EAP authentication mechanism for Ad Hoc wireless LAN
Wireless networks have some security issues, mainly due to its wireless nature (open and non-physical), that need to be addressed. One of the solutions to improve wireless network security is the IEEE 802.1X specification, which is based on Extensible Authentication Protocol (EAP). EAP is an authent...
| Main Authors: | M. Agni Catur Bhakti, Azween Abdullah, Low, Tan Jung, Halabi Hasbullah |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Penerbit UKM
2008
|
| Online Access: | http://journalarticle.ukm.my/5047/ http://journalarticle.ukm.my/5047/1/01.pdf |
Similar Items
EAP Authentication Mechanism for Ad Hoc Wireless LAN
by: M.A.C., Bhakti, et al.
Published: (2010)
by: M.A.C., Bhakti, et al.
Published: (2010)
EAP-BASED AUTHENTICATION FOR AD HOC NETWORK
by: M.A.C., Bhakti, et al.
Published: (2007)
by: M.A.C., Bhakti, et al.
Published: (2007)
Authentication Mechanism for Ad Hoc Wireless Local Area Network
by: M.A.C., Bhakti, et al.
Published: (2008)
by: M.A.C., Bhakti, et al.
Published: (2008)
EAP-based Authentication with EAP Method Selection Mechanism
by: M.A.C., Bhakti, et al.
Published: (2007)
by: M.A.C., Bhakti, et al.
Published: (2007)
EAP-based Authentication with EAP Method Selection Mechanism: Simulation Design
by: M.A.C., Bhakti, et al.
Published: (2007)
by: M.A.C., Bhakti, et al.
Published: (2007)
Simulation of EAP Method Selection and Negotiation Mechanism
by: M.A.C., Bhakti, et al.
Published: (2008)
by: M.A.C., Bhakti, et al.
Published: (2008)
Password-based authentication in wireless LAN
by: Gan, Hock Lai
Published: (2005)
by: Gan, Hock Lai
Published: (2005)
Immune Inspired Approach for Securing Wireless Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Immune Inspired Approach for Securing Wireless Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Multi-tiered bio-inspired self-healing architectural
paradigm for software systems
by: Azween Abdullah,, et al.
Published: (2009)
by: Azween Abdullah,, et al.
Published: (2009)
Securing Mobile Ad hoc Domain by Immune-Inspired Mechanism
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
WAIN: Wireless Ad Hoc in Infrastructure Network
by: Yogeswari, Muthusamy, et al.
Published: (2008)
by: Yogeswari, Muthusamy, et al.
Published: (2008)
Routing protocols for ad hoc wireless networks
by: Qabajeh, Mohammad M., et al.
Published: (2011)
by: Qabajeh, Mohammad M., et al.
Published: (2011)
QoS routing in ad-hoc wireless networks
by: Md Enzai, Nur Idawati, et al.
Published: (2011)
by: Md Enzai, Nur Idawati, et al.
Published: (2011)
The dimensioning of non-token-bucket parameters for efficient and reliable QoS routing decisions in bluetooth ad hoc network
by: Hasbullah, Halabi, et al.
Published: (2008)
by: Hasbullah, Halabi, et al.
Published: (2008)
Immune Inspired Framework for Ad Hoc Network Security
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Immune Inspired Framework for Ad Hoc Network Security
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Formal Specification Language for Vehicular Ad-Hoc Networks
by: Maythem Kamal , Abbas, et al.
Published: (2009)
by: Maythem Kamal , Abbas, et al.
Published: (2009)
Video performance over ad hoc wireless local area network
by: Tan, Chong Eng
Published: (1999)
by: Tan, Chong Eng
Published: (1999)
Biologically Inspired Model for Securing Mobile Ad Hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Novel Immune-based Framework for Securing Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Designing an efficient DMCIS with wireless sensor and ad hoc networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Analysis and Simulation of Wireless Ad-Hoc Network Routing Protocols
by: Mohamed, Abdul Haimid Bashir
Published: (2004)
by: Mohamed, Abdul Haimid Bashir
Published: (2004)
Implementation and performance analysis of wireless Ad-hoc Mesh networks
by: Mok, Thomas Shao Chung
Published: (2024)
by: Mok, Thomas Shao Chung
Published: (2024)
Performance study of the integration between wireless LAN and ATM LAN
by: Liew, Jing Hong
Published: (2005)
by: Liew, Jing Hong
Published: (2005)
Biologically Inspired Model for Securing Hybrid Mobile Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
Biologically inspired architecture for securing hybrid mobile ad hoc networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Performance analysis of cognitive selection mechanism for wireless LAN system
by: Hashim, Wahidah, et al.
Published: (2013)
by: Hashim, Wahidah, et al.
Published: (2013)
Congestive Loss in Wireless Ad hoc Network: Network Performance Analysis
by: Nahar, H., et al.
Published: (2011)
by: Nahar, H., et al.
Published: (2011)
Game Theoretic Approach For Power Control And Channel Assignment In Wireless Ad Hoc Networks
by: Tan, Chee Keong
Published: (2008)
by: Tan, Chee Keong
Published: (2008)
Ad Hoc Wireless Routing Schemes based on Adaptive Modulation in OFDM Broadband Networks
by: Wee, Sian Wong, et al.
Published: (2008)
by: Wee, Sian Wong, et al.
Published: (2008)
An alternative routing mechanisms for mobile ad-hoc networks
by: Ali, Awos Khazal
Published: (2008)
by: Ali, Awos Khazal
Published: (2008)
A friend mechanism for mobile ad hoc networks
by: Abd. Razak, Shukor, et al.
Published: (2008)
by: Abd. Razak, Shukor, et al.
Published: (2008)
Security performance analysis in wireless LANs
by: Nurul Anis Anati, Saripudin
Published: (2018)
by: Nurul Anis Anati, Saripudin
Published: (2018)
Integration of cellular network and wireless LAN
by: Indran, Taruna Kugan, et al.
Published: (2021)
by: Indran, Taruna Kugan, et al.
Published: (2021)
Adaptive and fuzzy approaches for nodes affinity management in wireless ad-hoc networks
by: Natsheh, Essam, et al.
Published: (2008)
by: Natsheh, Essam, et al.
Published: (2008)
Towards developing smart environment using wireless sensor and ad hoc networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
The Effect Of Using XCAST Based Routing Protocol in Wireless Ad Hoc Networks.
by: Alzyoud, Faisal Y., et al.
Published: (2009)
by: Alzyoud, Faisal Y., et al.
Published: (2009)
Resource Aware Application for Mobile Device In An Ad Hoc Wireless Network Environment
by: Saaya, Zurina, et al.
Published: (2010)
by: Saaya, Zurina, et al.
Published: (2010)
Congestion control for named data networking-based wireless ad hoc network
by: Muchtar, Farkhana, et al.
Published: (2020)
by: Muchtar, Farkhana, et al.
Published: (2020)
Similar Items
-
EAP Authentication Mechanism for Ad Hoc Wireless LAN
by: M.A.C., Bhakti, et al.
Published: (2010) -
EAP-BASED AUTHENTICATION FOR AD HOC NETWORK
by: M.A.C., Bhakti, et al.
Published: (2007) -
Authentication Mechanism for Ad Hoc Wireless Local Area Network
by: M.A.C., Bhakti, et al.
Published: (2008) -
EAP-based Authentication with EAP Method Selection Mechanism
by: M.A.C., Bhakti, et al.
Published: (2007) -
EAP-based Authentication with EAP Method Selection Mechanism: Simulation Design
by: M.A.C., Bhakti, et al.
Published: (2007)