메뉴 건너뛰기




Volumn 34, Issue 4, 2011, Pages 1160-1167

Location-based authentication protocol for first cognitive radio networking standard

Author keywords

Cognitive radio; Extensible authentication protocol; IEEE 802.22; Location based authentication

Indexed keywords

AUTHENTICATION PROTOCOLS; BROADBAND ACCESS; COGNITIVE RADIO; EXTENSIBLE AUTHENTICATION PROTOCOLS; IEEE 802.16; IEEE 802.22; KEY FACTORS; LOCATION BASED; LOCATION INFORMATION; ROBUST SECURITY; SECURITY FEATURES; SECURITY MECHANISM; SOCIETAL BENEFITS; SPARSELY POPULATED AREAS; TELEVISION BROADCASTS;

EID: 79956099414     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2010.12.017     Document Type: Article
Times cited : (22)

References (16)
  • 2
    • 52549109488 scopus 로고    scopus 로고
    • Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: A multi-dimensional analysis and assessment
    • T. Brown, and A. Sethi Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: a multi-dimensional analysis and assessment Mobile Networks and Applications 13 5 2008 516 532
    • (2008) Mobile Networks and Applications , vol.13 , Issue.5 , pp. 516-532
    • Brown, T.1    Sethi, A.2
  • 4
    • 38149046958 scopus 로고    scopus 로고
    • Defense against primary user emulation attacks in cognitive radio networks
    • R. Chen, J. Park, and J. Reed Defense against primary user emulation attacks in cognitive radio networks IEEE Journal on Selected Areas in Communications 26 1 2008 25 37
    • (2008) IEEE Journal on Selected Areas in Communications , vol.26 , Issue.1 , pp. 25-37
    • Chen, R.1    Park, J.2    Reed, J.3
  • 5
    • 39049136013 scopus 로고    scopus 로고
    • Secure access control for location-based applications in WLAN systems
    • Cho Y, Bao L, Goodrich M. Secure access control for location-based applications in WLAN systems. In: Proceedings of MASS06, 2006, p. 8527.
    • (2006) Proceedings of MASS 06 , pp. 852-857
    • Cho, Y.1    Bao, L.2    Goodrich, M.3
  • 6
    • 78751648745 scopus 로고    scopus 로고
    • A strong user authentication scheme with smart cards for wireless communications
    • 10.1016/j.comcom.2010.02.031
    • D. He, M. Ma, Y. Zhang, C. Chen, and J. Bu A strong user authentication scheme with smart cards for wireless communications Computer Communications 2010 10.1016/j.comcom.2010.02.031
    • (2010) Computer Communications
    • He, D.1    Ma, M.2    Zhang, Y.3    Chen, C.4    Bu, J.5
  • 7
    • 0035424017 scopus 로고    scopus 로고
    • Location systems for ubiquitous computing
    • DOI 10.1109/2.940014
    • J. Hightower, and G. Borriello Location systems for ubiquitous computing IEEE Computer Magazine 34 8 2001 57 66 (Pubitemid 32742945)
    • (2001) Computer , vol.34 , Issue.8 , pp. 57-66
    • Hightower, J.1    Borriello, G.2
  • 8
    • 79956130418 scopus 로고    scopus 로고
    • Mutual authentication for PKMv2
    • D. Johnston, and J. Walker Mutual authentication for PKMv2 IEEE 2004 C802.16e-04/229
    • (2004) IEEE
    • Johnston, D.1    Walker, J.2
  • 9
    • 4043087111 scopus 로고    scopus 로고
    • Improved efficient remote user authentication scheme using smart cards
    • S.W. Lee, H.S. Kim, and K.Y. Yoo Improved efficient remote user authentication scheme using smart cards IEEE Transactions on Consumer Electronics 50 2 2004 565 567
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.2 , pp. 565-567
    • Lee, S.W.1    Kim, H.S.2    Yoo, K.Y.3
  • 10
    • 44549086640 scopus 로고    scopus 로고
    • A new mutual authentication scheme based on nonce and smart cards
    • J.Y. Liu, A.M. Zhou, and M.X. Gao A new mutual authentication scheme based on nonce and smart cards Computer Communications 31 2008 2205 2209
    • (2008) Computer Communications , vol.31 , pp. 2205-2209
    • Liu, J.Y.1    Zhou, A.M.2    Gao, M.X.3
  • 11
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • DOI 10.1109/TC.2002.1004593
    • T.S. Messerges, E.A. Dabbish, and R.H. Sloan Examining smart-card security under the threat of power analysis attacks IEEE Transactions on Computers 51 5 2002 541 552 (Pubitemid 34550462)
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 15
    • 78751650849 scopus 로고    scopus 로고
    • Robust one-time password authentication scheme using smart card for home network environment
    • 10.1016/j.comcom.2010.03.013
    • B. Vaidya, J.H. Park, S. Yeo, and J.J.P.C. Rodrigues Robust one-time password authentication scheme using smart card for home network environment Computer Communications 2010 10.1016/j.comcom.2010.03.013
    • (2010) Computer Communications
    • Vaidya, B.1    Park, J.H.2    Yeo, S.3    Rodrigues, J.J.P.C.4
  • 16
    • 15744404005 scopus 로고    scopus 로고
    • An improvement of HwangLeeTangs simple remote user authentication schemes
    • E.J. Yoon, E.K. Ryu, and K.Y. Yoo An improvement of HwangLeeTangs simple remote user authentication schemes Computers & Security 24 2005 50 56
    • (2005) Computers & Security , vol.24 , pp. 50-56
    • Yoon, E.J.1    Ryu, E.K.2    Yoo, K.Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.