نتایج جستجو برای: group based handover authentication

تعداد نتایج: 3726165  

Journal: :RFC 2008
T. Charles Clancy Madjid Nakhjiri Vidya Narayanan Lakshminath R. Dondeti

This document describes the Handover Keying (HOKEY) re-authentication problem statement. The current Extensible Authentication Protocol (EAP) keying framework is not designed to support re-authentication and handovers without re-executing an EAP method. This often causes unacceptable latency in various mobile wireless environments. This document details the problem and defines design goals for ...

2012
Mohammad Faisal Muhammad Nawaz Khan

Authentication in vertical Hand over is a demanding research problem. Countless methods are commenced but all of them have insufficiencies in term of latency and packet loss. Standard handover schemes (MIPv4, MIPv6, FMIPv6, and HMIPv6) also practice these shortages when a quick handover is desirable in several genuine circumstances like MANETs, VANETs etc. This paper will evaluate the literatur...

2013
Chin-Chen Chang Ya-Chieh Huang Hao-Chuan Tsai H. C. Tsai

An increasing number of mobile users are allowed and promoted universal access over the wireless networks. Roughly speaking, an authentication mechanism is needed between mobile users and access points, also, an authenticated key is highly desirable to support secure communications in wireless networks. In addition, the anonymous property is an important security requirement, such as the inform...

Journal: :EURASIP J. Wireless Comm. and Networking 2009
Ali Al Shidhani Victor C. M. Leung

Interworking Universal Mobile Telecommunication System (UMTS) and IEEE 802.11 Wireless Local Area Networks (WLANs) introduce new challenges including the design of secured and fast handover protocols. Handover operations within and between networks must not compromise the security of the networks involved. In addition, handovers must be instantaneous to sustain the quality of service (QoS) of t...

2007
András Bohák Levente Buttyán László Dóra

In this paper, we propose an authentication scheme that is designed to reduce the authentication delay during a WiFi handover process. We observe that the largest part of the delay is due to the remote communications between the access point and the AAA Server that authorizes the access to the network. In order to eliminate remote communications, our scheme uses pre-authorization, and it pre-di...

2014
Reham Abdellatif Abouhogail

In this paper, we propose new fast handover authentication scheme with privacy preservation to improve the capabilities of IEEE 802.16m network. New metric is presented for handover authentication protocols in wireless networks. It’s the required time for base station and mobile station to detect the undesirable messages. We propose a new scheme which gives a minimum time of detection to these ...

2003
Tianwei Chen Günter Schäfer Changpeng Fan Stefan Adams Michel Sortais Adam Wolisz

Quality of Service (QoS) mechanisms in networks supporting mobile Internet communications give rise to new threats: these mechanisms could be abused by malicious entities launching so-called Denial of Service (DoS) attacks. If the network can not efficiently check the credibility of a QoS-request during a handover process, malicious entities could flood the network with bogus QoSrequests; if th...

Journal: :Int. Journal of Network Management 2009
Anne Wei Gouzhi Wei Gerard Dupeyrat

Mobile IP allows a mobile node to maintain a continuous connectivity to the Internet when moving from one access point to another. However, due to the link switching delay and to the Mobile IP handover operations, packets designated to mobile nodes can be delayed or lost during the handover period. Moreover, every time a new attach point is confirmed, the mobile node, its home agent and its cor...

Journal: :IEEE journal of radio frequency identification 2022

Drones are begin used for various purposes such as border security, surveillance, cargo delivery, visual shows and it is not possible to overcome intensive tasks with a single drone. In order expedite performing tasks, drone swarms employed. The number of drones in swarm can be high depending on the assigned duty. current solution authenticate using 5G new radio (NR) network requires execution ...

2015
T. Karpagam S. Sivakumar

Mobility of the subscriber is an important attribute to the success of a telecommunication network. With the advent of 5G networking which achieves high throughput rates by using heterogeneous nodes and frequent handovers, existing authentication and handover techniques should be revisited to securely and reliably perform handovers for LTE LTE. By virtualizing the nodes through Network Function...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید