[PDF][PDF] Authentication protocols and techniques: a survey

A Prakash, U Kumar - Int. J. Comput. Sci. Eng, 2018 - researchgate.net
Authentication is the process of confirming the authenticity of a client to identify its validity. If
the user is valid then server permits the accessibility of its assets. Many authentication …

A formal analysis of IEEE 802.11 w deadlock vulnerabilities

M Eian, SF Mjølsnes - 2012 Proceedings IEEE INFOCOM, 2012 - ieeexplore.ieee.org
Formal methods can be used to discover obscure denial of service (DoS) vulnerabilities in
wireless network protocols. The application of formal methods to the analysis of DoS …

Finding security vulnerabilities in a network protocol using parameterized systems

A Sosnovich, O Grumberg, G Nakibly - International Conference on …, 2013 - Springer
This paper presents a novel approach to automatically finding security vulnerabilities in the
routing protocol OSPF–the most widely used protocol for Internet routing. We start by …

An Efficient Unique Tokenized Authentication Technique Based Data Offloading Approach Using Key Exchange to Maintain Data Integrity in Heterogeneous Networks

R Mandali, B Tirapathi Reddy - SN Computer Science, 2023 - Springer
In the current period, the number of mobile users is rapidly expanding with a complicated
network setup with a large amount of network traffic, which results in data overload …

Enhancing EAP-TLS authentication protocol for IEEE 802.11 i

B Shojaie, I Saberi, M Salleh - Wireless Networks, 2017 - Springer
IEEE 802.11 i authentication framework is composed of the 802.1 x and an extensible
authentication protocol (EAP) mechanism. One of the most applicable techniques in the EAP …

MAC sub-layer node authentication in OCARI

MT Hammi, E Livolant, P Bellot… - … and modeling in …, 2016 - ieeexplore.ieee.org
Wireless Sensor Networks and Industrial Internet of Things use smart, autonomous and
usually limited capacity devices in order to sense and monitor industrial environments. The …

Exception triggered DoS attacks on wireless networks

Y Zhao, S Vemuri, J Chen, Y Chen… - 2009 IEEE/IFIP …, 2009 - ieeexplore.ieee.org
Security protocols are not as secure as we assumed. In this paper, we identified a practical
way to launch DoS attacks on security protocols by triggering exceptions. Through …

Analysis of security protocols and corresponding cipher suites in ETSI M2M standards

D Adrianto, FJ Lin - 2015 IEEE 2nd World Forum on Internet of …, 2015 - ieeexplore.ieee.org
ETSI, as a standard body in telecommunication industry, has defined a comprehensive set of
common security mechanisms to protect the IoT/M2M system. They are Service …

Protocol derivation system for the Needham–Schroeder family

J Zhang, J Ma, C Yang - Security and communication networks, 2015 - Wiley Online Library
A framework consisting of the Protocol Derivation System (PDS) and the Protocol
Composition Logic (PCL) has been recently proposed by Datta et al. for the design and …

Security goals and evolving standards

JD Guttman, MD Liskov, PD Rowe - International Conference on Research …, 2014 - Springer
With security standards, as with software, we cannot expect to eliminate all security flaws
prior to publication. Protocol standards are often updated because flaws are discovered after …