{"id":"https://openalex.org/W2167731801","doi":"https://doi.org/10.1002/cpe.3544","title":"Improved handover authentication and key pre\u2010distribution for wireless mesh networks","display_name":"Improved handover authentication and key pre\u2010distribution for wireless mesh networks","publication_year":2015,"publication_date":"2015-08-03","ids":{"openalex":"https://openalex.org/W2167731801","doi":"https://doi.org/10.1002/cpe.3544","mag":"2167731801"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1002/cpe.3544","pdf_url":null,"source":{"id":"https://openalex.org/S11065456","display_name":"Concurrency and Computation Practice and Experience","issn_l":"1532-0626","issn":["1532-0626","1532-0634"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101590509","display_name":"Xu Yang","orcid":"https://orcid.org/0000-0003-2735-2359"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xu Yang","raw_affiliation_strings":["Fujian Provincial Key Laboratory of Network Security and Cryptology, School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, China","State Key Laboratory of Integrated Service Networks, Xidian University, Xian, 710071 China"],"affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks, Xidian University, Xian, 710071 China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031931063","display_name":"Xinyi Huang","orcid":"https://orcid.org/0000-0003-0070-1707"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xinyi Huang","raw_affiliation_strings":["Fujian Provincial Key Laboratory of Network Security and Cryptology, School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, China","State Key Laboratory of Integrated Service Networks, Xidian University, Xian, 710071 China"],"affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks, Xidian University, Xian, 710071 China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067205952","display_name":"Jinguang Han","orcid":"https://orcid.org/0000-0002-4993-9452"},"institutions":[{"id":"https://openalex.org/I137056471","display_name":"Nanjing University of Finance and Economics","ror":"https://ror.org/031y8am81","country_code":"CN","type":"education","lineage":["https://openalex.org/I137056471"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinguang Han","raw_affiliation_strings":["Jiangsu Provincial Key Laboratory of E- Business, Nanjing University of Finance and Economics, Nanjing, 210003 Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Provincial Key Laboratory of E- Business, Nanjing University of Finance and Economics, Nanjing, 210003 Jiangsu, China","institution_ids":["https://openalex.org/I137056471"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045817362","display_name":"Chunhua Su","orcid":"https://orcid.org/0000-0002-6461-9684"},"institutions":[{"id":"https://openalex.org/I177738480","display_name":"Japan Advanced Institute of Science and Technology","ror":"https://ror.org/03frj4r98","country_code":"JP","type":"education","lineage":["https://openalex.org/I177738480"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Chunhua Su","raw_affiliation_strings":["School of Information Science, Japan Advanced Institute of Science and Technology, Nomi, Japan"],"affiliations":[{"raw_affiliation_string":"School of Information Science, Japan Advanced Institute of Science and Technology, Nomi, Japan","institution_ids":["https://openalex.org/I177738480"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5031931063"],"corresponding_institution_ids":["https://openalex.org/I111753288","https://openalex.org/I149594827"],"apc_list":{"value":4740,"currency":"USD","value_usd":4740,"provenance":"doaj"},"apc_paid":null,"fwci":2.06,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":14,"citation_normalized_percentile":{"value":0.888431,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":88,"max":89},"biblio":{"volume":"28","issue":"10","first_page":"2978","last_page":"2990"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9989,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9986,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ticket","display_name":"Ticket","score":0.47960293},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.42577988},{"id":"https://openalex.org/keywords/switched-mesh","display_name":"Switched mesh","score":0.4158347}],"concepts":[{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.84235907},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7789511},{"id":"https://openalex.org/C111852164","wikidata":"https://www.wikidata.org/wiki/Q1414679","display_name":"Handover","level":2,"score":0.717702},{"id":"https://openalex.org/C31548570","wikidata":"https://www.wikidata.org/wiki/Q6453712","display_name":"Wireless mesh network","level":4,"score":0.69728535},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.56971097},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5558595},{"id":"https://openalex.org/C2775896111","wikidata":"https://www.wikidata.org/wiki/Q642560","display_name":"Router","level":2,"score":0.508408},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.50664145},{"id":"https://openalex.org/C2776540713","wikidata":"https://www.wikidata.org/wiki/Q7800647","display_name":"Ticket","level":2,"score":0.47960293},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.43941492},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.42577988},{"id":"https://openalex.org/C165323707","wikidata":"https://www.wikidata.org/wiki/Q7659102","display_name":"Switched mesh","level":5,"score":0.4158347},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37032992},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.34895468},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.26579803},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.23121288},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.13671175}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1002/cpe.3544","pdf_url":null,"source":{"id":"https://openalex.org/S11065456","display_name":"Concurrency and Computation Practice and Experience","issn_l":"1532-0626","issn":["1532-0626","1532-0634"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"U1405255"},{"funder":"https://openalex.org/F4320326297","funder_display_name":"Fok Ying Tung Education Foundation","award_id":"141065"}],"datasets":[],"versions":[],"referenced_works_count":23,"referenced_works":["https://openalex.org/W1498316612","https://openalex.org/W1510795740","https://openalex.org/W1908899906","https://openalex.org/W1977204260","https://openalex.org/W2036376413","https://openalex.org/W2076046175","https://openalex.org/W2076156693","https://openalex.org/W2101709669","https://openalex.org/W2108072891","https://openalex.org/W2110979771","https://openalex.org/W2117094586","https://openalex.org/W2138001464","https://openalex.org/W2138849175","https://openalex.org/W2139348068","https://openalex.org/W2148006270","https://openalex.org/W2150825860","https://openalex.org/W2150855956","https://openalex.org/W2151648452","https://openalex.org/W2152719255","https://openalex.org/W2272248952","https://openalex.org/W2294004290","https://openalex.org/W3021689955","https://openalex.org/W4256709975"],"related_works":["https://openalex.org/W3098357582","https://openalex.org/W2810292777","https://openalex.org/W2604535420","https://openalex.org/W2189259074","https://openalex.org/W2185956137","https://openalex.org/W2159715130","https://openalex.org/W2145803479","https://openalex.org/W2114284183","https://openalex.org/W2088748318","https://openalex.org/W1572406879"],"abstract_inverted_index":{"Summary":[0],"Ticket\u2010based":[1],"authentication":[2,35,103,107],"is":[3,48,96,108,127],"a":[4,30,71],"critical":[5],"technology":[6],"to":[7,38,61],"secure":[8,159],"wireless":[9,23],"mesh":[10,68,89,118,133],"networks":[11],"(WMN),":[12],"which":[13,81],"enable":[14],"efficient":[15,157],"communication":[16,79],"among":[17],"laptops,":[18],"cell":[19],"phones":[20],"and":[21,78,141,158],"other":[22],"devices.":[24],"In":[25],"this":[26],"paper,":[27],"we":[28],"provide":[29],"new":[31],"design":[32,95],"of":[33,84,87,93,122,165,170],"handoff":[34,54,102,124,139],"for":[36,53,66],"WMN":[37,166],"reduce":[39],"the":[40,50,58,85,105,116,138,163,168],"delay":[41],"caused":[42],"by":[43,130],"handoff.":[44],"Our":[45,145],"major":[46],"improvement":[47],"on":[49],"key":[51,63,73,112,142],"pre\u2010distribution":[52,64,74,113,143],"authentication.":[55],"We":[56],"apply":[57],"attribute\u2010based":[59],"encryption":[60],"encrypt":[62],"messages":[65,114],"neighbor":[67,88],"routers.":[69,90],"As":[70],"result,":[72],"has":[75],"constant":[76],"computation":[77],"costs,":[80],"are":[82],"independent":[83],"number":[86],"Another":[91],"advantage":[92],"our":[94,123],"that":[97,161],"it":[98],"can":[99,147],"perform":[100],"immediate":[101],"once":[104],"login":[106],"complete,":[109],"even":[110],"before":[111],"reach":[115],"foreign":[117],"router.":[119],"The":[120,152],"security":[121],"authenticator":[125],"protocol":[126],"also":[128],"improved":[129],"employing":[131],"home":[132],"router's":[134],"digital":[135],"signature":[136],"in":[137,167],"ticket":[140],"messages.":[144],"scheme":[146,154],"efficiently":[148],"thwart":[149],"forgery":[150],"attacks.":[151],"proposed":[153],"provides":[155],"an":[156],"solution":[160],"meets":[162],"requirements":[164],"era":[169],"Big":[171],"Data.":[172],"Copyright":[173],"\u00a9":[174],"2015":[175],"John":[176],"Wiley":[177],"&":[178],"Sons,":[179],"Ltd.":[180]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2167731801","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":3}],"updated_date":"2025-01-06T09:30:40.505649","created_date":"2016-06-24"}