Digital communications: fundamentals and applications
Digital communications: fundamentals and applications
ACM Transactions on Computer Systems (TOCS)
A note on the use of timestamps as nonces
ACM SIGOPS Operating Systems Review
Wireless networked communications: concepts, technology, and implementation
Wireless networked communications: concepts, technology, and implementation
Wireless information networks
Wireless and personal communications systems
Wireless and personal communications systems
Multicast security and its extension to a mobile environment
Wireless Networks
UEPS - A Second Generation Electronic Wallet
ESORICS '92 Proceedings of the Second European Symposium on Research in Computer Security
Information Security Aspects of Spread Spectrum Systems
ASIACRYPT '94 Proceedings of the 4th International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
A mobile host protocol supporting route optimization and authentication
IEEE Journal on Selected Areas in Communications
Security, payment, and privacy for network commerce
IEEE Journal on Selected Areas in Communications
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
A new efficient authentication protocol for mobile networks
Computer Standards & Interfaces
Security broker for multimedia wireless LANs
Computer Communications
Hi-index | 0.00 |
As Wireless Local Area Networks (WLANs) are rapidly deployed to expand the field of wireless products, the provision of authentication and privacy of the information transfer will be mandatory. These functions need to take into account the inherent limitations of the WLAN medium such as limited bandwidth, noisy wireless channel and limited computational power. Moreover, some of the IEEE 802.11 WLAN characteristics such as the use of a point coordinator and the polling based Point Coordination Function (PCF) have also to be considered in this design. In this paper, we introduce a security protocol for the IEEE 802.11 PCF that provides privacy and authentication, and is designed to reduce security overheads while taking into account the WLAN characteristics. We prove this protocol using the original and modified BAN logic.