Netinfo Security ›› 2015, Vol. 15 ›› Issue (6): 19-25.doi: 10.3969/j.issn.1671-1122.2015.06.004
Previous Articles Next Articles
Hai HUANG1, Dong-qing XIE2(), Yi-zan SONG1
Received:
2015-03-30
Online:
2015-06-20
Published:
2018-07-16
CLC Number:
Hai HUANG, Dong-qing XIE, Yi-zan SONG. Research on Authentication of WiFi-WiMAX Heterogeneous Wireless Network[J]. Netinfo Security, 2015, 15(6): 19-25.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2015.06.004
[1] | Network Working Group.WiMAX Forum[EB/OL].,2011-11-12. |
[2] | RFC 5191.ProtocolforCarryingAuthentication for Network Access (PANA)FC 5191.ProtocolforCarryingAuthentication for Network Access (PANA)[S]. 2008. |
[3] | Sun H M,chen M S,chen Y.Secure and Efficient Handover Schemes for Heterogeneous Networks[C]//IEEE Asia-Pacific Services Computing Conference (APSCC) 2008: 205-210. |
[4] | Hou L M, Miao K X.A pre-authentication architecture in WiFi&WiMAX integrated system.[C]// ChinaCOM ,2009: 1-5. |
[5] | IEEE Standard for Information technology,telecommunications and information exchange between systems,local and metropolitan area networks,specific requirements (IEEE 802.11-2007)[S]. IEEE: 2007. |
[6] | RFC 3748. Extensible Authentication Protocol(EAP)[S]. 2004 |
[7] | WONG D S.Security analysis of two anonymous authentication pro-tocols for distributed wireless networks[C]// PerCom 2005 Work-shops. Kauai Island, Hawaii, 2005. |
[8] | IEEE Standard for Informationtechnology, Telecommunications and information exchange between systems, Local and metropolitan area networks, Specific requirements Part 11(IEEE802.11-2007)[S]. IEEE: 2007. |
[9] | Stoicay I, Morrisz R, Liben -Nowellz D, et al.Chord: A scalablepeer-to-peer lookup protocol for Internet applications[J].IEEE/ACM Transactions on Networking, 2003, 11(1 ) : 17-32. |
[10] | IEEE Standard for local and metorpolition area networks Part 16(IEEE 802.16e-2006)[S] . IEEE: 2007. |
[11] | Xiang yu J.The security routing research for WSN in the applica-tion of intelligent transport system[C]//Mechatronics and Automation, Proceedings of the 2006 IEEE International Conference,2006:2318-2323. |
[12] | Waldburger M, Stiller B.Toward the mobile grid:Service provi-sioning in a mobile dvnamic virtual organization[C]//4th ACS/IEEE Int Conf on Computer Systems and Applications(ALCCSA-06),Dubai/Sharjah,March 2006:579-583. |
[13] | Wood D,Jobn A.Denial of service in sensor networks[J].IEEE Computer,2002.35(10):54-62. |
[1] | Zhiyan ZHAO, Xiaomo JI. Research on the Intelligent Fusion Model of Network Security Situation Awareness [J]. Netinfo Security, 2020, 20(4): 87-93. |
[2] | Min LIU, Shuhui CHEN. Research on VoLTE Traffic Based on Association Fusion [J]. Netinfo Security, 2020, 20(4): 81-86. |
[3] | Lingyu BIAN, Linlin ZHANG, Kai ZHAO, Fei SHI. Ethereum Malicious Account Detection Method Based on LightGBM [J]. Netinfo Security, 2020, 20(4): 73-80. |
[4] | Yifeng DU, Yuanbo GUO. A Dynamic Access Control Method for Fog Computing Based on Trust Value [J]. Netinfo Security, 2020, 20(4): 65-72. |
[5] | Zhizhou FU, Liming WANG, Ding TANG, Shuguang ZHANG. HBase Secondary Ciphertext Indexing Method Based on Homomorphic Encryption [J]. Netinfo Security, 2020, 20(4): 55-64. |
[6] | Rong WANG, Chunguang MA, Peng WU. An Intrusion Detection Method Based on Federated Learning and Convolutional Neural Network [J]. Netinfo Security, 2020, 20(4): 47-54. |
[7] | Xiaoli DONG, Shuai SHANG, Jie CHEN. Impossible Differential Attacks on 9-Round Block Cipher Rijndael-192 [J]. Netinfo Security, 2020, 20(4): 40-46. |
[8] | Chun GUO, Changqing CHEN, Guowei SHEN, Chaohui JIANG. A Ransomware Classification Method Based on Visualization [J]. Netinfo Security, 2020, 20(4): 31-39. |
[9] | Lu CHEN, Yajie SUN, Liqiang ZHANG, Yun CHEN. A Scheme of Measurement for Terminal Equipment Based on DICE in IoT [J]. Netinfo Security, 2020, 20(4): 21-30. |
[10] | Jinfang JIANG, Guangjie HAN. Survey of Trust Management Mechanism in Wireless Sensor Network [J]. Netinfo Security, 2020, 20(4): 12-20. |
[11] | Jianwei LIU, Yiran HAN, Bin LIU, Beiyuan YU. Research on 5G Network Slicing Security Model [J]. Netinfo Security, 2020, 20(4): 1-11. |
[12] | Peng LIU, Qian HE, Wangyang LIU, Xu CHENG. CP-ABE Scheme Supporting Attribute Revocation and Outsourcing Decryption [J]. Netinfo Security, 2020, 20(3): 90-97. |
[13] | Yubo SONG, Ming FAN, Junjie YANG, Aiqun HU. Multipath Solution and Blocking Method of Network Attack Traffic Based on Topology Analysis [J]. Netinfo Security, 2020, 20(3): 9-17. |
[14] | Tengfei WANG, Manchun CAI, Tianliang LU, Ting YUE. IPv6 Network Attack Source Tracing Method Based on iTrace_v6 [J]. Netinfo Security, 2020, 20(3): 83-89. |
[15] | Yi ZHANG, Hongyan LIU, Hequn XIAN, Chengliang TIAN. A Cloud Storage Encrypted Data Deduplication Method Based on Authorization Records [J]. Netinfo Security, 2020, 20(3): 75-82. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||