2010
DOI: 10.1016/j.jpdc.2009.09.006
|View full text |Cite
|
Sign up to set email alerts
|

Polynomial based scheme (PBS) for establishing Authentic Associations in Wireless Mesh Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2014
2014
2014
2014

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(11 citation statements)
references
References 8 publications
0
11
0
Order By: Relevance
“…In [8], we proposed a bivariate polynomial function based security scheme that is highly scalable at a very low cost. In this scheme, we introduced a novel scheme to allow a secured authenticated connection between any two entities in a WMN.…”
Section: ) Preliminaries: Polynomial Based Schemementioning
confidence: 99%
See 1 more Smart Citation
“…In [8], we proposed a bivariate polynomial function based security scheme that is highly scalable at a very low cost. In this scheme, we introduced a novel scheme to allow a secured authenticated connection between any two entities in a WMN.…”
Section: ) Preliminaries: Polynomial Based Schemementioning
confidence: 99%
“…In [8], we have shown that our PBS (polynomial based scheme) is highly scalable and perfectly secure which is provided at a very low cost. With very few functions stored on a MC, we can support a very large network.…”
Section: Performance Analysismentioning
confidence: 99%
“…in [11] also introduce an enhanced approach to his previous work. Based on [11] Amit Gaur et al [2]proposed scheme, using bivariate polynomials that capable of computing a common seed by independent calculation on each individual entity.…”
Section: Related Workmentioning
confidence: 99%
“…As known in [2] WMNs have become increasingly important due to their deployment flexibility while keeping the cost at a fairly low level. In this scenario, the network traffic has to be propagated for authentication from the MCs to the AAA Server (authentication, authorization and accounting ) through MRs in a multi-hop fashion.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation