ACM Transactions on Computer Systems (TOCS)
The Logic of Authentication Protocols
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
EAP methods for wireless networks
Computer Standards & Interfaces
Kerberized handover keying: a media-independent handover key management architecture
Proceedings of 2nd ACM/IEEE international workshop on Mobility in the evolving internet architecture
USIM-based EAP-TLS authentication protocol for wireless local area networks
Computer Standards & Interfaces
Roaming across wireless local area networks using SIM-based authentication protocol
Computer Standards & Interfaces
On performance analysis of challenge/response based authentication in wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
An efficient user authentication and key exchange protocol for mobile client-server environment
Computer Networks: The International Journal of Computer and Telecommunications Networking
An inter-domain authentication scheme for pervasive computing environment
Computers & Mathematics with Applications
Lightweight Secure Roaming Mechanism Between GPRS/UMTS and Wireless LANs
Wireless Personal Communications: An International Journal
Provably secure and efficient authentication techniques for the global mobility network
Journal of Systems and Software
A lightweight mutual authentication mechanism for network mobility in IEEE 802.16e wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
To guarantee stable convenience and feasibility of the widely applied wireless network, the handover technique is playing an important role nowadays to meet the epidemic mobile device usage. As is known, the wireless network authentication protocol can decide security for whole operating scheme and help protect rights of legal users, while there are still some flaws that prevent entire architecture from working favorably. Considering such flaws including computation overload as well as the key management burden, we propose a brand new authentication protocol to ensure secure message transmission and reduce computation overload. The proposed mechanism can be used both in the intra-domain and inter-domain, catering to the aim of decreasing management burden for the key distribution center and expediting the validation process efficiently. Furthermore, we provide the formal security analysis of BAN logic to demonstrate the applicability of the protocol.