Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Protocol for Carrying Authentication for Network Access"'
Publikováno v:
IEEE Internet of Things Journal. 5:4003-4017
In the renowned Internet of Things (IoT) networks, it is expected a vast number of devices with IP connectivity and constrained capabilities. Due to reduced resources they are the target of different type of attacks and providing security has become
Publikováno v:
IEEE Network. 28:49-55
PANA is the standard proposed by the IETF to carry out network access authentication regardless the underlying access technology. Recently, the protocol has been selected as the standard in several network scenarios such as the Internet of Things and
Publikováno v:
Computer Communications. 36:1527-1538
Nowadays, network operators and educational and research communities are extending the access to their Internet application services to external end users by deploying, with other domains, the so-called identity federations. In these federations, end
Autor:
Okuthe P. Kogeda, Topside E. Mathonsi
Publikováno v:
2016 IST-Africa Week Conference.
The advancement of various wireless portable devices and wireless networks technologies increases the need for network services and applications, i.e., instant messaging, World Wide Web (WWW), e-Mail anywhere anytime. As a result, over the past years
Publikováno v:
IEEE Communications Magazine. 50:84-92
Network access authentication is a key procedure for network operators to control user access to the network service. The IETFs recently finished its major work in this area by standardizing an IP-based protocol named Protocol for Carrying Authentica
Autor:
Salekul Islam, J. William Atwood
Publikováno v:
Computer Networks. 54:1646-1671
The classical IP multicast model makes it impossible to restrict the forwarded data to that originated by an authorized sender. Without effective sender access control, an adversary may exploit the existing IP multicast model, where a sender can send
Publikováno v:
ICN
Information-Centric Networking (ICN) is an emerging networking paradigm that focuses on content distribution and aims at replacing the current IP stack. Implementations of ICN have demonstrated its advantages over IP, in terms of network performance
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e046388cfff5b9cf01798d1246bc1df5
http://hdl.handle.net/11577/3211924
http://hdl.handle.net/11577/3211924
Publikováno v:
Sensors; Volume 13; Issue 11; Pages: 14888-14917
Sensors (Basel, Switzerland)
Sensors, Vol 13, Iss 11, Pp 14888-14917 (2013)
Sensors (Basel, Switzerland)
Sensors, Vol 13, Iss 11, Pp 14888-14917 (2013)
Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities
Publikováno v:
2009 Second International Conference on Future Information Technology and Management Engineering.
Vehicle network is popular gradually. For more security in vehicle network, a trusted AAA (Authentication, Authorization and Accounting) environment for vehicle network must be established. The paper proposes an approach to establish such an environm
Publikováno v:
2008 The Fourth International Conference on Wireless and Mobile Communications.
The future vision of the wireless networks is coexistence of current existing access networks. The different access networks managed by different operators will be bound together into a single network and the Internet Protocol will be the glue. To fu