2010 IEEE Global Telecommunications Conference GLOBECOM 2010 2010
DOI: 10.1109/glocom.2010.5683733
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Authenticated Key Establishment Scheme for Wireless Mesh Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
15
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(15 citation statements)
references
References 12 publications
0
15
0
Order By: Relevance
“…In a centralized approach, such as 802.11s [2], ARSA [6], Mobisec [7], and AKES [8], one single entity, called authentication server, handles the authentication functionalities.…”
Section: Related Workmentioning
confidence: 99%
“…In a centralized approach, such as 802.11s [2], ARSA [6], Mobisec [7], and AKES [8], one single entity, called authentication server, handles the authentication functionalities.…”
Section: Related Workmentioning
confidence: 99%
“…The classic encryption [2] and authentication mechanism can only resist outsider attackers who steal the data or tamper the information and route. However, to the insider attack, after the attackers capture the normal nodes, they acquire the identity and encryption information and put the malicious nodes to destroy the network.…”
Section: Introductionmentioning
confidence: 99%
“…Gupta et al [23] and He et al [22] present a light weight cryptographic technique, a distributed authenticated key establishment scheme for WMN [22] and cellular-based heterogeneous wireless ad hoc networks [23] based on hierarchical multi-variable symmetric functions. They provide a method to generate a symmetric secret key to allow encrypted communication and authentication among any two nodes.…”
Section: Network Security and Privacy Protection In Autonomous Networkmentioning
confidence: 99%
“…Cooperation among ad hoc nodes can also protect a network from malicious attacks. In the absence of a central, trusted entity, new classes of distributed security mechanisms and privacy protections require cooperation among several ad hoc nodes to protect a network from malicious attacks [21][22][23]. This dissertation specifically addresses selfish and malicious nodes.…”
mentioning
confidence: 99%
See 1 more Smart Citation