{"id":"https://openalex.org/W1953326283","doi":"https://doi.org/10.1002/sec.832","title":"A local joint fast handoff scheme in cognitive wireless mesh networks","display_name":"A local joint fast handoff scheme in cognitive wireless mesh networks","publication_year":2013,"publication_date":"2013-08-23","ids":{"openalex":"https://openalex.org/W1953326283","doi":"https://doi.org/10.1002/sec.832","mag":"1953326283"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1002/sec.832","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060129988","display_name":"Yuan He","orcid":"https://orcid.org/0000-0002-6676-4009"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"funder","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan He","raw_affiliation_strings":["Key Lab of Network Security and Cryptology Fujian Province China","School of Mathematics and Computer Science Fujian Normal University Fuzhou China 350108"],"affiliations":[{"raw_affiliation_string":"Key Lab of Network Security and Cryptology Fujian Province China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"School of Mathematics and Computer Science Fujian Normal University Fuzhou China 350108","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030884513","display_name":"Li Xu","orcid":"https://orcid.org/0000-0002-8972-3373"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"funder","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Xu","raw_affiliation_strings":["Key Lab of Network Security and Cryptology Fujian Province China","School of Mathematics and Computer Science Fujian Normal University Fuzhou China 350108"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Computer Science Fujian Normal University Fuzhou China 350108","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"Key Lab of Network Security and Cryptology Fujian Province China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027626829","display_name":"Wei Wu","orcid":"https://orcid.org/0000-0003-0343-4632"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"funder","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Wu","raw_affiliation_strings":["Key Lab of Network Security and Cryptology Fujian Province China","School of Mathematics and Computer Science Fujian Normal University Fuzhou China 350108"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Computer Science Fujian Normal University Fuzhou China 350108","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"Key Lab of Network Security and Cryptology Fujian Province China","institution_ids":["https://openalex.org/I4210132990"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":null,"fwci":0.184,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":1,"citation_normalized_percentile":{"value":0.423576,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":65,"max":72},"biblio":{"volume":"7","issue":"2","first_page":"455","last_page":"465"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9988,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9978,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/switched-mesh","display_name":"Switched mesh","score":0.5219897},{"id":"https://openalex.org/keywords/authentication-server","display_name":"Authentication server","score":0.51460135},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.5012052},{"id":"https://openalex.org/keywords/mesh-networking","display_name":"Mesh networking","score":0.49506202},{"id":"https://openalex.org/keywords/proxy-mobile-ipv6","display_name":"Proxy Mobile IPv6","score":0.46233886},{"id":"https://openalex.org/keywords/shared-mesh","display_name":"Shared mesh","score":0.4463427}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8750218},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.8339081},{"id":"https://openalex.org/C31548570","wikidata":"https://www.wikidata.org/wiki/Q6453712","display_name":"Wireless mesh network","level":4,"score":0.69240093},{"id":"https://openalex.org/C111852164","wikidata":"https://www.wikidata.org/wiki/Q1414679","display_name":"Handover","level":2,"score":0.6639528},{"id":"https://openalex.org/C149946192","wikidata":"https://www.wikidata.org/wiki/Q3235733","display_name":"Cognitive radio","level":3,"score":0.5265748},{"id":"https://openalex.org/C165323707","wikidata":"https://www.wikidata.org/wiki/Q7659102","display_name":"Switched mesh","level":5,"score":0.5219897},{"id":"https://openalex.org/C2777331311","wikidata":"https://www.wikidata.org/wiki/Q784561","display_name":"Authentication server","level":3,"score":0.51460135},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.5012052},{"id":"https://openalex.org/C123691950","wikidata":"https://www.wikidata.org/wiki/Q25552104","display_name":"Mesh networking","level":3,"score":0.49506202},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4709716},{"id":"https://openalex.org/C2778610037","wikidata":"https://www.wikidata.org/wiki/Q7252889","display_name":"Proxy Mobile IPv6","level":4,"score":0.46233886},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.44682658},{"id":"https://openalex.org/C37427157","wikidata":"https://www.wikidata.org/wiki/Q7489552","display_name":"Shared mesh","level":5,"score":0.4463427},{"id":"https://openalex.org/C124255616","wikidata":"https://www.wikidata.org/wiki/Q7100423","display_name":"Order One Network Protocol","level":5,"score":0.44138047},{"id":"https://openalex.org/C2775896111","wikidata":"https://www.wikidata.org/wiki/Q642560","display_name":"Router","level":2,"score":0.42086804},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.35392526},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1827519},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.12970689},{"id":"https://openalex.org/C82203111","wikidata":"https://www.wikidata.org/wiki/Q205936","display_name":"Mobile IP","level":3,"score":0.08941746},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.07662058}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1002/sec.832","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":25,"referenced_works":["https://openalex.org/W1504134696","https://openalex.org/W1539109640","https://openalex.org/W1572603698","https://openalex.org/W1742958260","https://openalex.org/W1852820576","https://openalex.org/W1969579437","https://openalex.org/W1976385711","https://openalex.org/W1979056133","https://openalex.org/W1991309155","https://openalex.org/W2021612229","https://openalex.org/W2090312558","https://openalex.org/W2105696445","https://openalex.org/W2119928092","https://openalex.org/W2138849175","https://openalex.org/W2141369433","https://openalex.org/W2142424928","https://openalex.org/W2144679127","https://openalex.org/W2148006270","https://openalex.org/W2150825860","https://openalex.org/W2150855956","https://openalex.org/W2158609833","https://openalex.org/W2167179301","https://openalex.org/W2169642649","https://openalex.org/W4230918629","https://openalex.org/W4255216674"],"related_works":["https://openalex.org/W4319302693","https://openalex.org/W3098357582","https://openalex.org/W3016698642","https://openalex.org/W2757691190","https://openalex.org/W2604535420","https://openalex.org/W2145803479","https://openalex.org/W2145075150","https://openalex.org/W2114284183","https://openalex.org/W2088748318","https://openalex.org/W1572406879"],"abstract_inverted_index":{"ABSTRACT":[0],"A":[1],"cognitive":[2,27],"wireless":[3,31,60],"mesh":[4,32,114,118],"(CogMesh)":[5],"network":[6,9,82],"can":[7],"provide":[8],"access":[10],"for":[11,105,153],"users":[12],"(mesh":[13],"clients)":[14],"while":[15],"holding":[16],"the":[17,23,37,49,109,135,140,146,154,161,164,171,176],"open":[18],"spectrum\u2010sharing":[19],"feature.":[20],"It":[21],"combines":[22],"advantages":[24],"of":[25,36,42,77,173],"both":[26],"radio":[28,39,51],"networks":[29],"and":[30,45,65,80,116,126,148,170,175],"networks:":[33],"high":[34,75],"utilization":[35],"scarce":[38],"spectrum,":[40],"ease":[41],"deployment,":[43],"maintenance,":[44],"low":[46,81],"cost.":[47],"However,":[48],"unstable":[50],"environment":[52],"incurs":[53],"more":[54],"handoffs":[55],"in":[56,160],"CogMesh":[57,106,174],"than":[58],"other":[59],"networks.":[61],"Therefore,":[62],"seamless":[63],"handoff":[64,96,162],"a":[66,74,92,113,117,120],"lightweight":[67],"re\u2010authentication":[68,165],"process":[69],"are":[70,179],"required":[71],"to":[72,130,157],"achieve":[73],"quality":[76],"real\u2010time":[78],"applications":[79],"load":[83,172],"caused":[84],"by":[85],"re\u2010authentication.":[86],"In":[87],"this":[88],"paper,":[89],"we":[90],"introduce":[91],"local":[93],"joint":[94],"fast":[95],"scheme":[97],"based":[98],"on":[99],"proxy":[100,136],"signature,":[101],"which":[102],"is":[103,124,138,150],"suitable":[104],"scenarios.":[107],"After":[108],"mutual":[110],"authentication":[111,143,155,177],"between":[112,128],"client":[115],"router,":[119],"session":[121],"tunnel":[122],"key":[123],"derived":[125],"shared":[127],"them":[129],"protect":[131],"their":[132],"sessions.":[133],"Because":[134],"signature":[137],"used,":[139],"IEEE":[141],"802.1x":[142],"architecture":[144],"remains":[145],"same,":[147],"there":[149],"no":[151],"need":[152],"server":[156,178],"be":[158],"involved":[159],"procedure,":[163],"delay":[166],"has":[167],"been":[168],"reduced,":[169],"lower.":[180],"Copyright":[181],"\u00a9":[182],"2013":[183],"John":[184],"Wiley":[185],"&":[186],"Sons,":[187],"Ltd.":[188]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1953326283","counts_by_year":[{"year":2013,"cited_by_count":1}],"updated_date":"2025-02-16T21:43:05.596348","created_date":"2016-06-24"}