2011
DOI: 10.1016/j.comnet.2011.05.027
|View full text |Cite
|
Sign up to set email alerts
|

A lightweight mutual authentication mechanism for network mobility in IEEE 802.16e wireless networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
17
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 24 publications
(17 citation statements)
references
References 25 publications
0
17
0
Order By: Relevance
“…According to (Chuang & Lee, 2011, 2012Chuang, Lee, & Chen, 2013; The SANS Technology Institute-Security Laboratory, 2008), for bulk encryption, symmetric encryption is about 1000 times faster than asymmetric encryption and the hash operation is faster than symmetric encryption. Therefore, our scheme is clearly a lightweight authentication scheme.…”
Section: Computational Cost Analysismentioning
confidence: 98%
“…According to (Chuang & Lee, 2011, 2012Chuang, Lee, & Chen, 2013; The SANS Technology Institute-Security Laboratory, 2008), for bulk encryption, symmetric encryption is about 1000 times faster than asymmetric encryption and the hash operation is faster than symmetric encryption. Therefore, our scheme is clearly a lightweight authentication scheme.…”
Section: Computational Cost Analysismentioning
confidence: 98%
“…For this reason, and based on the security solutions which deal with the mobile network [9,16,17], we have tried in this paper to establish trust relationship between PMIPv6 domain (especially MAGs) and the MR node using AAA server. We have attempted to authenticate and authorize the MR before allowing it to access to the PMIPv6 network in order to eliminate the threats on the interface between the MAG and the MR.…”
Section: Introductionmentioning
confidence: 99%
“…Before the analysis, we suppose the key length is robust for the system and the one-way hash function is irreversible which means that it is easy to figure H(x) when the value of x is given, while given the value of H(x), computing x is very difficult [8]. We compare the security feature of HASA with LR-AKE scheme, SeNERO scheme in Table 1.…”
Section: Simulation and Analysismentioning
confidence: 99%
“…We define the handover delay as the time interval between the moment that the layer-2 trigger is initiated and the moment that MR receive the first BA message in foreign network. Table 2 shows the parameter values used in analysis based on [8]. The authentication delaies of NEMO, LR-AKE and HASA are calculated as follows : Table 2 System parameters used for analysis Fig.…”
Section: Simulation and Analysismentioning
confidence: 99%
See 1 more Smart Citation