The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless 4G networks are the result of the interconnection of different wireless access networks and a core network. The heterogeneity of 4G networks require the implementation of a vertical authentication scheme that reduces the handover delay while preserving the security context of the ongoing communication. This paper proposes a complete vertical authentication scheme integrating the GSM, UMTS,...
IEEE 802.16 specifications for the mesh mode require the handing over Mesh Client (MC) to process the network entry procedure and to authenticate with the mesh Base Station (BS) in order to issue its request and to be scheduled for data transmission. Besides, the mesh BS does not reserve resources for serving the active connections belonging to the handing over nodes. In this paper, we aim at optimizing...
Handover between different wireless mobile networks is a key constraint for achieving subscribers satisfaction and enhancing the overall performance. More precisely, mobile subscribers wish to enjoy ubiquitous service availability while being sure of keeping the required security level and a comparable performance level when changing the aceess network. In this paper, we address this issue by proposing...
We propose in this paper a protocol called MERQIT which secure the routing service for the wireless mesh networks while guaranteeing the end-to-end QoS requirements in terms of delay, our approach provides an intrusion tolerant environment and uses and enhances the concept of trusted timely computing base (Ferreira and Verrissimo, 2002) to deduce consistent delay information while tolerating DoS and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.