A hash-chain based authentication scheme for fast handover in wireless network
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hong, K | - |
dc.contributor.author | Jung, S | - |
dc.contributor.author | Wu, SF | - |
dc.date.available | 2019-04-10T11:42:12Z | - |
dc.date.created | 2018-04-17 | - |
dc.date.issued | 2006 | - |
dc.identifier.isbn | 3540310126 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/34022 | - |
dc.description.abstract | This paper proposes a hash-chain based authentication scheme for fast handover in wireless network (HAS). The full authentication procedure described in IEEE 802.11 is inappropriate to be applied to a handover, since it has heavy operation and delay time during handover. Though various methods were proposed to solve the problem, the existing schemes degrade the security of authentication or impose the entire administrative burden of the authentication on the authentication server. The main focus of this paper is on reducing the administrative burden of the authentication server and enhances the security strength of the fast handover authentication. The proposed scheme in this paper is robust to the attack by a compromised AP by using hash key chain between a mobile station and the authentication server. The scheme also decentralizes the administrative burden of the authentication server to other network entities. | - |
dc.publisher | SPRINGER-VERLAG BERLIN | - |
dc.relation.isPartOf | INFORMATION SECURITY APPLICATIONS | - |
dc.title | A hash-chain based authentication scheme for fast handover in wireless network | - |
dc.type | Conference | - |
dc.type.rims | CONF | - |
dc.identifier.bibliographicCitation | 6th International Workshop on Information Security Applications, WISA 2005, v.3786, pp.96 - 107 | - |
dc.description.journalClass | 2 | - |
dc.identifier.wosid | 000236882500008 | - |
dc.identifier.scopusid | 2-s2.0-33744920849 | - |
dc.citation.conferenceDate | 2005-08-22 | - |
dc.citation.conferencePlace | Jeju Island | - |
dc.citation.endPage | 107 | - |
dc.citation.startPage | 96 | - |
dc.citation.title | 6th International Workshop on Information Security Applications, WISA 2005 | - |
dc.citation.volume | 3786 | - |
dc.contributor.affiliatedAuthor | Jung, S | - |
dc.type.docType | Article; Proceedings Paper | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Soongsil University Library 369 Sangdo-Ro, Dongjak-Gu, Seoul, Korea (06978)02-820-0733
COPYRIGHT ⓒ SOONGSIL UNIVERSITY, ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.