EAP Authentication Mechanism for Ad Hoc Wireless LAN
Wireless networks have some security issues, mainly due to its wireless nature (open and non-physical), that need to be addressed. One of the solutions to improve wireless network security is the IEEE 802.1X specification, which is based on Extensible Authentication Protocol (EAP). EAP is an auth...
| Main Authors: | M.A.C., Bhakti, Azween, Abdullah, Low, Tan Jung, Hasbullah, Halabi |
|---|---|
| Format: | Citation Index Journal |
| Language: | English |
| Published: |
2010
|
| Subjects: | |
| Online Access: | http://scholars.utp.edu.my/id/eprint/723/ http://scholars.utp.edu.my/id/eprint/723/1/JITM_Journal_draft_3rd_revision.pdf |
Similar Items
EAP authentication mechanism for Ad Hoc wireless LAN
by: M. Agni Catur Bhakti,, et al.
Published: (2008)
by: M. Agni Catur Bhakti,, et al.
Published: (2008)
EAP-BASED AUTHENTICATION FOR AD HOC NETWORK
by: M.A.C., Bhakti, et al.
Published: (2007)
by: M.A.C., Bhakti, et al.
Published: (2007)
Authentication Mechanism for Ad Hoc Wireless Local Area Network
by: M.A.C., Bhakti, et al.
Published: (2008)
by: M.A.C., Bhakti, et al.
Published: (2008)
EAP-based Authentication with EAP Method Selection Mechanism
by: M.A.C., Bhakti, et al.
Published: (2007)
by: M.A.C., Bhakti, et al.
Published: (2007)
EAP-based Authentication with EAP Method Selection Mechanism: Simulation Design
by: M.A.C., Bhakti, et al.
Published: (2007)
by: M.A.C., Bhakti, et al.
Published: (2007)
Simulation of EAP Method Selection and Negotiation Mechanism
by: M.A.C., Bhakti, et al.
Published: (2008)
by: M.A.C., Bhakti, et al.
Published: (2008)
Immune Inspired Approach for Securing Wireless Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Immune Inspired Approach for Securing Wireless Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Securing Mobile Ad hoc Domain by Immune-Inspired Mechanism
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
The dimensioning of non-token-bucket parameters for efficient and reliable QoS routing decisions in bluetooth ad hoc network
by: Hasbullah, Halabi, et al.
Published: (2008)
by: Hasbullah, Halabi, et al.
Published: (2008)
Formal Specification Language for Vehicular Ad-Hoc Networks
by: Maythem Kamal , Abbas, et al.
Published: (2009)
by: Maythem Kamal , Abbas, et al.
Published: (2009)
Biologically Inspired Model for Securing Mobile Ad Hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Novel Immune-based Framework for Securing Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
WAIN: Wireless Ad Hoc in Infrastructure Network
by: Yogeswari, Muthusamy, et al.
Published: (2008)
by: Yogeswari, Muthusamy, et al.
Published: (2008)
Congestive Loss in Wireless Ad hoc Network: Network Performance Analysis
by: Nahar, H., et al.
Published: (2011)
by: Nahar, H., et al.
Published: (2011)
Implementation and performance analysis of wireless Ad-hoc Mesh networks
by: Mok, Thomas Shao Chung
Published: (2024)
by: Mok, Thomas Shao Chung
Published: (2024)
Biologically inspired architecture for securing hybrid mobile ad hoc networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Biologically Inspired Model for Securing Hybrid Mobile Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
An alternative routing mechanisms for mobile ad-hoc networks
by: Ali, Awos Khazal
Published: (2008)
by: Ali, Awos Khazal
Published: (2008)
Security performance analysis in wireless LANs
by: Nurul Anis Anati, Saripudin
Published: (2018)
by: Nurul Anis Anati, Saripudin
Published: (2018)
Resource Aware Application for Mobile Device In An Ad Hoc Wireless Network Environment
by: Saaya, Zurina, et al.
Published: (2010)
by: Saaya, Zurina, et al.
Published: (2010)
Autonomic, Self-Organizing Services-Oriented Architecture in Service Ecosystem
by: M.A.C., Bhakti, et al.
Published: (2010)
by: M.A.C., Bhakti, et al.
Published: (2010)
A friend mechanism for mobile ad hoc networks
by: Abd. Razak, Shukor, et al.
Published: (2008)
by: Abd. Razak, Shukor, et al.
Published: (2008)
Mobile ad hoc network (MANET) performance through authentication approach by enhancing distributed trust model
by: Roslan, Irda
Published: (2007)
by: Roslan, Irda
Published: (2007)
A lightweight identity-based Rivest-Shamir-Adleman authentication scheme for mobile ad hoc networks
by: Eissa, Tameem
Published: (2011)
by: Eissa, Tameem
Published: (2011)
The Effect Of Using XCAST Based Routing Protocol in Wireless Ad Hoc Networks.
by: Alzyoud, Faisal Y., et al.
Published: (2009)
by: Alzyoud, Faisal Y., et al.
Published: (2009)
Adaptive and fuzzy approaches for nodes affinity management in wireless ad-hoc networks
by: Natsheh, Essam, et al.
Published: (2008)
by: Natsheh, Essam, et al.
Published: (2008)
Traffic analysis for QoS provisioning in Bluetooth ad hoc network
by: H., Hasbullah, et al.
Published: (2008)
by: H., Hasbullah, et al.
Published: (2008)
Password-based authentication in wireless LAN
by: Gan, Hock Lai
Published: (2005)
by: Gan, Hock Lai
Published: (2005)
Wireless network security: 3G, 4G, wireless PAN/LAN/MAN
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Immune Inspired Framework for Ad Hoc Network Security
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Immune Inspired Framework for Ad Hoc Network Security
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Ad Hoc Wireless Routing With Density Based Probabilistic Algorithm For Mobile Wireless Networks With Non-Uniform Node Distribution
by: Ong , Hean Loong
Published: (2010)
by: Ong , Hean Loong
Published: (2010)
Critical applications in vehicular ad hoc/sensor networks
by: Kumar, Neeraj, et al.
Published: (2014)
by: Kumar, Neeraj, et al.
Published: (2014)
Predicting the survivability of links in an ad hoc network / Lim Vivi
by: Lim , Vivi
Published: (2006)
by: Lim , Vivi
Published: (2006)
Mobile ad hoc network overview
by: Ismail, Ishak, et al.
Published: (2007)
by: Ismail, Ishak, et al.
Published: (2007)
Designing an efficient DMCIS with wireless sensor and ad hoc networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Real-time MPEG-4 transmission over wireless LAN
by: Mohammed Jama, Abdirisaq, et al.
Published: (2011)
by: Mohammed Jama, Abdirisaq, et al.
Published: (2011)
A lightweight secure authentication for vehicular ad-hoc networks by message encapsulation and trusted authority dependency-less scheme / Tarak Nandy
by: Tarak , Nandy
Published: (2022)
by: Tarak , Nandy
Published: (2022)
Integrating mobile ad hoc network into mobile IPv6 network
by: Ali, Adel, et al.
Published: (2004)
by: Ali, Adel, et al.
Published: (2004)
Similar Items
-
EAP authentication mechanism for Ad Hoc wireless LAN
by: M. Agni Catur Bhakti,, et al.
Published: (2008) -
EAP-BASED AUTHENTICATION FOR AD HOC NETWORK
by: M.A.C., Bhakti, et al.
Published: (2007) -
Authentication Mechanism for Ad Hoc Wireless Local Area Network
by: M.A.C., Bhakti, et al.
Published: (2008) -
EAP-based Authentication with EAP Method Selection Mechanism
by: M.A.C., Bhakti, et al.
Published: (2007) -
EAP-based Authentication with EAP Method Selection Mechanism: Simulation Design
by: M.A.C., Bhakti, et al.
Published: (2007)