-
r37980778c78--17d915c835fac2fa8d9278e6c87e832d
The password change procedure of the proposed method. -
The Proposed authentication procedure between the MN and the MAG.
The Proposed authentication procedure between the MN and the MAG. -
The authentication procedure between the MAG and the LMA.
The authentication procedure between the MAG and the LMA. -
Execution time for each operation and our scheme and other schemes.
Execution time for each operation and our scheme and other schemes. -
Comparison between proposed scheme and other similar environment scheme.
Comparison between proposed scheme and other similar environment scheme. -
Simulation parameters.
MBR = MPW = MCV = 100, MCA = WBA. n ∈ {3, 9, 27}, WBA ∈ [0.1, 2], WPC ∈ [0, 20], WCT = 0.1. ⌈n/2⌉ groups of size 1 and ⌊n/2⌋ of size chosen uniformly at random from [1, ⌊n/2⌋].... -
The SPAM authentication procedure between the MN and the MAG.
The SPAM authentication procedure between the MN and the MAG.