2012 8th International Conference on Wireless Communications, Networking and Mobile Computing 2012
DOI: 10.1109/wicom.2012.6478520
|View full text |Cite
|
Sign up to set email alerts
|

Extended Security Analysis of Multi-Hop Ticket Based Handover Authentication Protocol in the 802.16j Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…In [18,19], Khan et al proposed a modified PKM protocol using distributed authentication and localized key management scheme. In [3], Tie and Yi proposed a multihop ticket based handover authentication which adopted the idea from Kerberos and used a ticket to allow MS, RS, and BS to mutually authenticate each other. However, the authors in the aforementioned papers did not take rogue access node attack into consideration.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [18,19], Khan et al proposed a modified PKM protocol using distributed authentication and localized key management scheme. In [3], Tie and Yi proposed a multihop ticket based handover authentication which adopted the idea from Kerberos and used a ticket to allow MS, RS, and BS to mutually authenticate each other. However, the authors in the aforementioned papers did not take rogue access node attack into consideration.…”
Section: Related Workmentioning
confidence: 99%
“…In the early days when WiMAX was designed, WiMAX faced the paradox that increasing data rate will reduce reliability, and increasing minimum reliability service will reduce the coverage area [3]. One possible solution is to deploy more base stations (BSs) closely, but the high cost of deploying BSs will give away the original economic competitiveness of WiMAX.…”
Section: Introductionmentioning
confidence: 99%
“…A single authentication process during handover via ticket-based allows neighbouring MAPs to share a pre-stored symmetric key [5][6][7]. A group key authentication process during handover allows the authentication server (AS) to divide the network into multiple groups [8][9][10]. A broadcast authentication process during handover allows AS to authenticate the clients while maintaining every MAP [11,12].…”
Section: Introductionmentioning
confidence: 99%