for deployment. However, no public implementation of th...
The Internet of Vehicles (IoV) is an important supporting technology for intelligent transportation systems that connects traffic participants, such as vehicles, pedestrians, and roads, through wireless networks enables information exchange to enhance safety improve efficiency. IoV a unique network involves many security risks, which must be controlled authentication, encryption, other protecti...
In the paper, we propose an efficient two-factor localised authentication scheme for inter-domain handover and roaming in IEEE 802.11 based service-oriented wireless mesh networks (WMNs). Some important aspects, such as resource-constraint Mobile Stations (MSs) and the ping-pong movement phenomenon when handover roaming across different hotspots occurs, are considered. An analytic model is deve...
Handover process execution without active session termination is considered one of the most important attribute in the Long Term Evolution (LTE) networks. Unfortunately, this service always is suffered from the growing of security threats. In the Inter-eNB handover, an attacker may exploit these threats to violate the user privacy and desynchronize the handover entities. Therefore, the authenti...
Handover security and efficiency have become more and more important in modern wireless network designs. In this paper, we propose a new protocol using the one-time key for user authentication. The proposed protocol can support both intra-domain and interdomain authentications efficiently. Our protocol requires five messages for intra-domain initial authentication; three for subsequent authenti...
Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an efficient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibili...
With the increasing demand of the mobility of mobile users, seamless handover is a critical issue for heterogeneous network accesses. Improving the blocking probability of SIP calls resulting from the handoff delay is a key issue for achieving seamless handovers across WLAN and cellular networks. This paper presents an efficient scheme, based on intelligent agents, to support pre-authentication...
Mobile WiMAX (Worldwide Interoperability Microwave Access) requires the re-authentication of mobile stations as they change from one base station to another. IEEE 802.16e uses the Extensible Authentication Protocol (EAP) for authentication and key management. This requires about 1000 ms, therefore, it could not support mobile WiMAX applications such as video conference. In the present paper, we...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید