2007 IEEE International Conference on Communications 2007
DOI: 10.1109/icc.2007.263
|View full text |Cite
|
Sign up to set email alerts
|

SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
57
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 38 publications
(57 citation statements)
references
References 11 publications
0
57
0
Order By: Relevance
“…This work consists of two phases: delegation initialization phase and handover authentication phase. Meanwhile, the proposed scheme can only be deployed in the mobile user side with 2.128 ms, hence has relatively low computational cost compared with the works of Kim et al [43] and Choi et al [44].…”
Section: Review Of Pki-based Security For 3gpp Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…This work consists of two phases: delegation initialization phase and handover authentication phase. Meanwhile, the proposed scheme can only be deployed in the mobile user side with 2.128 ms, hence has relatively low computational cost compared with the works of Kim et al [43] and Choi et al [44].…”
Section: Review Of Pki-based Security For 3gpp Systemsmentioning
confidence: 99%
“…Kim et al [43] proposed a handover authentication scheme which uses the ID-based encryption technology to protect the communications in the handover authentication process. However, firstly it needs the private key generator (PKG) to issue the private keys of MNs and APs, which results in the key escrow problem.…”
Section: Review Of Pki-based Security For 3gpp Systemsmentioning
confidence: 99%
“…The limitations of SC-based schemes have greatly stimulated the research of AC-based schemes [24], [25], [39], [40], [41], [42], because AC-based schemes can provide more security, stronger privacy preservation, and require fewer communication rounds. These advantages have led to the recent increasing popularity of the AC-based secure roaming schemes.…”
Section: Related Workmentioning
confidence: 99%
“…We compare the transmission cost of CPAL with that of the existing schemes as shown in Table VII. [41] 3α 0 Scheme [37] 3α 2β Scheme [38] 4α 2β Scheme [24] 3α 0 Priauth [25] 3α 0…”
Section: B Communication Overheadmentioning
confidence: 99%
See 1 more Smart Citation