{"id":"https://openalex.org/W1584136019","doi":"https://doi.org/10.1109/pimrc.2004.1368259","title":"A cost-aware control scheme for efficient authentication in wireless networks","display_name":"A cost-aware control scheme for efficient authentication in wireless networks","publication_year":2005,"publication_date":"2005-03-07","ids":{"openalex":"https://openalex.org/W1584136019","doi":"https://doi.org/10.1109/pimrc.2004.1368259","mag":"1584136019"},"language":"en","primary_location":{"id":"doi:10.1109/pimrc.2004.1368259","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pimrc.2004.1368259","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078519973","display_name":"Wei Liang","orcid":"https://orcid.org/0000-0002-5074-1363"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Wei Liang","raw_affiliation_strings":["Department of Electrical and Computer Engineering, North Carolina State University, Raleigh, NC, USA","Dept. of Electr. & Comput. Eng, North Carolina State Univ., Raleigh, NC, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, North Carolina State University, Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"Dept. of Electr. & Comput. Eng, North Carolina State Univ., Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055831308","display_name":"Wenye Wang","orcid":"https://orcid.org/0000-0001-7892-3196"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wenye Wang","raw_affiliation_strings":["Department of Electrical and Computer Engineering, North Carolina State University, Raleigh, NC, USA","Dept. of Electr. & Comput. Eng, North Carolina State Univ., Raleigh, NC, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, North Carolina State University, Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"Dept. of Electr. & Comput. Eng, North Carolina State Univ., Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5078519973"],"corresponding_institution_ids":["https://openalex.org/I137902535"],"apc_list":null,"apc_paid":null,"fwci":0.3628,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.62832343,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2","issue":null,"first_page":"1548","last_page":"1552"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/roaming","display_name":"Roaming","score":0.8428590297698975},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7954554557800293},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7775048017501831},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6780965328216553},{"id":"https://openalex.org/keywords/lightweight-extensible-authentication-protocol","display_name":"Lightweight Extensible Authentication Protocol","score":0.5173353552818298},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.501924991607666},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.49054235219955444},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4830132722854614},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.48128432035446167},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.27456483244895935},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11737099289894104}],"concepts":[{"id":"https://openalex.org/C194498986","wikidata":"https://www.wikidata.org/wiki/Q680016","display_name":"Roaming","level":2,"score":0.8428590297698975},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7954554557800293},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7775048017501831},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6780965328216553},{"id":"https://openalex.org/C167169670","wikidata":"https://www.wikidata.org/wiki/Q1824705","display_name":"Lightweight Extensible Authentication Protocol","level":4,"score":0.5173353552818298},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.501924991607666},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.49054235219955444},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4830132722854614},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.48128432035446167},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27456483244895935},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11737099289894104},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/pimrc.2004.1368259","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pimrc.2004.1368259","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754)","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.596.2782","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.596.2782","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.ece.ncsu.edu/netwis/papers/lw04pimrc.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1693632770","https://openalex.org/W1731265278","https://openalex.org/W1741219137","https://openalex.org/W1785492489","https://openalex.org/W1978098791","https://openalex.org/W2000791436","https://openalex.org/W2163232949","https://openalex.org/W2544859041","https://openalex.org/W2954168833","https://openalex.org/W2990042924","https://openalex.org/W3016246408","https://openalex.org/W4211255242","https://openalex.org/W6637253233","https://openalex.org/W6637436630","https://openalex.org/W6637498825","https://openalex.org/W6650670161","https://openalex.org/W6729271259","https://openalex.org/W6764835993","https://openalex.org/W6770585142","https://openalex.org/W6775821356"],"related_works":["https://openalex.org/W2360010141","https://openalex.org/W2093798919","https://openalex.org/W2134444393","https://openalex.org/W2107692711","https://openalex.org/W2034419863","https://openalex.org/W2296396257","https://openalex.org/W2132505069","https://openalex.org/W2054202867","https://openalex.org/W2109882692","https://openalex.org/W3007106793"],"abstract_inverted_index":{"We":[0,57],"propose":[1],"a":[2,26,32],"cost-aware":[3],"control":[4,102],"scheme":[5,106],"to":[6,28,49,63,77,98],"realize":[7],"efficient":[8],"authentication":[9,44,66,75,100,109,129],"in":[10],"wireless":[11],"networks":[12,39],"based":[13,89],"on":[14,90],"the":[15,51,54,65,70,86,99,104,108,113,124],"user":[16,91],"density,":[17,92],"mobility,":[18,93],"and":[19,30,94,123],"traffic":[20,95],"patterns":[21],"of":[22,73,116,120,127],"roaming":[23],"users.":[24],"First,":[25],"mechanism":[27],"establish":[29,78],"break":[31],"direct":[33,79],"security":[34],"association":[35],"(SA)":[36],"between":[37,81],"two":[38],"is":[40,47],"introduced.":[41],"Then,":[42],"an":[43,60],"cost":[45,52,110],"function":[46],"developed":[48],"measure":[50],"for":[53],"proposed":[55,105],"scheme.":[56],"further":[58],"investigate":[59],"optimal":[61,71,87],"condition":[62,88],"minimize":[64],"cost,":[67],"which":[68],"decides":[69],"number":[72,115],"inter-domain":[74,128],"requests":[76],"SAs":[80],"networks.":[82],"Finally,":[83],"we":[84],"analyze":[85],"patterns.":[96],"Compared":[97],"without":[101],"scheme,":[103],"reduces":[107],"greatly":[111],"with":[112],"increasing":[114],"hops,":[117],"residence":[118],"time":[119],"mobile":[121],"users,":[122],"arrival":[125],"rate":[126],"requests.":[130]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
