[1] |
RAFFAELE R , MARCO C , ENRICO G . Mesh networks:commodity multihop ad hoc networks[J]. IEEE Communications Magazine, 2005,43(3):123-131.
|
[2] |
PHILIP W . Mesh networks:a new architecture for broadband wireless access systems[C]//IEEE Conference on Radio and Wireless (RAW-CON). 2000:43-46.
|
[3] |
HE D J , CHEN C , CHAN S , et al. Secure and efficient handover authentication based on bilinear pairing functions[J]. IEEE Transac-tions on Wireless Communications, 2012,11(1):48-53.
|
[4] |
POLITIS C , CHEW K A , AKHTAR N , et al. Hybrid multilayer mobil-ity management with AAA context transfer capabilities for all-IP net-works[J]. IEEE Wireless Communications, 2004,11(4):76-88.
|
[5] |
CHOI J D , JUNG S W . A secure and efficient handover authentication based on light-weight Diffie-Hellman on mobile node in FMIPv6[J]. IEICE Transactions on Communications, 2008,E-91B(2):605-608.
|
[6] |
HE D J , BU J J , CHAN S , et al. Privacy-preserving universal authen-tication protocol for wireless communications. IEEE Transactions on Wireless Communication, 2011,10(2):431-436.
|
[7] |
LIAO Y P , WANG S . A secure dynamic ID based remote user authen-tication scheme for multi-server environment[J]. Computer Standards& Interfaces, 2009,31(1):24-29.
|
[8] |
YEH K H , LO N W . A novel remote user authentication scheme for multi-server environment without using smart cards[J]. International Journal of Innovative Computing,Information & Control, 2010,6(8):3467-3478.
|
[9] |
LAI C Z , LI H , LIANG X H , et al. CPAL:a conditional pri-vacy-preserving authentication with access linkability for roaming service[J]. Internet of Things Journal,IEEE, 2014,1(1):46-57.
|
[10] |
CHANG C C , LEE C Y , CHIU Y C . Enhanced authentication scheme with anonymity for roaming service in global mobility networks[J]. Computer Communications, 2009,32(4):611-618.
|
[11] |
HSIANG H C , SHIH W K , Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environ-ment[J]. Computer Standards & Interfaces, 2009,31(6):1118-1123.
|
[12] |
HE D J , MA M D , ZHANG Y , et al, A strong user authentication scheme with smart cards for wireless communications[J]. Computer Communications, 2011,34(3):367-374.
|
[13] |
YANG X , HUANG X Y , HAN J G , et al. Improved handover authentica-tion and key pre-distribution for wireless mesh networks[J]. Concurrency and Computation:Practice and Experience, 2016,28(10):2978-2990.
|
[14] |
HAN Q , ZHANG Y , CHEN X , et al. Efficient and robust iden-tity-based handoff authentication in wireless networks[J]. Network and System Security. Springer Berlin Heidelberg, 2012:180-191.
|
[15] |
SHEN A N , GUO S , ZENG D , et al. A lightweight privacy-preserving protocol using chameleon hashing for secure vehicular communica-tions[C]//Wireless Communications and Networking Conference (WCNC), 2012:2543-2548.
|
[16] |
XU L , HE Y , CHEN X F , et al. Ticket-based handoff authentication for wireless mesh networks[J]. Computer Networks. 2014,73:185-194.
|
[17] |
ZHANG X , LI G , HAN W . Ticket-based authentication for fast hand-over in wireless mesh networks[J]. Wireless Personal Communications, 2015,85(3):1509-1523.
|
[18] |
苏彬庭, 许力, 方禾 , 等. 基于Diffie-Hellman的无线Mesh网络快速认证机制研究[J]. 山东大学学报, 2016,51(9):6-11. SU B T , XU L , FANG H , et al. Fast authentication mechanism based on Diffie-Hellman for wireless Mesh networks[J]. Journal of Shan-dong University, 2016,51(9):6-11.
|
[19] |
LI G S , JIANG Q , WEI F S , et al. A new privacy-aware handover authentication scheme for wireless networks[J]. Wireless Personal Communications, 2015,80(2):581-589.
|
[20] |
CHAUDHRY S A , FARASH M S , NAQVI H , et al. A robust and efficient privacy aware handover authentication scheme for wireless networks[J]. Wireless Personal Communications, 2015,1-25.
|
[21] |
ZHANG Z Z , QI Q Q , KUMAR N , et al. A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography[J]. Multimedia Tools and Applications, 2015,74(10):3477-3488.
|
[22] |
CAMENISCH J , STADLER M . Efficient group signature schemes for large groups[C]//Annual International Cryptology Conference. Springer Berlin Heidelberg, 1997:410-424.
|
[23] |
HE D B , KHAN M K , KUMAR N . A new handover authentication protocol based on bilinear pairing functions for wireless networks[J]. International Journal of Ad Hoc and Ubiquitous Computing, 2015,18(1/2):67-74.
|
[24] |
HE D B , CHEN J H , HU J . An id-based proxy signature schemes without bilinear pairings[J]. Annals of Telecommunication, 2011,66(11-12):657-662.
|