References
- W.B. Lee and C.K. Yeh, "A new delegation-based authentication protocol for use in portable communication systems," IEEE Transaction on Wireless Communications, vol. 4, no.1, pp. 57-64, January, 2005. https://doi.org/10.1109/TWC.2004.840220
- M. Zhang and Y. Fang, "Security analysis and enhancements of 3GPP authentication and key agreement protocol," IEEE Trans. Wireless Commun., vol. 4, no. 2, pp. 734-742, 2005. https://doi.org/10.1109/TWC.2004.842941
- Q. Jing, Y. Zhang, A. Fu and X. Liu, "A privacy preserving handover authentication scheme for EAP-based wireless networks," in Proc. of IEEE GLOBECOM, pp. 1-6, December 5-9, 2011.
- G. Yang, Q. Huang, D. S. Wong and X. Deng, "Universal authentication protocols for anonymous wireless communications," IEEE Transaction on Wireless Communications, vol.9, no.1, pp. 168-174, January, 2010. https://doi.org/10.1109/TWC.2010.01.081219
- D. He, C. Chen, S. Chan and J. Bu, "Secure and efficient handover authentication based on bilinear pairing functions," IEEE Transaction on Wireless Communications, vol. 11, no. 1, pp. 48-53, January, 2012. https://doi.org/10.1109/TWC.2011.110811.111240
- European Telecommunications Standards Institute (ETSI), GSM 2.09: Security aspects. http://www.etsi.org/deliver/etsi_gts/04/0403/05.02.00_60/gsmts_0403v050200p.pdf
- I. Akyildiz, X. Wang and W. Wang, "Wireless mesh networks: a survey," Computer Networks, vol.47, no.4, pp. 445-487, March, 2005. https://doi.org/10.1016/j.comnet.2004.12.001
- R. Lu, X. Lin, X. Liang and X. Shen, "A dynamic privacy-preserving key management scheme for location-based services in VANETs," IEEE Transactions on Intelligent Transportation Systems, vol.13, no. 1, March, 2012.
- Y. Jiang, C. Lin, X. Shen and M. Shi, "Mutual authentication and key exchange protocols for roaming services in wireless mobile networks," IEEE Transaction on Wireless Communications, vol.5, no.9, pp. 2569-2576, September, 2006.
- C. Tang and D.O. Wu, "An efficient mobile authentication scheme for wireless networks," IEEE Transaction on Wireless Communications, vol.7, no.4, pp. 1408-1416, April, 2008. https://doi.org/10.1109/TWC.2008.061080
- C.C. Chang and H.C. Tsai, "An anonymous and self-verified mobile authentication with authenticated key agreement for large-scale wireless networks," IEEE Transactions on Wireless Communications, vol. 9, no.11, pp. 3346-3353, November, 2010. https://doi.org/10.1109/TWC.2010.092410.090022
- A. Shamir, "Identity-based cryptosystems and signature schemes," in Proc. of CRYPTO, pp. 47-53, August 19-22, 1984.
- S.L.Ng and C. Mitchell, "Comments on mutual authentication and key exchange protocols for low power wireless communications," IEEE Communication Letters, vol. 8, no.4, pp. 262-263, April, 2004. https://doi.org/10.1109/LCOMM.2004.825724
- AVISPA v1.1 User Manual, 2006. http://www.avispa-project.org/
- D. Basin, S. Modersheim and L. Viganò, "An on-the-fly model-checker for security protocol analysis," in Proc. of Esorics, pp. 253-270, October 13-15, 2003.