CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Evolution of Various Authentication Schemes in Wireless Network over a Decade

by Pratik Singh, Bhawna Mallick
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 124 - Number 7
Year of Publication: 2015
Authors: Pratik Singh, Bhawna Mallick
10.5120/ijca2015905516

Pratik Singh, Bhawna Mallick . Evolution of Various Authentication Schemes in Wireless Network over a Decade. International Journal of Computer Applications. 124, 7 ( August 2015), 5-9. DOI=10.5120/ijca2015905516

@article{ 10.5120/ijca2015905516,
author = { Pratik Singh, Bhawna Mallick },
title = { Evolution of Various Authentication Schemes in Wireless Network over a Decade },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 124 },
number = { 7 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 5-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume124/number7/22113-2015905516/ },
doi = { 10.5120/ijca2015905516 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:13:44.651469+05:30
%A Pratik Singh
%A Bhawna Mallick
%T Evolution of Various Authentication Schemes in Wireless Network over a Decade
%J International Journal of Computer Applications
%@ 0975-8887
%V 124
%N 7
%P 5-9
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Openness of wireless network makes it more sensible for various security attacks. Authentication is the most vital procedure to make sure that the service is appropriately used. It is a way of confirming the genuineness of a party by another party. There is a wide range of authentication schemes that varies according to time period. This paper, focus on the authentication schemes in wireless network that have evolved in last one a decade.

References
  1. Jianming Zhu and JianfengMa,"A New Authentication Scheme with Anonymity for Wireless Environments",IEEE Transactions on Consumer Electronics, 234 Vol. 50, No. 1, February 2004.
  2. Minghui shi, Xuemin (sherman) shen, and Jon W. Mark, University of waterloo, "IEEE 802.11 Roaming and Authentication in Wireless Lan/Cellular Mobile Networks”, IEEE Wireless Communications, August 2004.
  3. Vishal Bhargava and Mihail L. Sichitiu,"Physical Authentication through Localization in Wireless Local Area Networks",IEEEGlobecom 2005.
  4. Zhi Li, Qibin Sun,Yong Lian and Chang Wen Chen, Fellow, “Joint Source-Channel Authentication Resource Allocation and Unequal Authenticity Protection for Multimedia Over Wireless Networks” IEEE Transactions on multimedia, vol. 9, no. 4, June 2007.
  5. Andreas Roos, Sabine Wieland,Andreas Th. Schwarzbacher,BangnanXu,"Time behavior and network encumbrance due to authentication in wireless mesh acess networks",IEEE 2007.
  6. Liang Xiao, Larry Greenstein, Narayan Mandayam, Wade Trappe,"Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication",IEEE Communications Society ICC 2007.
  7. Jahan Hassan, Harsha Sirisena, and Bjorn Landfeldt, “Trust-Based Fast Authentication for Multiowner Wireless Networks”, IEEE Transactions on Mobile Computing, Vol. 7, No. 2, February 2008.
  8. Paul L. Yu, John S. Baras,"Physical-Layer Authentication",IEEE Transactions on Information Forensics and Security, Vol. 3, No. 1, March 2008.
  9. Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam, and Wade Trappe,” Using the Physical Layer for Wireless Authentication in Time-Variant Channels”, IEEE Transactions on Wireless Communications, Vol. 7, No. 7, July 2008.
  10. Haojin Zhu, Xiaodong Lin,,Rongxing Lu, Pin-Han Ho, and Xuemin (Sherman) Shen,“ SLAB: A Secure Localized Authentication and Billing Scheme for Wireless Mesh Networks”, IEEE Transactions on Wireless Communications, Vol. 7, No. 10, October 2008.
  11. Wei Wang, Dongming Peng, Honggang Wang, Hamid Sharif, Hsiao-Hwa Chen,” Matching Stream Authentication and Resource Allocation to Multimedia Codec Dependency with Position-Value Partitioning in Wireless Multimedia Sensor Networks” IEEE "GLOBECOM" 2009 proceedings
  12. Wei Wang, Dongming Peng, Honggang Wang, Hamid Sharif, and Hsiao-Hwa Chen,”A Multimedia Quality-Driven Network Resource Management Architecture for Wireless Sensor Networks With Stream Authentication”, IEEE Transactions on Multimedia, Vol. 12, No. 5, August 2010.
  13. Srdjan _ Capkun, Mario _ Cagalj, Ghassan O. Karame, and Nils Ole Tippenhauer, “Integrity Regions: Authentication through Presence in Wireless Networks”, IEEE Transactions on Mobile Computing, Vol. 9, No. 11, November 2010.
  14. Chin-Chen Chang,"An Anonymous and Self-Verified Mobile Authentication with Authenticated Key Agreement for Large-Scale Wireless Networks",IEEE Transactions on Wireless Communications, Vol. 9, no. 11, November 2010.
  15. GuominYang,"Comments on “An Anonymous and Self-Verified Mobile Authentication with Authenticated Key Agreement for Large-Scale Wireless Networks”IEEE Transactions on Wireless Communications, Vol. 10, No. 6, June 2011.
  16. Quansheng Guan, F. Richard Yu, Shengming Jiang, and Victor C. M. Leung, “Joint Topology Control and Authentication Design in Mobile Ad Hoc Networks With Cooperative Communications”, IEEE Transactions on Vehicular Technology, Vol. 61, No. 6, July 2012.
  17. Xiaowei Li, YuqingZhang,"A Lightweight Roaming Authentication Protocol for Anonymous Wireless Communication",Globecom 2012 - Communication and Information System Security Symposium IEEE 2012.
  18. Daojing He,Jiajun Bu, Sammy Chan, Chun Chen, “Handauth: Efficient Handover Authentication with Conditional Privacy for Wireless Networks”, IEEE Transactions on Computers, Vol. 62, No. 3, March 2013
  19. Jitendra K. Tugnait,"Wireless User Authentication via Comparison of Power Spectral Densities",IEEE Journal on Selected Areas in Communications, Vol. 31, No. 9, September 2013.
  20. Hyo Jin Jo, Jung Ha Paik, and Dong Hoon Lee, ”Efficient Privacy-Preserving Authentication in Wireless Mobile Networks”, IEEE Transactions on Mobile Computing, Vol. 13, No. 7, July 2014.
  21. Perumalraja Rengaraju, Chung-Horng Lung and Anand Srinivasan,”QoS-Aware Distributed Security Architecture for 4G Multihop Wireless Networks”, IEEE Transactions on Vehicular Technology, Vol. 63, No. 6, July 2014.
  22. Liang Zhou, Dan Wu,Baoyu Zheng, Mohsen Guizani, “Joint Physical-Application Layer Security for Wireless Multimedia Delivery”, IEEE Communications Magazine • March 2014
Index Terms

Computer Science
Information Sciences

Keywords

Authenticity mesh network roaming protocols security attacks handoff