2015
DOI: 10.15866/irecos.v10i7.6955
|View full text |Cite
|
Sign up to set email alerts
|

Pre-Authentication Design for Seamless and Secure Handover in Mobile WiMAX

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…An attacking node may individually identify the victim node to continue between the two nodes. The nodes that are communicating may need to re-transmission messages by altering sequence numbers [ 22 , 24 , 25 ]. In [ 26 ], the authors provided secure key management and user authentication scheme called the SAKA-FC.…”
Section: Related Workmentioning
confidence: 99%
“…An attacking node may individually identify the victim node to continue between the two nodes. The nodes that are communicating may need to re-transmission messages by altering sequence numbers [ 22 , 24 , 25 ]. In [ 26 ], the authors provided secure key management and user authentication scheme called the SAKA-FC.…”
Section: Related Workmentioning
confidence: 99%
“…They devised an authenticated key agreement scheme for simultaneously accessing multiple sensing devices and establishing a mutual session key between them. Unfortunately, due to secret-sharing technology, the proposed scheme has a high computing cost [41].…”
Section: Related Workmentioning
confidence: 99%
“…In this section, we present some of such studies. The work in has proposed a pre‐authentication mechanism to provide secure and safe connection before HO process. It provides forward and backward secrecy based on the least privilege principle.…”
Section: Enhancements Of Wimax Authentication Processmentioning
confidence: 99%