Filters








590 Hits in 5.9 sec

An Efficient Authentication Method for Secure Access to Wireless Mesh Networks
무선망 보안 접속을 위한 효율적인 인증 기법

Ung Heo, Yu-Shan He, Kang-Soo You, Jae-Ho Choi
2011 The Journal of the Korea Contents Association  
The wireless mesh networks are recently getting much attention for commercial applications.  ...  In such networks, the service should be uninterrupted when roaming from one domain to another while the authentication for a secure access should be maintained.  ...  The mesh Fig. 1 . 1 Wireless mesh network Fig. 2 . 2 Simple roaming architecture domain.  ... 
doi:10.5392/jkca.2011.11.9.017 fatcat:inz34zae3bgu3ocsdqifl72fru

Evolution of Various Authentication Schemes in Wireless Network over a Decade

Pratik Singh, Bhawna Mallick
2015 International Journal of Computer Applications  
This paper, focus on the authentication schemes in wireless network that have evolved in last one a decade.  ...  Openness of wireless network makes it more sensible for various security attacks. Authentication is the most vital procedure to make sure that the service is appropriately used.  ...  Authentication is required in every field of networks such as sensor network (WSN), mobile ad-hoc networks (MANETs), vehicular ad-hoc networks (VANETs), roaming or hand-off process, WLAN; wireless mesh  ... 
doi:10.5120/ijca2015905516 fatcat:zay3sbwkgvebxk3aol6phbuaea

A Fast Handoff Technique in Wireless Mesh Network (FHT for WMN)

Geetanjali Rathee, Hemraj Saini
2016 Procedia Computer Science  
in order to get the network services.  ...  When a mesh client leaves the range of serving mesh router and searches for accessing a new router based on good SNR (Signal to Noise) ratio, a handoff procedure takes place.  ...  Introduction Wireless Mesh Network (WMN) is a new cohort network that has occurred recently. It is a mishmash of ad-hoc and mesh networks 1 .  ... 
doi:10.1016/j.procs.2016.03.095 fatcat:jpn54doqhjgf5kri3yt6xw2yyi

A heterogeneity-aware framework for group key management in wireless mesh networks

Xia Wang, Johnny Wong, Wensheng Zhang
2008 Proceedings of the 4th international conference on Security and privacy in communication netowrks - SecureComm '08  
In this work we proposed a novel heterogeneity-aware group key management framework (HAGK) for wireless mesh networks (WMNs).  ...  In our framework a WMN multicast session involves both stationary backbone nodes and mobile client nodes: for backbone nodes which are topologically-stable but may spread over a large area, the distributed  ...  This material is based upon work supported in part by the National Science Foundation under Grant No. 0540362.  ... 
doi:10.1145/1460877.1460918 dblp:conf/securecomm/WangW008 fatcat:tmxwrjrqkvbcbghfczzaljtbj4

User-Centric Networking: Living-Examples and Challenges Ahead [chapter]

Rute Sofia, Paulo Mendes, Waldir Moreira
2014 User-Centric Networking  
The paper provides also a set of guidelines concerning the deployment of future usercentric networking models, having in mind to assist in the integration of these models into future Internet architectures  ...  This paper provides a description of operational examples of User-centric networking models, providing a specific characterization of their main features.  ...  Generic Operation To setup a new wireless CuWin mesh network in a given community Bob must first download CuWin software [3] or acquire the CuWIN kit.  ... 
doi:10.1007/978-3-319-05218-2_2 fatcat:xjx2nylh25evhnjcfmm4nnldpm

A New Roaming Authentication Framework For Wireless Communication

2013 KSII Transactions on Internet and Information Systems  
Roaming authentication protocol is widely used in wireless network which can enable a seamless service for the mobile users.  ...  All the authentications proposed in this paper can be regarded as a common construction and can be applied to various kinds of wireless networks such as Cellular Networks, Wireless Mesh Networks and Vehicle  ...  The new authentication protocol for roaming service with strong anonymity Use-To-User Authentication Extension User-to-user authentication are often used in Wireless Mesh Networks (WMNs) [7] or in  ... 
doi:10.3837/tiis.2013.08.018 fatcat:xikltr77wnd5hdta7nmrbi4mfi

Survey of Security Requirements, Attacks and Network Integration in Wireless Mesh Networks

Hassen Redwan, Ki-Hyung Kim
2008 2008 New Technologies, Mobility and Security  
So far the security issue in wireless mesh networking has rarely been addressed.  ...  Finally, a possible application scenario based on our proposed model is described. Index Terms-wireless network security, wireless mesh network, security attacks, wireless network integration  ...  INTRODUCTION Wireless mesh networking has appeared as a new and promising wireless networking environment for next generation wireless networks.  ... 
doi:10.1109/ntms.2008.ecp.94 dblp:conf/ntms/RedwanK08 fatcat:nqx4xicg65guvf3tuh46xfmfxe

Efficient authentication for fast handover in wireless mesh networks

Celia Li, Uyen Trang Nguyen, Hoang Lan Nguyen, Nurul Huda
2013 Computers & security  
Network security Authentication Mobile devices Hand-over Hand-off Key management Privacy a b s t r a c t We propose new authentication protocols to support fast handover in IEEE 802.11-based wireless mesh  ...  Instead, mesh access points directly authenticate mobile clients using tickets, avoiding multi-hop wireless communications in order to minimize the authentication delay.  ...  MAPÀMAP: Any two neighboring MAPs trust each other via their public key certificates. This trust allows a client to roam among different MAPs in a mesh network.  ... 
doi:10.1016/j.cose.2013.06.001 fatcat:t3vzvhbx6ne33h3jczefol5qsq

Survey of Security Requirements, Attacks and Network Integration in Wireless Mesh Networks

Hassen Redwan, Ki-Hyung Kim
2008 2008 Japan-China Joint Workshop on Frontier of Computer Science and Technology  
So far the security issue in wireless mesh networking has rarely been addressed.  ...  Finally, a possible application scenario based on our proposed model is described. Index Terms-wireless network security, wireless mesh network, security attacks, wireless network integration  ...  INTRODUCTION Wireless mesh networking has appeared as a new and promising wireless networking environment for next generation wireless networks.  ... 
doi:10.1109/fcst.2008.15 dblp:conf/fcst/RedwanK08 fatcat:qyqkyqdolbcc3okj74e7xzwpmi

A New Ticket-Based Authentication Mechanism for Fast Handover in Mesh Network

Yan-Ming Lai, Pu-Jen Cheng, Cheng-Chi Lee, Chia-Yi Ku, Muhammad Khurram Khan
2016 PLoS ONE  
Wireless Mesh Network.  ...  In 2013, Li et al. proposed a fast handover authentication mechanism for wireless mesh network (WMN) based on tickets. Unfortunately, Li et al.'s work came with some weaknesses.  ...  The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript. Author Contributions  ... 
doi:10.1371/journal.pone.0155064 pmid:27171160 pmcid:PMC4865210 fatcat:76yhnvss2jdpvjx6y7tki7gjwi

Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks [chapter]

Jaydip Sen
2012 Applied Cryptography and Network Security  
Authentication Protocols for Wireless Mesh Networks  ...  However, to support secure roaming across different wireless mesh routers (WMRs), communication is required between the old and the new WMRs.  ...  Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks, Applied Cryptography and Network Security, Dr.  ... 
doi:10.5772/39176 fatcat:lvh54ipvizdo3drqtro2qbhece

Fast authentication for mobility support in wireless mesh networks

Celia Li, Uyen Trang Nguyen
2011 2011 IEEE Wireless Communications and Networking Conference  
We propose new authentication protocols that support fast hand-off for real-time applications such as voice over IP and audio/video conferencing in wireless mesh networks (WMNs).  ...  A client and a mesh access point (MAP) mutually authenticate each other using one-hop communications. The central authentication server is not involved during the handover process.  ...  The protocols are built upon a new trust model [9] and different types of tickets described next. III.  ... 
doi:10.1109/wcnc.2011.5779299 dblp:conf/wcnc/LiN11 fatcat:mxnijh5a3bdmhhyqoipaggcp7y

Wireless networking security: open issues in trust, management, interoperation and measurement

Joseph B. Evans, Weichao Wang, Benjamin J. Ewy
2006 International Journal of Security and Networks (IJSN)  
In this paper, we investigate the recent advances in wireless security from theoretical foundations to evaluation techniques, from network level management to end user trust inference and from individual  ...  The pervasive availability and wide usage of wireless networks with different kinds of topologies, techniques and protocol suites have brought with them a need to improve security mechanisms.  ...  Trust management in wireless networks Trust is an important factor in security that describes a set of relations among the entities engaged in various protocols.  ... 
doi:10.1504/ijsn.2006.010825 fatcat:glcvloozrbfyzb5hwjom3sjseq

Security and Privacy Issues in Wireless Mesh Networks: A Survey [article]

Jaydip Sen
2013 arXiv   pre-print
This book chapter identifies various security threats in wireless mesh network (WMN).  ...  The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless  ...  Hybrid wireless mesh protocol (HWMP) Bahr has proposed a hybrid wireless mesh protocol (HWMP) [90] . It is the default routing protocol for IEEE 802.11s WLAN mesh networking.  ... 
arXiv:1302.0939v1 fatcat:4bxooy2dubeopa3qbcyg5yvi3y

Path Mechanism to reduce packet data loss in Wireless Mesh Networks

Rajinder Singh, Er. Nidhi Bhalla
2012 INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY  
A wireless mesh network (WMN) is a communicationnetwork made up of radio nodes organized in a meshtopology. Wireless mesh network often consists of meshclients, mesh routers and gateways.  ...  A wireless Mesh networkuses multi-hop communication. Due to multi-hop architectureand wireless nature, Mesh networks are vulnerable to varioustypes of Denial of Services attack.  ...  The Paper emphasis on the developing of a path protocol when the minimun possible packet dropp occurs in wireless mesh networks. Due to packet droping occurrences the network performance degrades.  ... 
doi:10.24297/ijct.v2i3c.6779 fatcat:zhqhcb5sxbafpfl6zmlutn4yy4
« Previous Showing results 1 — 15 out of 590 results