Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
暂无分享,去创建一个
Abbas Jamalipour | Fazirulhisyam Hashim | Borhanuddin Mohd Ali | Kamal Ali Alezabi | Shaiful J. Hashim | A. Jamalipour | F. Hashim | S. Hashim | B. Ali | K. A. Alezabi
[1] Jianfeng Ma,et al. A USIM-Based Uniform Access Authentication Framework in Mobile Communication , 2011, EURASIP J. Wirel. Commun. Netw..
[2] Abbas Jamalipour,et al. On the authentication and re‐authentication protocols in LTE‐WLAN interworking architecture , 2017, Trans. Emerg. Telecommun. Technol..
[3] Shaiful Jahari Hashim,et al. A new tunnelled EAP based authentication method for WiMAX networks , 2013, 2013 IEEE 11th Malaysia International Conference on Communications (MICC).
[4] Adão Silva,et al. Power allocation strategies for distributed precoded multicell based systems , 2011, EURASIP J. Wirel. Commun. Netw..
[5] Quynh H. Dang,et al. Secure Hash Standard | NIST , 2015 .
[6] Kuei-Li Huang,et al. A Fast Authentication Scheme for WiMAX–WLAN Vertical Handover , 2013, Wirel. Pers. Commun..
[7] Hilde van der Togt,et al. Publisher's Note , 2003, J. Netw. Comput. Appl..
[8] Li Xu,et al. An anonymous batch handover authentication protocol for big flow wireless mesh networks , 2018, EURASIP Journal on Wireless Communications and Networking.
[9] Tai-Myoung Chung,et al. A Traffic Analysis of Authentication Methods for Proxy Mobile IPv6 , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).
[10] Peter Kruus,et al. CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .
[11] Victor C. M. Leung,et al. Fast and Secure Reauthentications for 3GPP Subscribers during WiMAX-WLAN Handovers , 2011, IEEE Transactions on Dependable and Secure Computing.
[12] Jari Arkko,et al. Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA') , 2009, RFC.
[13] Pejman Roshan,et al. 802.11 Wireless LAN Fundamentals , 2004 .
[14] Ahmed A. Abdel Hafez,et al. New Authentication and Key Agreement Protocol for LTE-WLAN Interworking , 2013 .
[15] T. Charles Clancy,et al. Handover Key Management and Re-Authentication Problem Statement , 2008, RFC.
[16] Mourad Debbabi,et al. A secure, efficient, and cost-effective distributed architecture for spam mitigation on LTE 4G mobile networks , 2013, Secur. Commun. Networks.
[17] Noureddine Zahid,et al. A new fast re-authentication method for the 3G-WLAN interworking based on EAP-AKA , 2013, ICT 2013.
[18] Garima Singh,et al. A privacy-preserving authentication protocol with secure handovers for the LTE/LTE-A networks , 2018, Sādhanā.
[19] Ian F. Akyildiz,et al. Intersystem location update and paging schemes for multitier wireless networks , 2000, MobiCom '00.
[20] Liping Zhang,et al. An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks , 2016, J. Netw. Comput. Appl..
[21] Willy Susilo,et al. Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment , 2020, IEEE Transactions on Dependable and Secure Computing.
[22] Jung-Hui Chiu,et al. Fast Handover Pre-Authentication Protocol in 3GPP-WLAN Heterogeneous Mobile Networks , 2014 .
[23] Martin Nilsson,et al. Investigating the energy consumption of a wireless network interface in an ad hoc networking environment , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[24] James H. Burrows,et al. Secure Hash Standard , 1995 .
[25] John Linn,et al. The Kerberos Version 5 GSS-API Mechanism , 1996, RFC.
[26] Noureddine Zahid,et al. An Efficient Authentication Protocol for 5G Heterogeneous Networks , 2017, UNet.
[27] Russ Housley,et al. Guidance for Authentication, Authorization, and Accounting (AAA) Key Management , 2007, RFC.
[28] Luo Hong. JAVA Security Architecture , 2000 .
[29] G. J. A. Stern,et al. Queueing Systems, Volume 2: Computer Applications , 1976 .
[30] V. Muthukkumarasamy,et al. EAP-CRA for WiMAX, WLAN and 4G LTE Interoperability , 2013 .
[31] Todor Cooklev,et al. Air Interface for Fixed Broadband Wireless Access Systems , 2004 .
[32] Jin Cao,et al. EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks , 2018, J. Netw. Comput. Appl..
[33] Jung-Hui Chiu,et al. The performance evaluation of fast iterative localized re-authentication for 3G/UMTS-WLAN interworking networks , 2013, J. Ambient Intell. Humaniz. Comput..
[34] Jari Arkko,et al. Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA) , 2006, RFC.
[35] Shaiful Jahari Hashim,et al. An efficient authentication and key agreement protocol for 4G (LTE) networks , 2014, 2014 IEEE REGION 10 SYMPOSIUM.
[36] Rongxing Lu,et al. EAPSG: Efficient authentication protocol for secure group communications in maritime wideband communication networks , 2015, Peer Peer Netw. Appl..