{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T14:26:58Z","timestamp":1726410418133},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341342"},{"type":"electronic","value":"9783642341359"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34135-9_7","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T12:08:15Z","timestamp":1347278895000},"page":"64-74","source":"Crossref","is-referenced-by-count":0,"title":["WAKE: Authentication and Key Establishment for Wireless Mesh Network"],"prefix":"10.1007","author":[{"given":"Somanath","family":"Tripathy","sequence":"first","affiliation":[]},{"given":"Debasish","family":"Sahoo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"7_CR1","first-page":"445","volume":"47","author":"I.F. Akyildiz","year":"2005","unstructured":"Akyildiz, I.F., Wang, X., Wang, W.: Wireless Mesh Networks: A Survey. Computer Networks and ISDN Systems\u00a047(4), 445\u2013487 (2005)","journal-title":"Computer Networks and ISDN Systems"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Boudguiga, A., Laurent, M.: An ID-based Authentication Scheme For the IEEE 802.11s Mesh Network. In: IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 256\u2013263 (2010)","DOI":"10.1109\/WIMOB.2010.5645055"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Glass, S., Portmann, M., Muthukkumarasamy, V.: Securing Wireless Mesh Networks. IEEE Internet Computing, 30\u201336 (2008)","DOI":"10.1109\/MIC.2008.85"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"He, B., Joshi, S., Agrawal, D., Sun, D.: An efficient authenticated key establishment scheme for wireless mesh networks. In: 2010 IEEE Global Telecommunications Conference (GLOBECOM 2010), pp. 1\u20135 (2010)","DOI":"10.1109\/GLOCOM.2010.5683733"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Kohl, J.T., Neuman, B.C.: The Kerberos Network Authentication Service (Version 5). Technical report, IETF Network Working Group, Internet Request for Comments RFC-1510 (1993)","DOI":"10.17487\/rfc1510"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1007\/978-3-540-89524-4_64","volume-title":"Information Networking. Towards Ubiquitous Networking and Services","author":"I. Lee","year":"2008","unstructured":"Lee, I., Lee, J., Arbaugh, W., Kim, D.: Dynamic Distributed Authentication Scheme for Wireless LAN-Based Mesh Networks. In: Vaz\u00e3o, T., Freire, M.M., Chong, I. (eds.) ICOIN 2007. LNCS, vol.\u00a05200, pp. 649\u2013658. Springer, Heidelberg (2008)"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Martignon, F., Paris, S., Capone, A.: MobiSEC: A novel security architecture for wireless mesh networks. In: 4th ACM Symposium on QoS and Security for Wireless and Mobile Networks, pp. 35\u201342 (2008)","DOI":"10.1145\/1454586.1454593"},{"key":"7_CR8","unstructured":"IEEE Draft Amendment to Standard for Information Technology Telecommunications and Information Exchange Between Systems - LAN\/MAN Specific Requirements - Part 11: Wireless Medium Access Control (MAC) and physical layer (PHY) specifications: Amendment: ESS Mesh Networking(S), IEEE P802.11s (March 2007)"},{"key":"7_CR9","unstructured":"IEEE Draft Amendment to Standard for Information Technology Telecommunications and Information Exchange Between Systems -LAN\/MAN Specific Requirements - Part 11: Wireless Medium Access Control (MAC) and physical layer (PHY) specifications: Amendment: 10 Mesh Networking(S), IEEE P802.11s\/D5.0 (April 2010)"},{"key":"7_CR10","unstructured":"IEEE Standard 802.11i-2004: Standard for Information Technology - Telecommunication and Information Exchange between Systems - Local and Metropolitan Area Networks-Specific Requirements (July 2004)"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Harkins, D.: Simultaneous Authentication of Equals: A Secure, Password-Based Key Exchange for Mesh Networks. In: Proc. of Sensorcomm 2008, pp. 839\u2013844 (2008)","DOI":"10.1109\/SENSORCOMM.2008.131"},{"key":"7_CR13","unstructured":"Internet Engineering Task Force, The TLS protocol version 1.2 RFC5246, \n                    \n                      http:\/\/tools.ietf.org\/html\/rfc5246"},{"issue":"10","key":"7_CR14","doi-asserted-by":"publisher","first-page":"1916","DOI":"10.1109\/JSAC.2006.877223","volume":"24","author":"Y. Zhang","year":"2006","unstructured":"Zhang, Y., Fang, Y.: ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks. IEEE Journal on Selected Areas in Communications\u00a024(10), 1916\u20131928 (2006)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"7_CR15","doi-asserted-by":"publisher","first-page":"1215","DOI":"10.1007\/s11276-009-0198-6","volume":"16","author":"X. Zhu","year":"2010","unstructured":"Zhu, X., Fang, Y., Wang, Y.: How to secure multi-domain wireless mesh networks. Wireless Networks\u00a016, 1215\u20131222 (2010)","journal-title":"Wireless Networks"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Zhu, H., Lin, X., Lu, R., Ho, P.-H., Shen, X.(S.): Slab: Secure localized authentication and billing scheme for wireless mesh networks. IEEE Trans. Wireless Communication, 3858\u20133868 (2008)","DOI":"10.1109\/T-WC.2008.07418"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Li, C., Nguyen, U.T.: Fast Authentication for Mobility Support in Wireless Mesh Networks. In: 2011 IEEE Wireless Communications and Networking Conference, WCNC, pp. 1185\u20131190 (2011)","DOI":"10.1109\/WCNC.2011.5779299"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34135-9_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:45:59Z","timestamp":1620132359000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34135-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341342","9783642341359"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34135-9_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}