On the design of a decentralized and multiauthority access control scheme in federated and cloud-assisted cyber-physical systems

S Sciancalepore, G Piro, D Caldarola… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
While enabling brand new services and opportunities, the federation of vertical Internet of
Things platforms presents new challenges in terms of secure and controlled access to …

An anonymous and accountable authentication scheme for Wi-Fi hotspot access with the Bitcoin blockchain

Y Niu, L Wei, C Zhang, J Liu… - 2017 IEEE/CIC …, 2017 - ieeexplore.ieee.org
Anonymous authentication can protect users' privacy and security when they access public
Wi-Fi hotspots. However, most of the existing privacy-enhanced authentication schemes …

KrackCover: A wireless security framework for covering KRACK attacks

T Chin, K Xiong - Wireless Algorithms, Systems, and Applications: 13th …, 2018 - Springer
This paper proposes KrackCover, a wireless security framework that assists in the detection
of a KRACK attack with suggestions to enhance the privacy of end-users. Within …

Towards Anonymous yet Accountable Authentication for Public Wi-Fi Hotspot Access with Permissionless Blockchains

Y Niu, L Wei, C Zhang, J Liu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Anonymous yet accountable authentication can protect users' privacy and security and
prevent users from misbehaving when they access public Wi-Fi hotspots. However, most …

Enhanced WPA2/PSK for preventing authentication cracking

CL Chen, S Punya - Mobile Wireless Middleware, Operating Systems and …, 2020 - Springer
With the popularization of mobile phones and Wi-Fi hotspots, the diversification of wireless
communication applications has rapidly growing. Wi-Fi Protected Access (WPA), offered by …

On the feasibility of attribute-based encryption for WLAN access control

C Pisa, T Dargahi, A Caponi, G Bianchi… - 2017 IEEE 13th …, 2017 - ieeexplore.ieee.org
User authentication at Wi-Fi Access Points (APs) is becoming an important issue. Wi-Fi APs
are indeed ubiquitous, but existing authentication methods such as WPA/WPA2 static pre …

[PDF][PDF] Multi-Domain Access Rights Composition in Federated IoT Platforms.

S Sciancalepore, G Piro, P Tedeschi, G Boggia… - EWSN, 2018 - ewsn.org
Current activities in the Internet of Things research area are devoting many efforts to the
definition of architectures and mechanisms supporting the federation of heterogeneous …

基于比特币区块链的公共无线局域网接入控制隐私保护研究

牛玉坤, 魏凌波, 张驰, 张霞 - 网络与信息安全学报, 2020 - infocomm-journal.com
在公共无线局域网的访问控制中, 用户隐私保护和用户可问责性是一对相互冲突的目标.
针对该问题, 提出了一种基于比特币区块链和Intel SGX 的匿名且可问责用户管理与访问控制 …

[PDF][PDF] Implementation of a RADIUS server for access control through authentication in wireless networks

CAO Villanueva, A Roman-Gonzalez - 2022 - researchgate.net
In this study, a remote authentication dial in user service (RADIUS) server was implemented,
which offers a wireless security method based on registering users authorized to use the …

A Modified IEEE 802.11 Protocol for Increasing Confidentiality in WLANs

A Ande, N Singh, BK Raju - Innovations in Bio-Inspired Computing and …, 2019 - Springer
In this paper, a modified version of the original IEEE 802.11 security protocol is proposed
and simulated. The protocol in a C++ program is compared against existing standard IEEE …