Secure Mutual Authentication Protocols for Mobile Multi-Hop Relay WiMAX Networks against Rogue Base/Relay Stations.
Jie HuangChin-Tser HuangPublished in: ICC (2011)
Keyphrases
- multi hop
- mutual authentication
- wifi
- security analysis
- wireless ad hoc networks
- authentication protocol
- cellular networks
- wireless networks
- mobile devices
- ad hoc networks
- wireless sensor networks
- privacy protection
- mobile nodes
- base station
- network infrastructure
- mobile ad hoc networks
- smart card
- authentication scheme
- end to end
- data transmission
- rfid tags
- smart phones
- mobile networks
- mobile applications
- energy efficient
- routing protocol
- energy consumption
- trusted third party
- key distribution
- mobile users
- routing algorithm
- end to end delay
- secret key
- social networks
- public key
- wireless communication
- key management
- private key
- user authentication
- mobile phone
- quality of service
- context aware
- security requirements
- rfid systems
- sensor networks
- computer networks
- sensor nodes
- low cost
- wireless mesh networks
- data collection
- real time
- distributed systems
- lightweight
- energy efficiency
- location information