{"id":"https://openalex.org/W1987295822","doi":"https://doi.org/10.1109/glocom.2012.6503249","title":"An efficient WLAN initial access authentication protocol","display_name":"An efficient WLAN initial access authentication protocol","publication_year":2012,"publication_date":"2012-12-01","ids":{"openalex":"https://openalex.org/W1987295822","doi":"https://doi.org/10.1109/glocom.2012.6503249","mag":"1987295822"},"language":"en","primary_location":{"id":"doi:10.1109/glocom.2012.6503249","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2012.6503249","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100626958","display_name":"Xinghua Li","orcid":"https://orcid.org/0000-0002-5583-4155"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]},{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN","US"],"is_corresponding":true,"raw_author_name":"Xinghua Li","raw_affiliation_strings":["Xidian University, Xi'an, 710071, China","Virginia Polytechnic Institute and State University, VA, USA","Xidian University, Xian, China"],"affiliations":[{"raw_affiliation_string":"Xidian University, Xi'an, 710071, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"Virginia Polytechnic Institute and State University, VA, USA","institution_ids":["https://openalex.org/I859038795"]},{"raw_affiliation_string":"Xidian University, Xian, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100600306","display_name":"Jianfeng Ma","orcid":"https://orcid.org/0000-0003-0846-964X"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianfeng Ma","raw_affiliation_strings":["Xidian University, Xi'an, 710071, China","Xidian University, Xian, China"],"affiliations":[{"raw_affiliation_string":"Xidian University, Xi'an, 710071, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"Xidian University, Xian, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043356063","display_name":"Yulong Shen","orcid":"https://orcid.org/0000-0002-8448-705X"},"institutions":[{"id":"https://openalex.org/I185443292","display_name":"Wayne State University","ror":"https://ror.org/01070mq45","country_code":"US","type":"education","lineage":["https://openalex.org/I185443292"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shen Yulong","raw_affiliation_strings":["Wayne State University, USA"],"affiliations":[{"raw_affiliation_string":"Wayne State University, USA","institution_ids":["https://openalex.org/I185443292"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100626958"],"corresponding_institution_ids":["https://openalex.org/I859038795","https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":0.21871674,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.56765805,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1035","last_page":"1040"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.9764000177383423,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9682000279426575,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7981858253479004},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7778640985488892},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.7242437601089478},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6826361417770386},{"id":"https://openalex.org/keywords/handshake","display_name":"Handshake","score":0.5683058500289917},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.555812418460846},{"id":"https://openalex.org/keywords/challenge-handshake-authentication-protocol","display_name":"Challenge-Handshake Authentication Protocol","score":0.5167214274406433},{"id":"https://openalex.org/keywords/authentication-server","display_name":"Authentication server","score":0.5096001625061035},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.45723968744277954},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.4512450397014618},{"id":"https://openalex.org/keywords/smart-card","display_name":"Smart card","score":0.4376617968082428},{"id":"https://openalex.org/keywords/lightweight-extensible-authentication-protocol","display_name":"Lightweight Extensible Authentication Protocol","score":0.4320133328437805},{"id":"https://openalex.org/keywords/ieee-802.1x","display_name":"IEEE 802.1X","score":0.42450380325317383},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37198373675346375},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.28320491313934326},{"id":"https://openalex.org/keywords/ieee-802.11","display_name":"IEEE 802.11","score":0.25023210048675537},{"id":"https://openalex.org/keywords/wireless-lan","display_name":"Wireless lan","score":0.1995941400527954},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.15857923030853271},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.12556031346321106}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7981858253479004},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7778640985488892},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.7242437601089478},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6826361417770386},{"id":"https://openalex.org/C2778000800","wikidata":"https://www.wikidata.org/wiki/Q830043","display_name":"Handshake","level":3,"score":0.5683058500289917},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.555812418460846},{"id":"https://openalex.org/C207828512","wikidata":"https://www.wikidata.org/wiki/Q1060131","display_name":"Challenge-Handshake Authentication Protocol","level":4,"score":0.5167214274406433},{"id":"https://openalex.org/C2777331311","wikidata":"https://www.wikidata.org/wiki/Q784561","display_name":"Authentication server","level":3,"score":0.5096001625061035},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.45723968744277954},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.4512450397014618},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.4376617968082428},{"id":"https://openalex.org/C167169670","wikidata":"https://www.wikidata.org/wiki/Q1824705","display_name":"Lightweight Extensible Authentication Protocol","level":4,"score":0.4320133328437805},{"id":"https://openalex.org/C28722885","wikidata":"https://www.wikidata.org/wiki/Q1428844","display_name":"IEEE 802.1X","level":5,"score":0.42450380325317383},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37198373675346375},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.28320491313934326},{"id":"https://openalex.org/C185298936","wikidata":"https://www.wikidata.org/wiki/Q193228","display_name":"IEEE 802.11","level":4,"score":0.25023210048675537},{"id":"https://openalex.org/C2985434377","wikidata":"https://www.wikidata.org/wiki/Q212607","display_name":"Wireless lan","level":3,"score":0.1995941400527954},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.15857923030853271},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.12556031346321106},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/glocom.2012.6503249","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2012.6503249","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320334924","display_name":"Program for New Century Excellent Talents in University","ror":"https://ror.org/01mv9t934"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W2105696445","https://openalex.org/W2114566185","https://openalex.org/W2489776261","https://openalex.org/W4253159079","https://openalex.org/W4289127653","https://openalex.org/W4300452270"],"related_works":["https://openalex.org/W2041454996","https://openalex.org/W2982381313","https://openalex.org/W2017959161","https://openalex.org/W3022695109","https://openalex.org/W1987787706","https://openalex.org/W3002467434","https://openalex.org/W2120077621","https://openalex.org/W2161818407","https://openalex.org/W4253316174","https://openalex.org/W4214675446"],"abstract_inverted_index":{"Nowadays,":[0],"with":[1,138],"the":[2,29,39,44,54,64,76,86,90,99,103,116,120],"rapid":[3],"increase":[4],"of":[5,46,98,119],"WLAN-enabled":[6],"mobile":[7,87],"devices,":[8],"new":[9],"scenarios":[10],"emerge":[11],"which":[12,57,74],"require":[13],"a":[14,125],"more":[15],"efficient":[16,67],"WLAN":[17],"initial":[18,68],"link":[19],"setup":[20],"mechanism,":[21],"and":[22,78,89,127],"an":[23,66],"access":[24,69],"authentication":[25,70,117],"method":[26,129],"faster":[27],"than":[28],"current":[30],"IEEE":[31],"802.11i":[32,47],"is":[33,48,51,72,97,130],"desired.":[34],"Our":[35],"analysis":[36],"indicates":[37,93],"that":[38,49,94,111],"essential":[40],"reason":[41],"resulting":[42],"in":[43],"inefficiency":[45],"it":[50,134],"designed":[52],"from":[53],"framework":[55],"perspective":[56],"introduces":[58],"too":[59],"many":[60],"messages.":[61],"To":[62],"overcome":[63],"drawbacks,":[65],"protocol":[71],"proposed":[73],"realizes":[75],"authentications":[77],"key":[79],"distribution":[80],"through":[81],"2":[82],"roundtrip":[83],"messages":[84],"between":[85],"device":[88],"networks.":[91],"Analysis":[92],"our":[95,112],"proposal":[96],"same":[100],"security":[101],"as":[102],"4-way":[104],"handshake":[105],"protocol.":[106],"The":[107],"experiment":[108],"result":[109],"shows":[110],"scheme":[113],"can":[114],"improve":[115],"delay":[118],"EAP-TLS":[121],"by":[122],"94.7%.":[123],"Furthermore,":[124],"simple":[126],"practical":[128],"presented":[131],"to":[132,135],"enable":[133],"be":[136],"compatible":[137],"802.11i.":[139]},"counts_by_year":[{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
