2016
DOI: 10.1002/ett.3031
|View full text |Cite
|
Sign up to set email alerts
|

On the authentication and re‐authentication protocols in LTE‐WLAN interworking architecture

Abstract: For mobile users, interworking environment composed of Long Term Evolution (LTE) and wireless local area network (WLAN) has become a practical consideration. As a prevalent technology, LTE has desirable features that support high data rate, mobile capabilities, good quality of service and wide coverage area. On the other hand, WLAN network provides higher bit rate but weaker mobility support. Additional features such as cost effectiveness on covering signal‐deadzones of LTE networks and its plentiful bandwidth… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 27 publications
(28 reference statements)
0
1
0
Order By: Relevance
“…After that, Wang proposed a fuzzy IDS scheme under the ROM without considering bilinear pairing operation. In 2017, Alezabi et al proposed a technique; however, emphasizing the authentication of entities' identities and reauthentication after renewing the entities' identities makes this method not very suitable for the different types of resource constrained devices.…”
Section: Literature Reviewmentioning
confidence: 99%
“…After that, Wang proposed a fuzzy IDS scheme under the ROM without considering bilinear pairing operation. In 2017, Alezabi et al proposed a technique; however, emphasizing the authentication of entities' identities and reauthentication after renewing the entities' identities makes this method not very suitable for the different types of resource constrained devices.…”
Section: Literature Reviewmentioning
confidence: 99%