نتایج جستجو برای: Group-based handover authentication

تعداد نتایج: 3726165  

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

Journal: :Mobile Information Systems 2011
Yi-Fu Ciou Fang-Yie Leu Yi-Li Huang Kangbin Yim

In this paper, we propose a handover authentication mechanism, called the handover key management and authentication scheme (HaKMA for short), which as a three-layer authentication architecture is a new version of our previous work, the Diffie-Hellman-PKDS-based authentication method (DiHam for short), improving its key generation flow and adding a handover authentication scheme to respectively...

2013
Mojtaba Alizadeh Mohammad Hesam Tadayon Kouichi Sakurai Sabariah Baharun Hiroaki Anada Mazdak Zamani Akram M. Zeki Shehzad Ashraf Chaudhry Muhammad Khurram Khan

Proxy Mobile IPv6 (PMIPv6), a network-based mobility management protocol, has clearly different perceptions compared with host-based mobility management protocols. In PMIPv6, a mobile node (MN) is not involved in any mobility signaling as mobility service provisioning entities provide mobility services for the MN. This characteristic leads us to develop a new handover authentication scheme that...

Journal: :Computers & Security 2013
Celia Li Uyen Trang Nguyen Hoang Lan Nguyen Md. Nurul Huda

We propose new authentication protocols to support fast handover in IEEE 802.11-based wireless mesh networks. The authentication server does not need to be involved in the handover authentication process. Instead, mesh access points directly authenticate mobile clients using tickets, avoiding multi-hop wireless communications in order to minimize the authentication delay. Numerical analysis and...

2014
Kanwal Imran Saeed Mahfooz Azhar Rauf Shah Khusro HyunGon Kim

Mobility management protocols play a vital role during mobile node transmission. That’s why IETF NETLMM working group has recently presented a new approach, i-e, Proxy Mobile IPv6 (PMIPv6) which is a network-based mobility management protocol. But, PMIPv6 still suffers from the long authentication latency during the handover process. In order to improve the performance of Proxy Mobile IPv6, Hyu...

2011
Fang-Yie Leu Yi-Fu Ciou Yi-Li Huang

In this paper, we propose a handover authentication mechanism, called handover key management and authentication scheme (HaKMA), which as a three-layer authentication architecture is a new version of our previous work Diffie-Hellman-PKDS-based authentication method (DiHam for short) by improving its key generation flow and adding a handover authentication scheme to respectively speed up handove...

2014
Sung-Shiou Shen Shen-Ho Lin Jung-Hui Chiu

The demand of ubiquitous communications drives the development of advanced mobile technologies. Meanwhile, recent increases in mobile data usage and the emergence of new IP service applications constitute the motivation to integrate 3GPP cellular mobile systems with broadband WLANs. Since 3GPP and WLAN systems complement each other in terms of infrastructure and network coverage and bandwidth, ...

2010
WEN GU STAMATIOS V. KARTALOPOULOS PRAMODE K. VERMA

In this paper, we propose an end-to-end network architecture based on Worldwide Interoperability for Microwave Access (WiMAX) over Ethernet Passive Optical Network (EPON) and present a security framework adopting both RSA and Extensible Authentication Protocol (EAP) authentication. We also introduce handover scenarios in the integrated network and propose corresponding handover schemes, for whi...

Journal: :EURASIP J. Wireless Comm. and Networking 2016
Tianhan Gao Fangting Peng Nan Guo

Access security is the key obstacle of the rapid popularization of wireless mesh network (WMN). We suggest the proxy group signature scheme based on identity in this paper. This scheme is combined with proxy group signature and identity-based group signature, based on designated hierarchical proxy architecture for WMN. An anonymous mutual authentication scheme is thus achieved, which not only s...

2012
Q. Wu T. Taylor

The Handover Keying (HOKEY) Working Group seeks to minimize handover delay due to authentication when a peer moves from one point of attachment to another. Work has progressed on two different approaches to reduce handover delay: early authentication (so that authentication does not need to be performed during handover), and reuse of cryptographic material generated during an initial authentica...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید