Wireless network security and interworking
A variety of wireless technologies have been standardized and commercialized, but no
single technology is considered the best because of different coverage and bandwidth …
single technology is considered the best because of different coverage and bandwidth …
[图书][B] Security of mobile communications
N Boudriga - 2009 - taylorfrancis.com
The explosive demand for mobile communications is driving the development of wireless
technology at an unprecedented pace. Unfortunately, this exceptional growth is also giving …
technology at an unprecedented pace. Unfortunately, this exceptional growth is also giving …
A novel cross-layer authentication protocol for the Internet of Things
An innovative cross-layer authentication protocol that integrates cryptography-based
authentication and physical layer authentication (PLA) is proposed for massive cellular …
authentication and physical layer authentication (PLA) is proposed for massive cellular …
Key distribution
SR Carter, CB McClain - US Patent 8,731,200, 2014 - Google Patents
Yet, wireless networking also exacerbates many security and privacy issues which have
been traditionally problematic for wired networks. This is so, because any nefarious entity …
been traditionally problematic for wired networks. This is so, because any nefarious entity …
On performance analysis of challenge/response based authentication in wireless networks
The emergence of public access wireless networks enables ubiquitous Internet services,
whereas inducing more challenges of security due to open mediums. As one of the most …
whereas inducing more challenges of security due to open mediums. As one of the most …
A quantitative study of authentication and QoS in wireless IP networks
With the increasing demand for secure and high-quality communications in public access
wireless IP networks, it is very important to have an in-depth understanding of the …
wireless IP networks, it is very important to have an in-depth understanding of the …
[PDF][PDF] A new authentication protocol for UMTS mobile networks
J Al-Saraireh, S Yousef - EURASIP Journal on wireless communications …, 2006 - Springer
This paper analyzes the authentication and key agreement (AKA) protocol for universal
mobile telecommunications system (UMTS) mobile networks, where a new protocol is …
mobile telecommunications system (UMTS) mobile networks, where a new protocol is …
Analysis and taxonomy of security/QoS tradeoff solutions for the future internet
Motivated by the growing convergence of diverse types of networks and the rise of concepts
such as future internet (FI), in this paper, we analyze the coexistence of security mechanisms …
such as future internet (FI), in this paper, we analyze the coexistence of security mechanisms …
One-pass EAP-AKA authentication in 3G-WLAN integrated networks
C Ntantogian, C Xenakis - Wireless personal communications, 2009 - Springer
Abstract The incorporation of Wireless Local Area Networks (WLANs) within the third
generation (3G) networks materializes the next generation of mobile/wireless systems …
generation (3G) networks materializes the next generation of mobile/wireless systems …
Secure group key distribution in constrained environments with IKEv2
NG Felde, T Guggemos, T Heider… - … IEEE Conference on …, 2017 - ieeexplore.ieee.org
Group communication is an important means for communication in todays interconnected
world, where multiple endpoints need exchange of data in the most efficient and …
world, where multiple endpoints need exchange of data in the most efficient and …