Towards An Efficient Protocol for Privacy and Authentication in Wireless Networks

  title={Towards An Efficient Protocol for Privacy and Authentication in Wireless Networks},
  author={Clifton J. Mulkey and Dulal Kar and Ajay A. Katangur},
We envision a scenario for security of wireless networks that include and integrate nodes of all different capabilities, including tiny sensors or similarly battery-powered, resourceconstrained tiny nodes. However, the existing Wireless Protected Access (WPA) protocol may not be suitable for such resourceconstrained, low-end nodes as the protocol could be too demanding since its existing authentication and privacy mechanisms can cause many inconveniences due their complexity in computation and… CONTINUE READING


Publications citing this paper.


Publications referenced by this paper.
Showing 1-10 of 13 references

Wireless Communications and Networks, 2nd Edition

  • W. Stallings
  • Pearson Education Inc.,
  • 2005
Highly Influential
5 Excerpts

Rodrguez-Henrquez, Multi-core implementation of the tate pairing over supersingular elliptic curves

  • J.-L. Beuchat, E. Lpez-Trejo, L. Martnez-Ramos, F. S. Mitsunari
  • Proceedings of the 8th International Conference…
  • 2009
Highly Influential
8 Excerpts

Diving into the 802.11i spec: A tutorial, EETimes News and AnalysisAvailable: 4143367/Diving-into-the-802-11i-Spec-A-Tutorial

  • D. Eaton
  • Last Accessed:
  • 2012
Highly Influential
3 Excerpts

Elliptic curve cryptography: An implementation tutorial, available: resources/pdf/Elliptic Curve AnnopMS.pdf

  • M. Anoop
  • Last Accessed:
  • 2012
1 Excerpt

Applied cryptography in wireless sensor networks

  • D. C. Kar, H. L. Ngo, C. J. Mulkey
  • IGI Global,
  • 2011
2 Excerpts

The link layer and local area networks, in: Computer Networking: A Top-Down Approach, 4th Edition, Pearson Education Inc., 2008, Ch

  • J. F. Kurose, K. W. Ross
  • 2008
1 Excerpt

Similar Papers

Loading similar papers…