{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:37:57Z","timestamp":1762875477029},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2012,8,5]],"date-time":"2012-08-05T00:00:00Z","timestamp":1344124800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1007\/s11277-012-0781-5","type":"journal-article","created":{"date-parts":[[2012,8,4]],"date-time":"2012-08-04T13:16:35Z","timestamp":1344086195000},"page":"1793-1810","source":"Crossref","is-referenced-by-count":16,"title":["GHAP: An Efficient Group-based Handover Authentication Mechanism for IEEE 802.16m Networks"],"prefix":"10.1007","volume":"70","author":[{"given":"Anmin","family":"Fu","sequence":"first","affiliation":[]},{"given":"Gongxuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yuqing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhenchao","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,8,5]]},"reference":[{"key":"781_CR1","unstructured":"IEEE standard 802.16m-2011 (2011). Air interface for broadband wireless access systems\u2014amendment 3: Advanced air interface, May 2011."},{"key":"781_CR2","unstructured":"IEEE 802.16m-09\/0034r3 (2010). IEEE 802.16m system description document (SDD), June 2010."},{"key":"781_CR3","unstructured":"IETF RFC 5296 (2008). EAP extensions for EAP re-authentication protocol (ERP), August 2008."},{"key":"781_CR4","doi-asserted-by":"crossref","unstructured":"Fu, A., Zhang, Y., Zhu, Z., & Feng, J. (2011). EKMP: an enhanced key management protocol for IEEE 802.16m. In Proceedings of the IEEE WCNC (pp. 1960\u20131965). Cancun, Mexico, March 2011.","DOI":"10.1109\/WCNC.2011.5779291"},{"key":"781_CR5","doi-asserted-by":"crossref","unstructured":"Ohba, Y., Das, S., & Dutta, A. (2007). Kerberized handover keying: A media-independent handover key management architecture. In Proceedings of the MobiArch. Kyoto, Japan, August 2007.","DOI":"10.1145\/1366919.1366932"},{"key":"781_CR6","doi-asserted-by":"crossref","unstructured":"Cai, L., Machiraju, S., & Chen, H. (2010). CapAuth: A capability-based handover scheme. In Proceedings of the INFOCOM (pp. 1-5). San Diego, USA, March 2010.","DOI":"10.1109\/INFCOM.2010.5462208"},{"issue":"12","key":"781_CR7","doi-asserted-by":"crossref","first-page":"1134","DOI":"10.1109\/LCOMM.2010.12.100818","volume":"14","author":"A. Fu","year":"2010","unstructured":"Fu A., Zhang Y., Zhu Z., Liu X. (2010) A fast handover authentication mechanism based on ticket for IEEE 802.16m. IEEE Commununications Letters 14(12): 1134\u20131136","journal-title":"IEEE Commununications Letters"},{"issue":"4","key":"781_CR8","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MWC.2004.1325894","volume":"11","author":"C. Politis","year":"2004","unstructured":"Politis C., Chew K. A., Akhtar N., Georgiades M., Tafazolli R., Dagiuklas T. (2004) Hybrid multilayer mobility management with AAA context transfer capabilities for all-IP networks. IEEE Wireless Communication 11(4): 76\u201388","journal-title":"IEEE Wireless Communication"},{"key":"781_CR9","doi-asserted-by":"crossref","unstructured":"Wienzek, R. & Persaud, R. (2006). Fast re-authentication for handovers in wireless communication networks. In Proceedings of the IFIP-TC6 Networking 2006 (pp. 556\u2013567). Coimbra, Portugal, May 2006.","DOI":"10.1007\/11753810_47"},{"issue":"10","key":"781_CR10","doi-asserted-by":"crossref","first-page":"1387","DOI":"10.1002\/wcm.726","volume":"9","author":"C. M. Huang","year":"2009","unstructured":"Huang C. M., Li J. W. (2009) A cluster-chain-based context transfer mechanism for fast basic service set transition in the centralized wireless LAN architecture. Wireless Communications and Mobile Computing 9(10): 1387\u20131401","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"5","key":"781_CR11","doi-asserted-by":"crossref","first-page":"2185","DOI":"10.1109\/TVT.2010.2041677","volume":"59","author":"S. R. Yang","year":"2010","unstructured":"Yang S. R., Kao C. C., Kan W. C., Shih T. C. (2010) Handoff minimization through a relay station grouping algorithm with efficient radio-resource scheduling policies for IEEE 802.16j multihop relay networks. IEEE Transactions on Vehicular Technology 59(5): 2185\u20132197","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"6","key":"781_CR12","doi-asserted-by":"crossref","first-page":"641","DOI":"10.1109\/TMC.2005.89","volume":"4","author":"R. Gau","year":"2005","unstructured":"Gau R., Lin C. (2005) Location management of correlated mobile users in the UMTS. IEEE Transactions on Mobile Computing 4(6): 641\u2013651","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"781_CR13","unstructured":"Shan, L., Liu, F., & Yang, K. (2009). Performance analysis of group handover scheme for IEEE 802.16j-enabled vehicular networks. In Proceedings of the advances in data and web management (pp. 653\u2013658). Suzhou, China, April 2009."},{"key":"781_CR14","unstructured":"Miller, V. (2005). Uses of elliptic curves in cryptography. In Proceedings of the CRYPTO (pp. 417\u2013426). Santa Barbara, USA, August 2005."},{"issue":"2","key":"781_CR15","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1109\/LCOMM.2008.071316","volume":"12","author":"L. Lee","year":"2008","unstructured":"Lee L., Kim D., Chung B., Yoon H. (2008) Adaptive hysteresis using mobility correlation for fast handover. IEEE Communications Letters 12(2): 152\u2013154","journal-title":"IEEE Communications Letters"},{"key":"781_CR16","doi-asserted-by":"crossref","unstructured":"Choi, H. H., Lim, J. B., Hwang, H., & Jang, K. (2010). Optimal handover decision algorithm for throughput enhancement in cooperative cellular networks. In Proceedings of the VTCfall (pp. 1\u20135). Ottawa, Canada, September 2010.","DOI":"10.1109\/VETECF.2010.5594556"},{"key":"781_CR17","unstructured":"IETF RFC 4076 (2005). Context transfer protocol (CXTP), July 2005."},{"key":"781_CR18","unstructured":"IETF RFC 4962 (2007). Guidance for authentication, authorization, and accounting (AAA) key management, July 2007."},{"key":"781_CR19","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.entcs.2005.11.052","volume":"155","author":"L. Vigan\u00f2","year":"2006","unstructured":"Vigan\u00f2 L. (2006) Automated security protocol analysis with the AVISPA tool. Electronic Notes in Theoretical Computer Science 155: 61\u201386","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"781_CR20","unstructured":"AVISPA v1.1, http:\/\/www.avispa-project.org\/ ."},{"issue":"3","key":"781_CR21","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1002\/dac.1158","volume":"24","author":"C. Chen","year":"2011","unstructured":"Chen C., He D., Chan S., Bu J. (2011) Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems 24(3): 347\u2013362","journal-title":"International Journal of Communication Systems"},{"issue":"8","key":"781_CR22","doi-asserted-by":"crossref","first-page":"2119","DOI":"10.1016\/j.comnet.2012.02.012","volume":"56","author":"J. Cao","year":"2012","unstructured":"Cao J., Li H., Ma M., Zhang Y., Lai C. (2012) A simple and robust handover authentication between HeNB and eNB in LTE networks. Computer Networks 56(8): 2119\u20132131","journal-title":"Computer Networks"},{"issue":"2","key":"781_CR23","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D. Dolev","year":"1983","unstructured":"Dolev D., Yao A. (1983) On the security of public key protocols. IEEE Transactions on Information Theory 29(2): 198\u2013208","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"781_CR24","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1145\/956981.956990","volume":"33","author":"A. Mishra","year":"2003","unstructured":"Mishra A., Shin M., Arbaugh W. (2003) An empirical analysis of the IEEE 802.11 MAC layer handoff process. ACM SIGCOMM Computer and Communication Review 33(2): 93\u2013102","journal-title":"ACM SIGCOMM Computer and Communication Review"},{"issue":"4","key":"781_CR25","doi-asserted-by":"crossref","first-page":"1389","DOI":"10.1109\/TWC.2008.060990","volume":"7","author":"X. Lin","year":"2008","unstructured":"Lin X., Lu R., Ho P. H., Shen X., Cao Z. (2008) TUA: A novel compromise-resilient authentication system for wireless mesh networks. IEEE Transaction on Wireless Communication 7(4): 1389\u20131399","journal-title":"IEEE Transaction on Wireless Communication"},{"issue":"2","key":"781_CR26","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/MNET.2009.4804333","volume":"23","author":"X. Zheng","year":"2009","unstructured":"Zheng X., Sarikaya B. (2009) Handover keying and its uses. IEEE Network 23(2): 27\u201334","journal-title":"IEEE Network"},{"issue":"5-6","key":"781_CR27","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1016\/j.csi.2009.10.001","volume":"32","author":"R. Marin-Lopez","year":"2010","unstructured":"Marin-Lopez R., Yoshihiro O., Fernando P. G., Gomez A. F. (2010) Analysis of handover key management schemes under IETF perspective. Computer Standards and Interfaces 32(5-6): 266\u2013273","journal-title":"Computer Standards and Interfaces"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-012-0781-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-012-0781-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-012-0781-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,2]],"date-time":"2019-07-02T14:48:09Z","timestamp":1562078889000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-012-0781-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8,5]]},"references-count":27,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["781"],"URL":"https:\/\/doi.org\/10.1007\/s11277-012-0781-5","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,8,5]]}}}