메뉴 건너뛰기




Volumn 70, Issue 4, 2013, Pages 1793-1810

GHAP: An efficient group-based handover authentication mechanism for IEEE 802.16m networks

Author keywords

Handover authentication; IEEE 802.16m; Security context transfer; WiMAX

Indexed keywords

HANDOVER AUTHENTICATIONS; IEEE 802.16M; INTERNATIONAL MOBILE TELECOMMUNICATIONS; INTERNATIONAL TELECOMMUNICATION UNIONS; MESSAGE AUTHENTICATION CODES; SECURITY CONTEXT TRANSFER; SECURITY REQUIREMENTS; SIGNAL-TO-INTERFERENCE-PLUS-NOISE RATIO;

EID: 84878562817     PISSN: 09296212     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11277-012-0781-5     Document Type: Article
Times cited : (15)

References (27)
  • 4
    • 79959303344 scopus 로고    scopus 로고
    • EKMP: An enhanced key management protocol for IEEE 802.16m
    • Cancun, Mexico, March 2011
    • Fu, A., Zhang, Y., Zhu, Z., & Feng, J. (2011). EKMP: an enhanced key management protocol for IEEE 802.16m. In Proceedings of the IEEE WCNC (pp. 1960-1965). Cancun, Mexico, March 2011.
    • (2011) Proceedings of the IEEE WCNC , pp. 1960-1965
    • Fu, A.1    Zhang, Y.2    Zhu, Z.3    Feng, J.4
  • 6
    • 77953311942 scopus 로고    scopus 로고
    • CapAuth: A capability-based handover scheme
    • San Diego, USA, March 2010
    • Cai, L., Machiraju, S., & Chen, H. (2010). CapAuth: A capability-based handover scheme. In Proceedings of the INFOCOM (pp. 1-5). San Diego, USA, March 2010.
    • (2010) Proceedings of the INFOCOM , pp. 1-5
    • Cai, L.1    MacHiraju, S.2    Chen, H.3
  • 7
    • 78649983188 scopus 로고    scopus 로고
    • A fast handover authentication mechanism based on ticket for IEEE 802.16m
    • 10.1109/LCOMM.2010.12.100818
    • Fu A., Zhang Y., Zhu Z., Liu X. (2010) A fast handover authentication mechanism based on ticket for IEEE 802.16m. IEEE Commununications Letters 14(12): 1134-1136
    • (2010) IEEE Commununications Letters , vol.14 , Issue.12 , pp. 1134-1136
    • Fu, A.1    Zhang, Y.2    Zhu, Z.3    Liu, X.4
  • 8
    • 4544274584 scopus 로고    scopus 로고
    • Hybrid multilayer mobility management with AAA context transfer capabilities for all-IP networks
    • 10.1109/MWC.2004.1325894
    • Politis C., Chew K. A., Akhtar N., Georgiades M., Tafazolli R., Dagiuklas T. (2004) Hybrid multilayer mobility management with AAA context transfer capabilities for all-IP networks. IEEE Wireless Communication 11(4): 76-88
    • (2004) IEEE Wireless Communication , vol.11 , Issue.4 , pp. 76-88
    • Politis, C.1    Chew, K.A.2    Akhtar, N.3    Georgiades, M.4    Tafazolli, R.5    Dagiuklas, T.6
  • 9
    • 33745903395 scopus 로고    scopus 로고
    • Fast re-authentication for handovers in wireless communication networks
    • Coimbra, Portugal, May 2006
    • Wienzek, R. & Persaud, R. (2006). Fast re-authentication for handovers in wireless communication networks. In Proceedings of the IFIP-TC6 Networking 2006 (pp. 556-567). Coimbra, Portugal, May 2006.
    • (2006) Proceedings of the IFIP-TC6 Networking 2006 , pp. 556-567
    • Wienzek, R.1    Persaud, R.2
  • 10
    • 70349560401 scopus 로고    scopus 로고
    • A cluster-chain-based context transfer mechanism for fast basic service set transition in the centralized wireless LAN architecture
    • 10.1002/wcm.726
    • Huang C. M., Li J. W. (2009) A cluster-chain-based context transfer mechanism for fast basic service set transition in the centralized wireless LAN architecture. Wireless Communications and Mobile Computing 9(10): 1387-1401
    • (2009) Wireless Communications and Mobile Computing , vol.9 , Issue.10 , pp. 1387-1401
    • Huang, C.M.1    Li, J.W.2
  • 11
    • 77953783779 scopus 로고    scopus 로고
    • Handoff minimization through a relay station grouping algorithm with efficient radio-resource scheduling policies for IEEE 802.16j multihop relay networks
    • 10.1109/TVT.2010.2041677
    • Yang S. R., Kao C. C., Kan W. C., Shih T. C. (2010) Handoff minimization through a relay station grouping algorithm with efficient radio-resource scheduling policies for IEEE 802.16j multihop relay networks. IEEE Transactions on Vehicular Technology 59(5): 2185-2197
    • (2010) IEEE Transactions on Vehicular Technology , vol.59 , Issue.5 , pp. 2185-2197
    • Yang, S.R.1    Kao, C.C.2    Kan, W.C.3    Shih, T.C.4
  • 12
    • 28244441893 scopus 로고    scopus 로고
    • Location management of correlated mobile users in the UMTS
    • 10.1109/TMC.2005.89
    • Gau R., Lin C. (2005) Location management of correlated mobile users in the UMTS. IEEE Transactions on Mobile Computing 4(6): 641-651
    • (2005) IEEE Transactions on Mobile Computing , vol.4 , Issue.6 , pp. 641-651
    • Gau, R.1    Lin, C.2
  • 13
    • 67649996226 scopus 로고    scopus 로고
    • Performance analysis of group handover scheme for IEEE 802.16j-enabled vehicular networks
    • Suzhou, China, April 2009
    • Shan, L., Liu, F., & Yang, K. (2009). Performance analysis of group handover scheme for IEEE 802.16j-enabled vehicular networks. In Proceedings of the advances in data and web management (pp. 653-658). Suzhou, China, April 2009.
    • (2009) Proceedings of the Advances in Data and Web Management , pp. 653-658
    • Shan, L.1    Liu, F.2    Yang, K.3
  • 14
    • 0000838441 scopus 로고    scopus 로고
    • Uses of elliptic curves in cryptography
    • Santa Barbara, USA, August 2005
    • Miller, V. (2005). Uses of elliptic curves in cryptography. In Proceedings of the CRYPTO (pp. 417-426). Santa Barbara, USA, August 2005.
    • (2005) Proceedings of the CRYPTO , pp. 417-426
    • Miller, V.1
  • 15
    • 40749151471 scopus 로고    scopus 로고
    • Adaptive hysteresis using mobility correlation for fast handover
    • 10.1109/LCOMM.2008.071316
    • Lee L., Kim D., Chung B., Yoon H. (2008) Adaptive hysteresis using mobility correlation for fast handover. IEEE Communications Letters 12(2): 152-154
    • (2008) IEEE Communications Letters , vol.12 , Issue.2 , pp. 152-154
    • Lee, L.1    Kim, D.2    Chung, B.3    Yoon, H.4
  • 16
    • 78649411023 scopus 로고    scopus 로고
    • Optimal handover decision algorithm for throughput enhancement in cooperative cellular networks
    • Ottawa, Canada, September 2010
    • Choi, H. H., Lim, J. B., Hwang, H., & Jang, K. (2010). Optimal handover decision algorithm for throughput enhancement in cooperative cellular networks. In Proceedings of the VTCfall (pp. 1-5). Ottawa, Canada, September 2010.
    • (2010) Proceedings of the VTCfall , pp. 1-5
    • Choi, H.H.1    Lim, J.B.2    Hwang, H.3    Jang, K.4
  • 19
    • 33646227667 scopus 로고    scopus 로고
    • Automated security protocol analysis with the AVISPA tool
    • 10.1016/j.entcs.2005.11.052
    • Viganò L. (2006) Automated security protocol analysis with the AVISPA tool. Electronic Notes in Theoretical Computer Science 155: 61-86
    • (2006) Electronic Notes in Theoretical Computer Science , vol.155 , pp. 61-86
    • Viganò, L.1
  • 20
    • 84878550484 scopus 로고    scopus 로고
    • AVISPA v1.1
    • AVISPA v1.1, http://www.avispa-project.org/.
  • 21
    • 79952059658 scopus 로고    scopus 로고
    • Lightweight and provably secure user authentication with anonymity for the global mobility network
    • 10.1002/dac.1158
    • Chen C., He D., Chan S., Bu J. (2011) Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems 24(3): 347-362
    • (2011) International Journal of Communication Systems , vol.24 , Issue.3 , pp. 347-362
    • Chen, C.1    He, D.2    Chan, S.3    Bu, J.4
  • 22
    • 84862821633 scopus 로고    scopus 로고
    • A simple and robust handover authentication between HeNB and eNB in LTE networks
    • 10.1016/j.comnet.2012.02.012
    • Cao J., Li H., Ma M., Zhang Y., Lai C. (2012) A simple and robust handover authentication between HeNB and eNB in LTE networks. Computer Networks 56(8): 2119-2131
    • (2012) Computer Networks , vol.56 , Issue.8 , pp. 2119-2131
    • Cao, J.1    Li, H.2    Ma, M.3    Zhang, Y.4    Lai, C.5
  • 23
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • 712376 0502.94005 10.1109/TIT.1983.1056650
    • Dolev D., Yao A. (1983) On the security of public key protocols. IEEE Transactions on Information Theory 29(2): 198-208
    • (1983) IEEE Transactions on Information Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 24
    • 26444494997 scopus 로고    scopus 로고
    • An empirical analysis of the IEEE 802.11 MAC layer handoff process
    • 10.1145/956981.956990
    • Mishra A., Shin M., Arbaugh W. (2003) An empirical analysis of the IEEE 802.11 MAC layer handoff process. ACM SIGCOMM Computer and Communication Review 33(2): 93-102
    • (2003) ACM SIGCOMM Computer and Communication Review , vol.33 , Issue.2 , pp. 93-102
    • Mishra, A.1    Shin, M.2    Arbaugh, W.3
  • 25
    • 58149131215 scopus 로고    scopus 로고
    • TUA: A novel compromise-resilient authentication system for wireless mesh networks
    • 10.1109/TWC.2008.060990
    • Lin X., Lu R., Ho P. H., Shen X., Cao Z. (2008) TUA: A novel compromise-resilient authentication system for wireless mesh networks. IEEE Transaction on Wireless Communication 7(4): 1389-1399
    • (2008) IEEE Transaction on Wireless Communication , vol.7 , Issue.4 , pp. 1389-1399
    • Lin, X.1    Lu, R.2    Ho, P.H.3    Shen, X.4    Cao, Z.5
  • 26
    • 65249105433 scopus 로고    scopus 로고
    • Handover keying and its uses
    • 10.1109/MNET.2009.4804333
    • Zheng X., Sarikaya B. (2009) Handover keying and its uses. IEEE Network 23(2): 27-34
    • (2009) IEEE Network , vol.23 , Issue.2 , pp. 27-34
    • Zheng, X.1    Sarikaya, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.