Smart card security and applications
Smart card security and applications
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
Security analysis on public wireless internet service models
Proceedings of the 3rd ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Mobility Patterns in Microcellular Wireless Networks
IEEE Transactions on Mobile Computing
A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols
IEEE Transactions on Mobile Computing
Public key cryptography in sensor networks—revisited
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Impact of handoff protection strategies on cellular mobile system capacity
IEEE Transactions on Wireless Communications
IEEE Communications Magazine
Distributed call admission control in mobile/wireless networks
IEEE Journal on Selected Areas in Communications
IEEE Transactions on Wireless Communications
Trust Agreement in Wireless Mesh Networks
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
Wireless telemedicine and m-health: technologies, applications and research issues
International Journal of Sensor Networks
A survey of security visualization for computer network logs
Security and Communication Networks
Security and Communication Networks
Identity-Based key derivation method for low delay inter-domain handover re-authentication service
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
A review of GENI authentication and access control mechanisms
International Journal of Security and Networks
A generic authentication protocol for wireless body area networks
BodyNets '13 Proceedings of the 8th International Conference on Body Area Networks
Hi-index | 0.00 |
In the paper, we propose an efficient two-factor localised authentication scheme for inter-domain handover and roaming in IEEE 802.11 based service-oriented wireless mesh networks (WMNs). Some important aspects, such as resource-constraint Mobile Stations (MSs) and the ping-pong movement phenomenon when handover roaming across different hotspots occurs, are considered. An analytic model is developed to investigate the efficiency of the proposed scheme. Numerical results are given to demonstrate the superiority of the proposed scheme in terms of the resultant signalling overhead, power consumption, and authentication latency, compared with the legacy authentication schemes without losing the capability of preserving the system security.