2008 2nd International Conference on Signal Processing and Communication Systems 2008
DOI: 10.1109/icspcs.2008.4813771
|View full text |Cite
|
Sign up to set email alerts
|

Securing wireless mesh networks with ticket-based authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…Shams Qazi et al [4] have proposed a cross-layer secure protocol for routing, data exchange and ARP problems (in case of LAN based upon WMNs). This is a Ticket-based Adhoc On demand Distance Vector (TAODV) protocol, a secure routing protocol that is based on the design of Ad hoc On demand Distance Vector (AODV) protocol.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Shams Qazi et al [4] have proposed a cross-layer secure protocol for routing, data exchange and ARP problems (in case of LAN based upon WMNs). This is a Ticket-based Adhoc On demand Distance Vector (TAODV) protocol, a secure routing protocol that is based on the design of Ad hoc On demand Distance Vector (AODV) protocol.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Qazi et al [45] propose a secure routing protocol that is based on the design AODV protocol, named Ticket-based Ad Hoc On-Demand Distance Vector. It is a cross-layer protocol, which works at network layer, and also provides security for data exchange and avoids the transfer of Address Resolution Protocol messages in order to find MAC addresses of source and destination.…”
Section: A Survey On Security and Privacy Issues In Wireless Mesh Netmentioning
confidence: 99%
“…Handoff authentication is expected to be more efficient, as the mesh client has been authenticated during login authentication. A number of protocols have been proposed to reduce the latency on (handoff) authentication in wireless networks. These authentication protocols can be classified into three categories : multi‐hop authentication, pro‐active authentication and ticket‐based authentication.…”
Section: Introductionmentioning
confidence: 99%
“…Because the authentication server may be many hops away from the client, it would result in long latency and service interruptions. Both pro‐active authentication protocols and ticket‐based authentication protocols follow the single sign‐on principle and exploit the advantages of key pre‐distribution, to minimize the latency caused by handover authentication.…”
Section: Introductionmentioning
confidence: 99%