نتایج جستجو برای: group based handover authentication

تعداد نتایج: 3726165  

Journal: :Computers, materials & continua 2022

IPv6 over Low Power Wireless Personal Area Network (6LoWPAN) provides IP connectivity to the highly constrained nodes in Internet of Things (IoTs). 6LoWPAN allows with limited battery power and storage capacity carry datagrams lossy error-prone radio links offered by IEEE 802.15.4 standard, thus acting as an adoption layer between protocol network. The data link is based on AES (Advanced Encryp...

2006
Pyung-Soo Kim Yong-Jin Kim

This paper proposes a new authentication mechanism for vertical handover between IEEE 802.16e and 3G wireless networks. Firstly, functions of main components in the proposed mechanism are defined newly. Secondly, operation procedures of the proposed mechanism are described for two configuration cases, respectively. According to the proposed mechanism, an inter-base station protocol (IBSP) messa...

Journal: :Advances in Electrical and Computer Engineering 2013

2016
Reham Abdellatif Abouhogail

Improving the Quality of Service (QOS) for the next generation of mobile broadband wireless networks standards; IEEE802.16x becomes the main target for many new researches. This is due to the long time to complete the handover process from the old connection to the new connection in the proposed standard design. In this paper, an improvement to the IEEE 802.11based wireless mesh networks in ter...

Journal: :Journal of Systems Architecture 2023

The Internet of Vehicles (IoV) can significantly improve transportation efficiency and ensure traffic safety. Authentication is regarded as the fundamental defense line against attacks in IoV. However, state-of-the-art approaches suffer from several drawbacks, including bottlenecks single cloud server model, high computational overhead operations, excessive trust servers roadside units (RSUs), ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سمنان - دانشکده علوم انسانی 1393

learning-oriented assessment seeks to emphasise that a fundamental purpose of assessment should be to promote learning. it mirrors formative assessment and assessment for learning processes. it can be defined as actions undertaken by teachers and / or students, which provide feedback for the improvement of teaching and learning. it also contrasts with equally important measurement-focused appro...

2012
Theresa Enghardt

Large-scale 802.11 wireless networks may benefit from Openflow deployment on its Access Points and other forwarding devices combined with centralized management of data flows on an Openflow controller. The reason is that services such as authentication or routing can be provided in an easier way and more efficiently when operating on a full view of the network rather than dealing with distribut...

2008
Antonio Izquierdo Manzanares Nada Golmie Katrin Hoeper Lidong Chen

In this paper we compare different authentication techniques that may be used in order to reduce the time and resources required to perform a handover: namely, reauthentication and pre-authentication. We provide a detailed analysis of each mechanism, and highlight key performance trade-offs for select scenarios and parameters of interest.

Journal: :J. Network and Computer Applications 2018
Mohamed Amine Ferrag Leandros A. Maglaras Antonios Argyriou Dimitrios Kosmanos Helge Janicke

This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that deal with 4G and 5G communications, applications, standardization, and security. Then, we give a classification of threat models in 4G and 5G cellular networks in four categories, including, attacks again...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید