1 |
Y. Zhang and Y. Fang, "A Secure Authentication and Billing Architecture for Wireless Mesh Networks," Wireless Networks, Vol.13, No.5, pp.663-678, 2007.
DOI
|
2 |
Y. Chen, J. Jan, and C. Chen, "A Fair and Secure Mobile Billing System," Computer Networks, Vol.48, No.4, pp.517-524, 2005.
DOI
ScienceOn
|
3 |
D. Zhang, U. Heo, and J. Choi, "Neighborhood based security for wireless sensor networks," Proc. of KISPS, Vol.11, No.1, pp.166-169, 2010.
|
4 |
P. Qiu, U. Heo, and J. Choi, "A gateway protocol architecture for Zigbee based sensor network interconnecting TCP/IP networks," Vol.10, No.3, pp.176-180, KISPS, 2009.
과학기술학회마을
|
5 |
S. Glass, M. Portmann, and V. Muthukkumarasamy, "Securing Wireless Mesh Network," IEEE Internet Computing, Vol.12, No.4, pp.30-36, 2008.
DOI
ScienceOn
|
6 |
European Telecommunications Standards Institute (ETSI), GSM 2.09: Security Aspects, 1993.
|
7 |
C. Lee, H. Oh, and S. Kim, "A New Authentication Protocol for IEEE 802.11 using a Group Key Supporting Fast Handover," Proc. of ICCIT 2007, pp.269-272, 2007.
DOI
|
8 |
E. Bresson, O. Chevassut, A. Essiari, and D. Pointcheval, "Mutual authentication and group key agreement for low-power mobile devices," Computer Communications, Vol.27, No.17, pp.1730-1734, 2004.
DOI
ScienceOn
|
9 |
T. R. Im, Hwaseong Lee, K. T. Cho, and D. H. Lee, "Secure Mutual Authentication and Fair Billing for Roaming Service In Wireless Mobile Networks," Proc. of ICCIT 2008, Vol.2, pp.466-471, 2008.
DOI
|
10 |
HY. Lin and L. Harn, "Authentication protocols for personal communication systems," Proc. of SIGCOMM'95, Vol.25, No.4, pp.256-261, 1995.
DOI
|
11 |
D. Johnson, C. Perkins, and J. Arkko Mobility support in IPv6, RFC 3775, Jun. 2004.
|
12 |
M. Long, C. Wu, and J. D. Irwin, "Localized Authentication for Wireless LAN Internetwork Roaming," Proc. of WCNC 2004, Vol.1, pp.264-267, 2004.
DOI
|
13 |
S. R. Tuladhar, C. E. Caicedo, and J. B. D. Joshi, "Inter-Domain Authentication for Seamless Roaming in Heterogeneous Wireless Networks," Proc. of SUTC'08, pp.249-255, 2008(6).
DOI
|
14 |
B. Aboba and D. Simon, PPP EAP TLS Authentication Protocol, IETF RFC 2716, Oct. 1999.
|
15 |
E. Hossain and Kin K.L Wireless Mesh Networks : architectures and protocols, Springer Verlag, 2008.
|
16 |
I. F. Akyildiz, X. Wang, and W. Wang, "Wireless mesh networks: a survey," Computer Networks, Vol.47, No.4, pp.445-487, 2005.
DOI
ScienceOn
|