Overview of IEEE 802.16 Security
IEEE Security and Privacy
Mobile Information Systems
Extensible authentication protocols for IEEE standards 802.11 and 802.16
Mobility '08 Proceedings of the International Conference on Mobile Technology, Applications, and Systems
Mobile Broadband - Including WiMAX and LTE
Mobile Broadband - Including WiMAX and LTE
Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS
CISIS '10 Proceedings of the 2010 International Conference on Complex, Intelligent and Software Intensive Systems
Diffie-Hellman key based authentication in proxy mobile IPv6
Mobile Information Systems - Mobile and Wireless Networks
WiMAX Technology and Network Evolution
WiMAX Technology and Network Evolution
New directions in cryptography
IEEE Transactions on Information Theory
A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Transactions on Information Theory
IEEE Communications Magazine
Emerging Wireless and Mobile Technologies
Mobile Information Systems - Emerging Wireless and Mobile Technologies
Comprehensive protection of data-partitioned video for broadband wireless IPTV streaming
Mobile Information Systems
A methodology to counter DoS attacks in mobile IP communication
Mobile Information Systems
Flexible multi-authority attribute-based signature schemes for expressive policy
Mobile Information Systems - Advances in Network-Based Information Systems
Hi-index | 0.00 |
In this paper, we propose a handover authentication mechanism, called the handover key management and authentication scheme HaKMA for short, which as a three-layer authentication architecture is a new version of our previous work, the Diffie-Hellman-PKDS-based authentication method DiHam for short improving its key generation flow and adding a handover authentication scheme to respectively speed up the handover process and increase the security level for mobile stations MSs. AAA server supported authentication is also enhanced by invoking an improved extensible authentication protocol EAP. According to the analyses of this study the HaKMA can effectively and efficiently provide user authentication and balance data security and system performance during handover.