메뉴 건너뛰기




Volumn , Issue , 2010, Pages 71-78

An identity-based authentication and key establishment scheme for multi-operator maintained wireless mesh networks

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION DELAYS; BROADBAND WIRELESS; COMMUNICATION OVERHEADS; DISTRIBUTED AUTHENTICATION; EFFICIENT AUTHENTICATION; IDENTITY BASED CRYPTOGRAPHY; IDENTITY-BASED; KEY AGREEMENT; KEY ESTABLISHMENTS; KEY ISSUES; MESH ROUTERS; MUTUAL AUTHENTICATION; PAIRWISE COMMUNICATION; WIRELESS CONNECTION;

EID: 78650966075     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MASS.2010.5663966     Document Type: Conference Paper
Times cited : (19)

References (23)
  • 1
    • 13844296355 scopus 로고    scopus 로고
    • Wireless mesh networks: A survey
    • I. F. Akyildiz, X. Wang, and W. Wang, "Wireless mesh networks: a survey," Comput. Netw. ISDN Syst., vol. 47, no. 4, pp. 445-487, 2005.
    • (2005) Comput. Netw. ISDN Syst. , vol.47 , Issue.4 , pp. 445-487
    • Akyildiz, I.F.1    Wang, X.2    Wang, W.3
  • 2
    • 58149108946 scopus 로고    scopus 로고
    • An efficient mobile authentication scheme for wireless networks
    • April
    • C. Tang and D. Wu, "An efficient mobile authentication scheme for wireless networks," Wireless Communications, IEEE Transactions on, vol. 7, no. 4, pp. 1408-1416, April 2008.
    • (2008) Wireless Communications, IEEE Transactions on , vol.7 , Issue.4 , pp. 1408-1416
    • Tang, C.1    Wu, D.2
  • 11
    • 34547545598 scopus 로고    scopus 로고
    • A secure authentication and billing architecture for wireless mesh networks
    • Y. Zhang and Y. Fang, "A secure authentication and billing architecture for wireless mesh networks," Wirel. Netw., vol. 13, no. 5, pp. 663-678, 2007.
    • (2007) Wirel. Netw. , vol.13 , Issue.5 , pp. 663-678
    • Zhang, Y.1    Fang, Y.2
  • 12
    • 77954083903 scopus 로고    scopus 로고
    • How to secure multi-domain wireless mesh networks
    • [Online]. Available
    • X. Zhu, Y. Fang, and Y. Wang, "How to secure multi-domain wireless mesh networks," Wireless Networks, vol. 16, pp. 1215-1222, 2010. [Online]. Available: http://dx.doi.org/10.1007/s11276-009-0198-6
    • (2010) Wireless Networks , vol.16 , pp. 1215-1222
    • Zhu, X.1    Fang, Y.2    Wang, Y.3
  • 14
    • 51849119157 scopus 로고    scopus 로고
    • A sophisticated privacy-enhanced yet accountable security framework for metropolitan wireless mesh networks
    • Washington, DC, USA: IEEE Computer Society
    • K. Ren and W. Lou, "A sophisticated privacy-enhanced yet accountable security framework for metropolitan wireless mesh networks," in ICDCS '08: Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems. Washington, DC, USA: IEEE Computer Society, 2008, pp. 286-294.
    • (2008) ICDCS '08: Proceedings of the 2008 the 28th International Conference on Distributed Computing Systems , pp. 286-294
    • Ren, K.1    Lou, W.2
  • 15
    • 51849141536 scopus 로고    scopus 로고
    • A novel localised authentication scheme in ieee 802.11 based wireless mesh networks
    • X. Lin, X. Ling, H. Zhu, P. Ho, and X. S. Shen, "A novel localised authentication scheme in ieee 802.11 based wireless mesh networks," Int. J. Secur. Netw., vol. 3, no. 2, pp. 122-132, 2008.
    • (2008) Int. J. Secur. Netw. , vol.3 , Issue.2 , pp. 122-132
    • Lin, X.1    Ling, X.2    Zhu, H.3    Ho, P.4    Shen, X.S.5
  • 17
    • 55149100626 scopus 로고    scopus 로고
    • Slab: Secure localized authentication and billing scheme for wireless mesh networks
    • H. Zhu, X. Lin, S. Member, R. Lu, P. han Ho, and X. Shen, "Slab: Secure localized authentication and billing scheme for wireless mesh networks," IEEE Trans. Wireless Commun, pp. 3858-3868, 2008.
    • (2008) IEEE Trans. Wireless Commun , pp. 3858-3868
    • Zhu, H.1    Lin, X.2    Member, S.3    Lu, R.4    Han Ho, P.5    Shen, X.6
  • 18
    • 42649093474 scopus 로고    scopus 로고
    • Optimizing deployment of internet gateway in wireless mesh networks
    • B. He, B. Xie, and D. P. Agrawal, "Optimizing deployment of internet gateway in wireless mesh networks," Computer Communications, vol. 31, no. 7, pp. 1259-1275, 2008.
    • (2008) Computer Communications , vol.31 , Issue.7 , pp. 1259-1275
    • He, B.1    Xie, B.2    Agrawal, D.P.3
  • 19
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • New York, NY, USA: Springer-Verlag New York, Inc.
    • A. Shamir, "Identity-based cryptosystems and signature schemes," in Proceedings of CRYPTO 84 on Advances in cryptology. New York, NY, USA: Springer-Verlag New York, Inc., 1985, pp. 47-53.
    • (1985) Proceedings of CRYPTO 84 on Advances in Cryptology , pp. 47-53
    • Shamir, A.1
  • 22
    • 84957001208 scopus 로고    scopus 로고
    • Entity authentication and authenticated key transport protocols employing asymmetric techniques
    • London, UK: Springer-Verlag
    • S. Blake-Wilson and A. Menezes, "Entity authentication and authenticated key transport protocols employing asymmetric techniques," in Proceedings of the 5th International Workshop on Security Protocols. London, UK: Springer-Verlag, 1998, pp. 137-158.
    • (1998) Proceedings of the 5th International Workshop on Security Protocols , pp. 137-158
    • Blake-Wilson, S.1    Menezes, A.2
  • 23
    • 0032676481 scopus 로고    scopus 로고
    • Enhanced privacy and authentication for the global system for mobile communications
    • C.-H. Lee, M.-S. Hwang, and W.-P. Yang, "Enhanced privacy and authentication for the global system for mobile communications," Wirel. Netw., vol. 5, no. 4, pp. 231-243, 1999.
    • (1999) Wirel. Netw. , vol.5 , Issue.4 , pp. 231-243
    • Lee, C.-H.1    Hwang, M.-S.2    Yang, W.-P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.