2013
DOI: 10.1016/j.cose.2013.06.001
|View full text |Cite
|
Sign up to set email alerts
|

Efficient authentication for fast handover in wireless mesh networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
56
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(56 citation statements)
references
References 10 publications
0
56
0
Order By: Relevance
“…The mobility of user from one cluster to another cluster is the client mobility speed. The client mobility speed is compared with paper [14]. Computation cost: Computation cost is the latency time which it take to encrypt and decrypt the file when it is send from one cluster to another cluster.…”
Section: Figmentioning
confidence: 99%
See 1 more Smart Citation
“…The mobility of user from one cluster to another cluster is the client mobility speed. The client mobility speed is compared with paper [14]. Computation cost: Computation cost is the latency time which it take to encrypt and decrypt the file when it is send from one cluster to another cluster.…”
Section: Figmentioning
confidence: 99%
“…In these protocols the handover authentication does not require authentication server to be involved. The mobile clients directly authenticate via mesh points using tickets [14].…”
Section: Literature Surveymentioning
confidence: 99%
“…The wireless covering radius is 100 m. AP represents MR, whose covering radius is 45 m. TR, GW, and AP are fixed nodes. Host represents MC, which will take a movement from coordinate (10,250) to coordinate (400,250) by speed 1 m/s. During this process, host firstly accesses the coverage of AP1 and triggers the Inter-WMN authentication.…”
Section: Simulation Environmentmentioning
confidence: 99%
“…The authors in [10] present an efficient identity-based authentication scheme for WMN using tickets, which avoids multihop wireless communications in order to minimize the authentication delay, while in a complex network environment, with the increasing number of MRs, handover authentication efficiency decreases. The authors of [11] propose an authentication scheme for WMN based on EAP-TLS, although the scheme offers mutual authentication and robustness against malicious attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Celia and et al in [6] divide the authentication protocols in wireless networks into three categories: a) Multi-hop authentication [7], b) Pro-active authentication [8], and c) Ticket-based authentication [5, 9, and 10]. Multi-hop authentication protocols require that the MS must return to the AS server each time of hop for re-authentication, which may be existed very far from the MS.…”
Section: Related Workmentioning
confidence: 99%