TY - GEN
T1 - Authentication protocol runtime evaluation in distributed AAA framework for mobile ad-hoc networks
AU - Larafa, Sondes
AU - Laurent, Maryline
PY - 2010/10/12
Y1 - 2010/10/12
N2 - Access control AAA infrastructures are traditionally used by the service providers so as to charge their subscribers. Given the easiness and the cheapness of MANET deployment and provided that charging is possible, service providers are likely to offer their services over MANET. In previous works [1] and [2], we presented a distributed AAA framework for MANET. We propose to evaluate the runtime of this framework authentication protocol by modeling and simulating typical cases that are fairly representative of the reality and can easily be extended.
AB - Access control AAA infrastructures are traditionally used by the service providers so as to charge their subscribers. Given the easiness and the cheapness of MANET deployment and provided that charging is possible, service providers are likely to offer their services over MANET. In previous works [1] and [2], we presented a distributed AAA framework for MANET. We propose to evaluate the runtime of this framework authentication protocol by modeling and simulating typical cases that are fairly representative of the reality and can easily be extended.
U2 - 10.1109/WCINS.2010.5541783
DO - 10.1109/WCINS.2010.5541783
M3 - Conference contribution
AN - SCOPUS:77957670407
SN - 9781424458516
T3 - Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010
SP - 277
EP - 281
BT - Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010
T2 - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010
Y2 - 25 June 2010 through 27 June 2010
ER -