نتایج جستجو برای: group based handover authentication

تعداد نتایج: 3726165  

2017
Changji Wang Yuan Yuan Jiayuan Wu

Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communicati...

2009
Yoann Lopez Eric Robert

Enabling a seamless experience for mobile users while dealing with multi-access networks is a great challenge for wireless access providers. Towards this goal, the IEEE 802.21 Working Group is elaborating the needed mechanisms and the standardization effort has led to a Media Independent Handover Services (MIHS) framework that is now ready for deployment. However, no public implementation of th...

Journal: :Electronics 2022

The Internet of Vehicles (IoV) is an important supporting technology for intelligent transportation systems that connects traffic participants, such as vehicles, pedestrians, and roads, through wireless networks enables information exchange to enhance safety improve efficiency. IoV a unique network involves many security risks, which must be controlled authentication, encryption, other protecti...

Journal: :IJSN 2008
Xiaodong Lin Xinhua Ling Haojin Zhu Pin-Han Ho Xuemin Shen

In the paper, we propose an efficient two-factor localised authentication scheme for inter-domain handover and roaming in IEEE 802.11 based service-oriented wireless mesh networks (WMNs). Some important aspects, such as resource-constraint Mobile Stations (MSs) and the ping-pong movement phenomenon when handover roaming across different hotspots occurs, are considered. An analytic model is deve...

2017
Shadi Nashwan

Handover process execution without active session termination is considered one of the most important attribute in the Long Term Evolution (LTE) networks. Unfortunately, this service always is suffered from the growing of security threats. In the Inter-eNB handover, an attacker may exploit these threats to violate the user privacy and desynchronize the handover entities. Therefore, the authenti...

Journal: :Computers & Security 2009
Yu-Lun Huang P. H. Lu J. Doug Tygar Anthony D. Joseph

Handover security and efficiency have become more and more important in modern wireless network designs. In this paper, we propose a new protocol using the one-time key for user authentication. The proposed protocol can support both intra-domain and interdomain authentications efficiently. Our protocol requires five messages for intra-domain initial authentication; three for subsequent authenti...

2014
Weijia Wang Lei Hu

Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an efficient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibili...

Journal: :J. Inf. Sci. Eng. 2007
Li-Der Chou Wei-Cheng Lai Chen-Han Lin Yen-Cheng Lin Chin-Min Huang

With the increasing demand of the mobility of mobile users, seamless handover is a critical issue for heterogeneous network accesses. Improving the blocking probability of SIP calls resulting from the handoff delay is a key issue for achieving seamless handovers across WLAN and cellular networks. This paper presents an efficient scheme, based on intelligent agents, to support pre-authentication...

2013
Heba K. Aslan

Mobile WiMAX (Worldwide Interoperability Microwave Access) requires the re-authentication of mobile stations as they change from one base station to another. IEEE 802.16e uses the Extensible Authentication Protocol (EAP) for authentication and key management. This requires about 1000 ms, therefore, it could not support mobile WiMAX applications such as video conference. In the present paper, we...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید