Abstract
This paper analyses security mechanisms in wireless networks, and designs for secure and efficient protocol for a handover reusing the key materials generated before the handover phase. In order to be sure that our handover protocol does not have any security flaws, we formally validated it using automatic protocol analyzer AVIPSA.
Full Text
Sign-in/Register to access full text options
Published version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have