Efficient pre-authentication scheme for inter-ASN handover in high mobility MANET
暂无分享,去创建一个
[1] Wei Li,et al. Detection and Prevention of Attacks in MANETs by Improving the EAACK Protocol , 2018, SoutheastCon 2018.
[2] Timothy X. Brown,et al. Denial of service vulnerabilities in the 802.16 protocol , 2008, WICON 2008.
[3] Candelaria Hernández-Goya,et al. Self-organized authentication in mobile ad-hoc networks , 2009, Journal of Communications and Networks.
[4] Mazleena Salleh,et al. A novel authentication scheme for mobile environments in the context of Elliptic Curve Cryptography , 2015, 2015 International Conference on Computer, Communications, and Control Technology (I4CT).
[5] Liang Hong,et al. Secure OLSR , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[6] Tanapat Ruengsatra,et al. ETC: Effective trustworthy communication with two-mode authentication for disaster recovery , 2014, 2014 10th International Conference on Information Assurance and Security.
[7] S. Duraisamy,et al. A trust system in manet with secure key authentication mechanism , 2012, 2012 International Conference on Recent Trends in Information Technology.
[8] Tao Zhang,et al. MPA assisted optimized proactive handoff scheme , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[9] David Q. Liu,et al. Extensible authentication protocols for IEEE standards 802.11 and 802.16 , 2008, Mobility '08.
[10] Hakima Chaouchi,et al. Light and distributed AAA scheme for mobile ad-hoc networks , 2008 .
[11] Oivind Kure,et al. Secure Extension to the OLSR protocol , 2004 .
[12] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[13] Zhu Xingliang,et al. A new authentication scheme for Wireless Ad Hoc Network , 2012, 2012 International Conference on Information Management, Innovation Management and Industrial Engineering.
[14] G.Q. Maguire,et al. MIPMANET-mobile IP for mobile ad hoc networks , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).
[15] Naser Movahhedinia,et al. Traffic analysis for WiMAX network under DDoS attack , 2010, 2010 Second Pacific-Asia Conference on Circuits, Communications and System.
[16] Jodie Wetherall,et al. SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks , 2017, IEEE Transactions on Mobile Computing.
[17] Thuc Dinh Nguyen,et al. Attacks on Low Private Exponent RSA: An Experimental Study , 2013, 2013 13th International Conference on Computational Science and Its Applications.
[18] Hisham Dahshan,et al. Authenticated symmetric key distribution for mobile ad hoc networks , 2008, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[19] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[20] Larry J. Blunk,et al. PPP Extensible Authentication Protocol (EAP) , 1998, RFC.
[21] Atul Negi,et al. Authentication and dynamic key management protocol based on certified tokens for manets , 2009, 2009 Global Mobile Congress.
[22] Ravilla Dilli,et al. Implementation of security features in MANETs using SHA-3 standard algorithm , 2016, 2016 International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS).
[23] Abdellah Jamali,et al. Lightweight authentication-based scheme for AODV in ad-hoc networks , 2017, 2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS).
[24] Mayank Sharma,et al. Multilevel authentication for resource allotment in MANET , 2014, 2014 Conference on IT in Business, Industry and Government (CSIBIG).
[25] B. Ramesh,et al. Design of biometric authentication technique for MANET based emergency response system , 2015, 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT).
[26] Yi-Bing Lin,et al. An efficient identity-based cryptosystem for end-to-end mobile security , 2006, IEEE Transactions on Wireless Communications.
[27] William A. Arbaugh,et al. Proactive key distribution using neighbor graphs , 2004, IEEE Wireless Communications.
[28] N. R. Sunitha,et al. Secure Ad-Hoc On-demand Distance Vector routing using identity based symmetric key management , 2016, 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).
[29] Georgios Kambourakis,et al. Attacks and Countermeasures on 802.16: Analysis and Assessment , 2013, IEEE Communications Surveys & Tutorials.
[30] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.
[31] Jeong Hyun Yi,et al. Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs , 2009, IEEE Transactions on Parallel and Distributed Systems.
[32] M. Ellcy Priana. Trust based Clustering and Secure Authentication for Multicast in AD-Hoc Network , 2014 .
[33] Yanghee Choi,et al. FAST INTER-AP HANDOFF USING PREDICTIVE AUTHENTICATION SCHEME IN A PUBLIC WIRELESS LAN , 2002 .
[34] K.A. Nusrath Ali,et al. MANIPSEC - IPSEC in Mobile Ad-hoc Networks , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[35] Maryline Laurent-Maknavicius,et al. Authentication protocol runtime evaluation in distributed AAA framework for Mobile Ad-Hoc Networks , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.
[36] Bernard Aboba,et al. Extensible Authentication Protocol (EAP) , 2004, RFC.
[37] Antonio F. Gómez-Skarmeta,et al. Pre-Authentication Based Enhancement for Access Control in Hybrid MANETs , 2007, 2007 12th IEEE Symposium on Computers and Communications.
[38] Hung-Min Sun,et al. Secure and fast handover scheme based on pre- authentication method for 802.16/WiMAX infrastructure networks , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.
[39] S. Rajaram,et al. PKMv2 - EAP authentication cost reduction of mobile WiMAX network entry process by the proposed key caching mechanisms , 2012 .
[40] Tim Dierks,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .
[41] Joseph Chee,et al. Improving Security in the IEEE 802.16 Standards , 2011, 2011 Eighth International Conference on Information Technology: New Generations.
[42] Thuy Ngoc Nguyen,et al. Enhanced EAP-Based Pre-Authentication for Fast and Secure Inter-ASN Handovers in Mobile WiMAX Networks , 2012, IEEE Transactions on Wireless Communications.
[43] Dilli Ravilla,et al. Implementation of HMAC-SHA256 algorithm for hybrid routing protocols in MANETs , 2015, 2015 International Conference on Electronic Design, Computer Networks & Automated Verification (EDCAV).
[44] P. Caballero-Gil,et al. Authentication and Encryption for a Robotic Ad Hoc Network Using Identity-Based Cryptography , 2018, 2018 4th International Conference on Big Data Innovations and Applications (Innovate-Data).
[45] Silvio Micali,et al. How to Prove all NP-Statements in Zero-Knowledge, and a Methodology of Cryptographic Protocol Design , 1986, CRYPTO.