Wireless network security and interworking

M Shin, J Ma, A Mishra, WA Arbaugh - Proceedings of the IEEE, 2006 - ieeexplore.ieee.org
A variety of wireless technologies have been standardized and commercialized, but no
single technology is considered the best because of different coverage and bandwidth …

[图书][B] Security of mobile communications

N Boudriga - 2009 - taylorfrancis.com
The explosive demand for mobile communications is driving the development of wireless
technology at an unprecedented pace. Unfortunately, this exceptional growth is also giving …

A novel cross-layer authentication protocol for the Internet of Things

Y Lee, J Yoon, J Choi, E Hwang - IEEE Access, 2020 - ieeexplore.ieee.org
An innovative cross-layer authentication protocol that integrates cryptography-based
authentication and physical layer authentication (PLA) is proposed for massive cellular …

Key distribution

SR Carter, CB McClain - US Patent 8,731,200, 2014 - Google Patents
Yet, wireless networking also exacerbates many security and privacy issues which have
been traditionally problematic for wired networks. This is so, because any nefarious entity …

On performance analysis of challenge/response based authentication in wireless networks

W Liang, W Wang - Computer Networks, 2005 - Elsevier
The emergence of public access wireless networks enables ubiquitous Internet services,
whereas inducing more challenges of security due to open mediums. As one of the most …

A quantitative study of authentication and QoS in wireless IP networks

W Liang, W Wang - … IEEE 24th Annual Joint Conference of the …, 2005 - ieeexplore.ieee.org
With the increasing demand for secure and high-quality communications in public access
wireless IP networks, it is very important to have an in-depth understanding of the …

[PDF][PDF] A new authentication protocol for UMTS mobile networks

J Al-Saraireh, S Yousef - EURASIP Journal on wireless communications …, 2006 - Springer
This paper analyzes the authentication and key agreement (AKA) protocol for universal
mobile telecommunications system (UMTS) mobile networks, where a new protocol is …

Analysis and taxonomy of security/QoS tradeoff solutions for the future internet

A Nieto, J Lopez - Security and Communication Networks, 2014 - Wiley Online Library
Motivated by the growing convergence of diverse types of networks and the rise of concepts
such as future internet (FI), in this paper, we analyze the coexistence of security mechanisms …

One-pass EAP-AKA authentication in 3G-WLAN integrated networks

C Ntantogian, C Xenakis - Wireless personal communications, 2009 - Springer
Abstract The incorporation of Wireless Local Area Networks (WLANs) within the third
generation (3G) networks materializes the next generation of mobile/wireless systems …

Secure group key distribution in constrained environments with IKEv2

NG Felde, T Guggemos, T Heider… - … IEEE Conference on …, 2017 - ieeexplore.ieee.org
Group communication is an important means for communication in todays interconnected
world, where multiple endpoints need exchange of data in the most efficient and …