Download Now Free registration required
Wired networks differ from wireless networks in that they can support computationally intensive security protocols, have high bandwidth and offer high reliability. Strong authentication schemes can be applied to wired networks. Wireless networks on the other hand suffer from packet losses and bit errors, often have low bandwidth and have resource constraints such as computation overhead and storage. In the paper, the authors present a two-stage authentication scheme for wireless networks that uses a computationally intensive but highly secure strong authentication in Stage 1 and a lightweight symmetric key based protocol in Stage 2.
- Format: PDF
- Size: 190.35 KB