Fig 1 - uploaded by Min Zhang
Content may be subject to copyright.
The process of key generation and reauthorization 

The process of key generation and reauthorization 

Contexts in source publication

Context 1
... they expire reau- thorization is needed. Figure 1 depicts the whole process of key generation and reauthorization. In this section, we give the details of three procedures and reauthorization. ...
Context 2
... AK's lifetime expires, SS needs to send an Auth- request message to BS to request a new AK. It ends the current process and restart from AK authentication, as shown in Figure 1. Because TEK's lifetime is embedded in AK's, when TEK becomes invalid but it corresponding AK is still alive, SS only needs to send TEK-request message to BS to start the process of TEK transmission. ...
Context 3
... reauthorization occurs when lifetime of AK AKLT is no less than a predefined value tt of time units and TEK is less than tt in message transmission procedure, as defined by the condition part of the following rewrite rule. (0) ) , 8 cmac ( tekrequest ( SAID , PMKSN , flag (1) ) , CMACKEY ) ) ) 9 { sd ( AKLT , tt ) , sd ( tgt , tt ) , ptek } 10 if AKLT >= tt /\ TEKLT < tt . ...

Similar publications

Preprint
Full-text available
In automotive engineering, designing for optimal vehicle dynamics is challenging due to the complexities involved in analysing the behaviour of a multibody system. Typically, a simplified set of dynamics equations for only the key bodies of the vehicle such as the chassis and wheels are formulated while reducing their degrees of freedom. In contras...
Article
Full-text available
Bismuth ferrite (BFO) is one of the few materials which is multiferroic (antiferromagnetic and ferroelectric) at 25°C. In this work, we synthesized multiferroic BFO via sol-gel method and observed its structural and optical properties. While synthesizing BFO, the annealing temperature was at 550°C. X-ray diffraction (XRD) analysis exhibited a rhomb...
Article
Full-text available
Nanocrystalline (NC) materials have widespread industrial usage. X-ray and neutron diffraction techniques are primary tools for studying the structural and microstructural features of NC materials. Selected area electron diffraction (SAED) patterns collected using a transmission electron microscope (TEM) on polycrystalline nanostructured materials,...
Preprint
Full-text available
A 25-year set of daily radiosonde data was used to investigate temperature and humidity inversions at Neumayer Station, coastal Dronning Maud Land, Antarctica. For the first time, inversions were studied differentiating between different synoptic conditions and different height levels. It was shown that, generally, inversions occurred on the majori...
Article
Full-text available
A 25‐year set of daily radiosonde data was used to investigate temperature and humidity inversions at Neumayer Station, coastal Dronning Maud Land, Antarctica. For the first time, inversions were studied differentiating between different synoptic conditions and different height levels. It was shown that, generally, inversions occurred on the majori...

Citations

... However, the result demonstrates that Man in Middle attack may exist in the PKMv3 protocol. In [25], the PKMv3 has been formalized in an algebraic language called Maude. For verification, the authors considered the time features and the behavior of the intruders. ...
... 5. Security analysis of the proposed system has been carried out with respect to a number of security attributes such as reply attack, forgery attack, DoS attack, eavesdropping attack and mutual authentication. The performance of the proposed system has been compared with standard WiMAX and some other existing work [10,17,20,23] and [25] with respect to the above security attributes. It has been established that the proposed system outperforms the other existing work as far as different security issues are concerned. ...
... In this regard, the proposed system proves its supremacy over MAWDK. Moreover, the performance of the proposed system has also been compared with some related existing systems [10,17,20,23] and [25] with respect to computational cost, total computational time and time complexity. The result of analysis shows that the proposed system provides better performance than most of the related existing work with respect to the above mentioned performance parameters. ...