Abstract — In this paper, we propose a novel control scheme to locally authorize inter-domain roaming users for efficient authen-tication in wireless networks, which is based on authentication, authorization, accounting (AAA) architecture. We develop a de-tailed procedure to establish local security associations (SAs) for authentication and determine a threshold to trigger the proposed scheme. By considering the traffic and mobility patterns of a mobile user (MU), as well as the number of hops between the MU and its home AAA server, we demonstrate that the performance of the proposed scheme outperforms DIAMETER protocol with respect to authentication latency and cost for macro-mobility users with a high volume of authentication requests. I
The development of wireless technologies grants a user equipped with a portable wireless device the ...
The convergence of diverse but complementary wireless access technologies and inter-operation among ...
The immense success of wireless and broadband technologies over the last decade has been accompanied...
Abstract — In this paper, we propose a new lightweight authentication protocol with local security a...
Converging networks and mobility raise new challenges towards the existing Authentication, Authorisa...
Abstract- In this paper, we propose a cost-aware con-trol scheme to realize efficient authentication...
Abstract — Mobile hotspots, i.e. Internet access services in mov-ing networks (e.g. vehicular area n...
Starting with an efficient mobility management scheme for heterogeneous wireless networks, this pape...
Mobility support for users connecting to the Internet is an increasing trend. Different types of acc...
Hassan, JA ORCiD: 0000-0002-0939-2106Wireless local area networks (WLAN) are rapidly becoming a core...
Abstract — In this paper, we present a dynamic security association control scheme to improve system...
Abstract — User authentication is essential in service-oriented communication networks to identify a...
International audienceAd-hoc networks are subject to malicious attacks given their wireless nature a...
In the context of mobility protocols such as Mobile IP, authentication, authorization and accounting...
Abstract-This paper proposed classification of security for authentication process for a roaming use...
The development of wireless technologies grants a user equipped with a portable wireless device the ...
The convergence of diverse but complementary wireless access technologies and inter-operation among ...
The immense success of wireless and broadband technologies over the last decade has been accompanied...
Abstract — In this paper, we propose a new lightweight authentication protocol with local security a...
Converging networks and mobility raise new challenges towards the existing Authentication, Authorisa...
Abstract- In this paper, we propose a cost-aware con-trol scheme to realize efficient authentication...
Abstract — Mobile hotspots, i.e. Internet access services in mov-ing networks (e.g. vehicular area n...
Starting with an efficient mobility management scheme for heterogeneous wireless networks, this pape...
Mobility support for users connecting to the Internet is an increasing trend. Different types of acc...
Hassan, JA ORCiD: 0000-0002-0939-2106Wireless local area networks (WLAN) are rapidly becoming a core...
Abstract — In this paper, we present a dynamic security association control scheme to improve system...
Abstract — User authentication is essential in service-oriented communication networks to identify a...
International audienceAd-hoc networks are subject to malicious attacks given their wireless nature a...
In the context of mobility protocols such as Mobile IP, authentication, authorization and accounting...
Abstract-This paper proposed classification of security for authentication process for a roaming use...
The development of wireless technologies grants a user equipped with a portable wireless device the ...
The convergence of diverse but complementary wireless access technologies and inter-operation among ...
The immense success of wireless and broadband technologies over the last decade has been accompanied...