Authentication protocol runtime evaluation in distributed AAA framework for mobile ad-hoc networks

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Access control AAA infrastructures are traditionally used by the service providers so as to charge their subscribers. Given the easiness and the cheapness of MANET deployment and provided that charging is possible, service providers are likely to offer their services over MANET. In previous works [1] and [2], we presented a distributed AAA framework for MANET. We propose to evaluate the runtime of this framework authentication protocol by modeling and simulating typical cases that are fairly representative of the reality and can easily be extended.

Original languageEnglish
Title of host publicationProceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010
Pages277-281
Number of pages5
DOIs
Publication statusPublished - 12 Oct 2010
Event2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010 - Beijing, China
Duration: 25 Jun 201027 Jun 2010

Publication series

NameProceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010

Conference

Conference2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010
Country/TerritoryChina
CityBeijing
Period25/06/1027/06/10

Fingerprint

Dive into the research topics of 'Authentication protocol runtime evaluation in distributed AAA framework for mobile ad-hoc networks'. Together they form a unique fingerprint.

Cite this