Show simple item record

dc.contributor.authorRamezani, Khosrow
dc.contributor.authorSithirasenan, Elankayer
dc.contributor.authorMuthukkumarasamy, Vallipuram
dc.contributor.editorIEEE Computer Society
dc.date.accessioned2017-05-03T14:27:38Z
dc.date.available2017-05-03T14:27:38Z
dc.date.issued2013
dc.date.modified2014-04-14T23:52:09Z
dc.identifier.isbn9780769550220
dc.identifier.issn2324-898X
dc.identifier.refurihttp://anss.org.au/trustcom2013/
dc.identifier.doi10.1109/TrustCom.2013.239
dc.identifier.urihttp://hdl.handle.net/10072/58408
dc.description.abstractToday we are moving towards a Post-PC era where people prefer to use hand held devices such as tablets or smart phones to maintain their presence in the E-communication world. Most of this communication is possible because of technologies such as Wireless Local Area Network (WLAN), WiMAX or LTE etc. Although the wireless hand held devices are capable of effectively connecting with their native network they often fail to maintain robust connectivity in unfamiliar networks. Therefore the need for collaborative and complementary usage has to be explored. With the range of approaches that are used to validate the mobile devices in heterogeneous wireless networks, the need for a user friendly, flexible and reliable method to interconnect and utilize the different classes of wireless networks is becoming inevitable. Wireless network users prefer to access different types of networks either independently or cooperatively. In either case, adequate security provision is critical to the successful operation of the networks. Moreover, emerging technologies should provide seamless migration between the varied networks. Hence the ability to use a single but unique set of credentials to authenticate the wireless devices in heterogeneous wireless networks would make the post-PC era more effective. In this paper we present details of the formal analysis carried out on our proposed coordinated robust authentication (CRA) protocol.
dc.description.peerreviewedYes
dc.description.publicationstatusYes
dc.format.extent533661 bytes
dc.format.mimetypeapplication/pdf
dc.languageEnglish
dc.publisherIEEE
dc.publisher.placeUnited States
dc.publisher.urihttp://anss.org.au/trustcom2013/
dc.relation.ispartofstudentpublicationY
dc.relation.ispartofconferencename12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
dc.relation.ispartofconferencetitle2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013)
dc.relation.ispartofdatefrom2013-07-16
dc.relation.ispartofdateto2013-07-18
dc.relation.ispartoflocationMelbourne, AUSTRALIA
dc.relation.ispartofpagefrom1735
dc.relation.ispartofpagefrom6 pages
dc.relation.ispartofpageto1740
dc.relation.ispartofpageto6 pages
dc.rights.retentionY
dc.subject.fieldofresearchInformation and Computing Sciences not elsewhere classified
dc.subject.fieldofresearchcode089999
dc.titleFormal Verification of the Coordinated Robust Authentication Protocol for Wireless Networks
dc.typeConference output
dc.type.descriptionE1 - Conferences
dc.type.codeE - Conference Publications
gro.facultyGriffith Sciences, School of Information and Communication Technology
gro.rights.copyright© 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
gro.date.issued2013
gro.hasfulltextFull Text
gro.griffith.authorMuthukkumarasamy, Vallipuram
gro.griffith.authorSithirasenan, Elankayer
gro.griffith.authorRamezani, Khosrow


Files in this item

This item appears in the following Collection(s)

  • Conference outputs
    Contains papers delivered by Griffith authors at national and international conferences.

Show simple item record