Privacy Key Management Protocols and Their Analysis in Mobile Multihop Relay WiMAX Networks
暂无分享,去创建一个
Mazlina Esa | Suleiman Zubair | Adnan Shahid Khan | Wajahat Maqbool | Sharifah Kamilah | N. Fisal | Z. A. Bakar
[1] Antonio F. Gómez-Skarmeta,et al. Providing security using IKEv2 in a vehicular network based on WiMAX technology , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).
[2] Mir Md. Saki Kowsar,et al. Shared key vulnerability in IEEE 802.16e: Analysis & solution , 2010, 2010 13th International Conference on Computer and Information Technology (ICCIT).
[3] N. Nagarajan,et al. Relay technologies and technical issues in IEEE 802.16j Mobile Multi-hop Relay (MMR) networks , 2013, J. Netw. Comput. Appl..
[4] Joseph Chee,et al. Improving Security in the IEEE 802.16 Standards , 2011, 2011 Eighth International Conference on Information Technology: New Generations.
[5] Raheel M. Hashmi,et al. Towards secure wirelessMAN: Revisiting and evaluating authentication in WiMAX , 2011, International Conference on Computer Networks and Information Technology.
[6] N. Chauhan,et al. Security Analysis of Identity Based Cryptography and Certificate Based in Wimax Network Using Omnet++ Simulator , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[7] Chin-Tser Huang,et al. Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions , 2006, 2006 3rd International Symposium on Wireless Communication Systems.
[8] Nurul Nazirah Mohd. Imam Ma'arof,et al. Security issues and modified version of PKM protocol in non-transparent multihop relay in IEEE 802.16j networks , 2011 .
[9] Masakatsu Nishigaki,et al. Advances in Information and Computer Security - 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings , 2011, IWSEC.
[10] M.P. Sebastian,et al. A Revised Secure Authentication Protocol for IEEE 802.16 (e) , 2010, 2010 International Conference on Advances in Computer Engineering.
[11] Karim Djouani,et al. SPIN-Based Verification of Authentication Protocols in WiMAX Networks , 2012, 2012 IEEE Vehicular Technology Conference (VTC Fall).
[12] Goo Yeon Lee,et al. Performance analysis of authentication and key distribution scheme for mobile multi-hop relay in IEEE 802.16j , 2011, Personal and Ubiquitous Computing.
[13] Naixue Xiong,et al. Security analysis and improvements of IEEE standard 802.16 in next generation wireless metropolitan access network , 2011, Wirel. Commun. Mob. Comput..
[14] J. Sengathir,et al. Root node attack in a WiMAX 802.16e network , 2010, Trendz in Information Sciences & Computing(TISC2010).
[15] Chin-Tser Huang,et al. Responding to Security Issues in WiMAX Networks , 2008, IT Professional.
[16] Chung-Horng Lung,et al. Design of distributed security architecture for multihop WiMAX networks , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.
[17] Naser Movahhedinia,et al. Traffic analysis for WiMAX network under DDoS attack , 2010, 2010 Second Pacific-Asia Conference on Circuits, Communications and System.
[18] Hisashi Kobayashi,et al. Modeling and analysis , 1978 .
[19] Georgios Kambourakis,et al. Attacks and Countermeasures on 802.16: Analysis and Assessment , 2013, IEEE Communications Surveys & Tutorials.