Four-way handshake protocol for authenticating in multiple mix-zones Article Swipe
YOU?
·
· 2018
· Open Access
·
· DOI: https://doi.org/10.14419/ijet.v7i2.4.13039
Authentication is the process of verifying that the users who they claim to be or not, it is based on identity and credentials. Most of the attacks can be reduced using authentication process. Authentication is important because as the amount of online data sharing has increased, threats and fraud in a large amount are also increased, a changing of the guard which provides security to mobile devices is needed for which authentication is necessary. Privacy of user’s location is important in mobile networks, there are several strategies to protect the personal information (i.e., their location). In previous work it is introduced that the mix zone model which will change the old pseudonyms to new pseudonyms and anonymizes user’s identity by restricting the position where users can be located. Later work, even in the multiple mix-zones model, attackers can attack by using side information (like footprints, navigation etc.). So, we need an authentication protocol while two mix-zones or user-services are communicating. We came across different authentication protocols like PAP, CHAP, and EAP. In this paper, a four-way handshake protocol is implemented for providing authentication while multiple mix-zones are communicating. A four-way handshake authentication protocol i.e., WPA-PSK protocol for verification. WPA-PSK is applied in such a way that both STA(supplicant) and AP(authenticator) can check that they are re-agreeing on a non-forged RSN and IE, therefore they are using the most secure available protocols.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.14419/ijet.v7i2.4.13039
- OA Status
- diamond
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W2941326883
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W2941326883Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.14419/ijet.v7i2.4.13039Digital Object Identifier
- Title
-
Four-way handshake protocol for authenticating in multiple mix-zonesWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2018Year of publication
- Publication date
-
2018-03-10Full publication date if available
- Authors
-
Senthil Kumar Thangavel, S Prabhakaran, V. PrashanthList of authors in order
- Landing page
-
https://doi.org/10.14419/ijet.v7i2.4.13039Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.14419/ijet.v7i2.4.13039Direct OA link when available
- Concepts
-
Handshake, Computer science, Authentication protocol, Authentication (law), Computer security, Challenge-Handshake Authentication Protocol, Protocol (science), Computer network, Lightweight Extensible Authentication Protocol, Replay attack, Medicine, Pathology, Asynchronous communication, Alternative medicineTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W2941326883 |
|---|---|
| doi | https://doi.org/10.14419/ijet.v7i2.4.13039 |
| ids.doi | https://doi.org/10.14419/ijet.v7i2.4.13039 |
| ids.mag | 2941326883 |
| ids.openalex | https://openalex.org/W2941326883 |
| fwci | 0.0 |
| type | article |
| title | Four-way handshake protocol for authenticating in multiple mix-zones |
| biblio.issue | 2.4 |
| biblio.volume | 7 |
| biblio.last_page | 200 |
| biblio.first_page | 200 |
| topics[0].id | https://openalex.org/T11504 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9991999864578247 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Advanced Authentication Protocols Security |
| topics[1].id | https://openalex.org/T11800 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9958000183105469 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1710 |
| topics[1].subfield.display_name | Information Systems |
| topics[1].display_name | User Authentication and Security Systems |
| topics[2].id | https://openalex.org/T10651 |
| topics[2].field.id | https://openalex.org/fields/22 |
| topics[2].field.display_name | Engineering |
| topics[2].score | 0.9732000231742859 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/2208 |
| topics[2].subfield.display_name | Electrical and Electronic Engineering |
| topics[2].display_name | IPv6, Mobility, Handover, Networks, Security |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C2778000800 |
| concepts[0].level | 3 |
| concepts[0].score | 0.7864630222320557 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q830043 |
| concepts[0].display_name | Handshake |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.7674649357795715 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C21564112 |
| concepts[2].level | 3 |
| concepts[2].score | 0.7577992677688599 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q4825885 |
| concepts[2].display_name | Authentication protocol |
| concepts[3].id | https://openalex.org/C148417208 |
| concepts[3].level | 2 |
| concepts[3].score | 0.6631648540496826 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q4825882 |
| concepts[3].display_name | Authentication (law) |
| concepts[4].id | https://openalex.org/C38652104 |
| concepts[4].level | 1 |
| concepts[4].score | 0.6593722105026245 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[4].display_name | Computer security |
| concepts[5].id | https://openalex.org/C207828512 |
| concepts[5].level | 4 |
| concepts[5].score | 0.6072770357131958 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q1060131 |
| concepts[5].display_name | Challenge-Handshake Authentication Protocol |
| concepts[6].id | https://openalex.org/C2780385302 |
| concepts[6].level | 3 |
| concepts[6].score | 0.528806209564209 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q367158 |
| concepts[6].display_name | Protocol (science) |
| concepts[7].id | https://openalex.org/C31258907 |
| concepts[7].level | 1 |
| concepts[7].score | 0.5182249546051025 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[7].display_name | Computer network |
| concepts[8].id | https://openalex.org/C167169670 |
| concepts[8].level | 4 |
| concepts[8].score | 0.49100354313850403 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q1824705 |
| concepts[8].display_name | Lightweight Extensible Authentication Protocol |
| concepts[9].id | https://openalex.org/C11560541 |
| concepts[9].level | 3 |
| concepts[9].score | 0.44890350103378296 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q1756025 |
| concepts[9].display_name | Replay attack |
| concepts[10].id | https://openalex.org/C71924100 |
| concepts[10].level | 0 |
| concepts[10].score | 0.0 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q11190 |
| concepts[10].display_name | Medicine |
| concepts[11].id | https://openalex.org/C142724271 |
| concepts[11].level | 1 |
| concepts[11].score | 0.0 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q7208 |
| concepts[11].display_name | Pathology |
| concepts[12].id | https://openalex.org/C151319957 |
| concepts[12].level | 2 |
| concepts[12].score | 0.0 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q752739 |
| concepts[12].display_name | Asynchronous communication |
| concepts[13].id | https://openalex.org/C204787440 |
| concepts[13].level | 2 |
| concepts[13].score | 0.0 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q188504 |
| concepts[13].display_name | Alternative medicine |
| keywords[0].id | https://openalex.org/keywords/handshake |
| keywords[0].score | 0.7864630222320557 |
| keywords[0].display_name | Handshake |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.7674649357795715 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/authentication-protocol |
| keywords[2].score | 0.7577992677688599 |
| keywords[2].display_name | Authentication protocol |
| keywords[3].id | https://openalex.org/keywords/authentication |
| keywords[3].score | 0.6631648540496826 |
| keywords[3].display_name | Authentication (law) |
| keywords[4].id | https://openalex.org/keywords/computer-security |
| keywords[4].score | 0.6593722105026245 |
| keywords[4].display_name | Computer security |
| keywords[5].id | https://openalex.org/keywords/challenge-handshake-authentication-protocol |
| keywords[5].score | 0.6072770357131958 |
| keywords[5].display_name | Challenge-Handshake Authentication Protocol |
| keywords[6].id | https://openalex.org/keywords/protocol |
| keywords[6].score | 0.528806209564209 |
| keywords[6].display_name | Protocol (science) |
| keywords[7].id | https://openalex.org/keywords/computer-network |
| keywords[7].score | 0.5182249546051025 |
| keywords[7].display_name | Computer network |
| keywords[8].id | https://openalex.org/keywords/lightweight-extensible-authentication-protocol |
| keywords[8].score | 0.49100354313850403 |
| keywords[8].display_name | Lightweight Extensible Authentication Protocol |
| keywords[9].id | https://openalex.org/keywords/replay-attack |
| keywords[9].score | 0.44890350103378296 |
| keywords[9].display_name | Replay attack |
| language | en |
| locations[0].id | doi:10.14419/ijet.v7i2.4.13039 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210200385 |
| locations[0].source.issn | 2227-524X |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2227-524X |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | International Journal of Engineering & Technology |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | cc-by |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | International Journal of Engineering & Technology |
| locations[0].landing_page_url | https://doi.org/10.14419/ijet.v7i2.4.13039 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5009128496 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-8160-7223 |
| authorships[0].author.display_name | Senthil Kumar Thangavel |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | T Senthil Kumar |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5109610743 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | S Prabhakaran |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | S Prabhakaran |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5054442453 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | V. Prashanth |
| authorships[2].author_position | last |
| authorships[2].raw_author_name | V Prashanth |
| authorships[2].is_corresponding | False |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.14419/ijet.v7i2.4.13039 |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Four-way handshake protocol for authenticating in multiple mix-zones |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11504 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9991999864578247 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Advanced Authentication Protocols Security |
| related_works | https://openalex.org/W2093798919, https://openalex.org/W2107692711, https://openalex.org/W2360010141, https://openalex.org/W2147816236, https://openalex.org/W2941888532, https://openalex.org/W2377502939, https://openalex.org/W2355344682, https://openalex.org/W2162625095, https://openalex.org/W1661403104, https://openalex.org/W2112704031 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.14419/ijet.v7i2.4.13039 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210200385 |
| best_oa_location.source.issn | 2227-524X |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2227-524X |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | International Journal of Engineering & Technology |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | International Journal of Engineering & Technology |
| best_oa_location.landing_page_url | https://doi.org/10.14419/ijet.v7i2.4.13039 |
| primary_location.id | doi:10.14419/ijet.v7i2.4.13039 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210200385 |
| primary_location.source.issn | 2227-524X |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2227-524X |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | International Journal of Engineering & Technology |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | cc-by |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | International Journal of Engineering & Technology |
| primary_location.landing_page_url | https://doi.org/10.14419/ijet.v7i2.4.13039 |
| publication_date | 2018-03-10 |
| publication_year | 2018 |
| referenced_works_count | 0 |
| abstract_inverted_index.A | 188 |
| abstract_inverted_index.a | 50, 56, 174, 203, 217 |
| abstract_inverted_index.In | 95, 171 |
| abstract_inverted_index.We | 160 |
| abstract_inverted_index.an | 150 |
| abstract_inverted_index.as | 37 |
| abstract_inverted_index.be | 13, 28, 126 |
| abstract_inverted_index.by | 119, 139 |
| abstract_inverted_index.in | 49, 80, 131, 201 |
| abstract_inverted_index.is | 1, 17, 34, 67, 72, 78, 99, 178, 199 |
| abstract_inverted_index.it | 16, 98 |
| abstract_inverted_index.of | 4, 24, 40, 58, 75 |
| abstract_inverted_index.on | 19, 216 |
| abstract_inverted_index.or | 14, 156 |
| abstract_inverted_index.to | 12, 64, 87, 112 |
| abstract_inverted_index.we | 148 |
| abstract_inverted_index.IE, | 221 |
| abstract_inverted_index.RSN | 219 |
| abstract_inverted_index.So, | 147 |
| abstract_inverted_index.and | 21, 47, 115, 169, 208, 220 |
| abstract_inverted_index.are | 53, 84, 158, 186, 214, 224 |
| abstract_inverted_index.can | 27, 125, 137, 210 |
| abstract_inverted_index.for | 69, 180, 196 |
| abstract_inverted_index.has | 44 |
| abstract_inverted_index.mix | 103 |
| abstract_inverted_index.new | 113 |
| abstract_inverted_index.old | 110 |
| abstract_inverted_index.the | 2, 7, 25, 38, 59, 89, 102, 109, 121, 132, 226 |
| abstract_inverted_index.two | 154 |
| abstract_inverted_index.way | 204 |
| abstract_inverted_index.who | 9 |
| abstract_inverted_index.EAP. | 170 |
| abstract_inverted_index.Most | 23 |
| abstract_inverted_index.PAP, | 167 |
| abstract_inverted_index.also | 54 |
| abstract_inverted_index.both | 206 |
| abstract_inverted_index.came | 161 |
| abstract_inverted_index.data | 42 |
| abstract_inverted_index.even | 130 |
| abstract_inverted_index.like | 166 |
| abstract_inverted_index.most | 227 |
| abstract_inverted_index.need | 149 |
| abstract_inverted_index.not, | 15 |
| abstract_inverted_index.side | 141 |
| abstract_inverted_index.such | 202 |
| abstract_inverted_index.that | 6, 101, 205, 212 |
| abstract_inverted_index.they | 10, 213, 223 |
| abstract_inverted_index.this | 172 |
| abstract_inverted_index.will | 107 |
| abstract_inverted_index.work | 97 |
| abstract_inverted_index.zone | 104 |
| abstract_inverted_index.(like | 143 |
| abstract_inverted_index.CHAP, | 168 |
| abstract_inverted_index.Later | 128 |
| abstract_inverted_index.based | 18 |
| abstract_inverted_index.check | 211 |
| abstract_inverted_index.claim | 11 |
| abstract_inverted_index.fraud | 48 |
| abstract_inverted_index.guard | 60 |
| abstract_inverted_index.i.e., | 193 |
| abstract_inverted_index.large | 51 |
| abstract_inverted_index.model | 105 |
| abstract_inverted_index.their | 93 |
| abstract_inverted_index.there | 83 |
| abstract_inverted_index.users | 8, 124 |
| abstract_inverted_index.using | 30, 140, 225 |
| abstract_inverted_index.where | 123 |
| abstract_inverted_index.which | 61, 70, 106 |
| abstract_inverted_index.while | 153, 183 |
| abstract_inverted_index.work, | 129 |
| abstract_inverted_index.(i.e., | 92 |
| abstract_inverted_index.across | 162 |
| abstract_inverted_index.amount | 39, 52 |
| abstract_inverted_index.attack | 138 |
| abstract_inverted_index.change | 108 |
| abstract_inverted_index.etc.). | 146 |
| abstract_inverted_index.mobile | 65, 81 |
| abstract_inverted_index.model, | 135 |
| abstract_inverted_index.needed | 68 |
| abstract_inverted_index.online | 41 |
| abstract_inverted_index.paper, | 173 |
| abstract_inverted_index.secure | 228 |
| abstract_inverted_index.Privacy | 74 |
| abstract_inverted_index.WPA-PSK | 194, 198 |
| abstract_inverted_index.applied | 200 |
| abstract_inverted_index.attacks | 26 |
| abstract_inverted_index.because | 36 |
| abstract_inverted_index.devices | 66 |
| abstract_inverted_index.process | 3 |
| abstract_inverted_index.protect | 88 |
| abstract_inverted_index.reduced | 29 |
| abstract_inverted_index.several | 85 |
| abstract_inverted_index.sharing | 43 |
| abstract_inverted_index.threats | 46 |
| abstract_inverted_index.changing | 57 |
| abstract_inverted_index.four-way | 175, 189 |
| abstract_inverted_index.identity | 20, 118 |
| abstract_inverted_index.located. | 127 |
| abstract_inverted_index.location | 77 |
| abstract_inverted_index.multiple | 133, 184 |
| abstract_inverted_index.personal | 90 |
| abstract_inverted_index.position | 122 |
| abstract_inverted_index.previous | 96 |
| abstract_inverted_index.process. | 32 |
| abstract_inverted_index.protocol | 152, 177, 192, 195 |
| abstract_inverted_index.provides | 62 |
| abstract_inverted_index.security | 63 |
| abstract_inverted_index.user’s | 76, 117 |
| abstract_inverted_index.attackers | 136 |
| abstract_inverted_index.available | 229 |
| abstract_inverted_index.different | 163 |
| abstract_inverted_index.handshake | 176, 190 |
| abstract_inverted_index.important | 35, 79 |
| abstract_inverted_index.mix-zones | 134, 155, 185 |
| abstract_inverted_index.networks, | 82 |
| abstract_inverted_index.protocols | 165 |
| abstract_inverted_index.providing | 181 |
| abstract_inverted_index.therefore | 222 |
| abstract_inverted_index.verifying | 5 |
| abstract_inverted_index.anonymizes | 116 |
| abstract_inverted_index.increased, | 45, 55 |
| abstract_inverted_index.introduced | 100 |
| abstract_inverted_index.location). | 94 |
| abstract_inverted_index.navigation | 145 |
| abstract_inverted_index.necessary. | 73 |
| abstract_inverted_index.non-forged | 218 |
| abstract_inverted_index.protocols. | 230 |
| abstract_inverted_index.pseudonyms | 111, 114 |
| abstract_inverted_index.strategies | 86 |
| abstract_inverted_index.footprints, | 144 |
| abstract_inverted_index.implemented | 179 |
| abstract_inverted_index.information | 91, 142 |
| abstract_inverted_index.re-agreeing | 215 |
| abstract_inverted_index.restricting | 120 |
| abstract_inverted_index.credentials. | 22 |
| abstract_inverted_index.user-services | 157 |
| abstract_inverted_index.verification. | 197 |
| abstract_inverted_index.Authentication | 0, 33 |
| abstract_inverted_index.authentication | 31, 71, 151, 164, 182, 191 |
| abstract_inverted_index.communicating. | 159, 187 |
| abstract_inverted_index.STA(supplicant) | 207 |
| abstract_inverted_index.AP(authenticator) | 209 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 3 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/16 |
| sustainable_development_goals[0].score | 0.7799999713897705 |
| sustainable_development_goals[0].display_name | Peace, Justice and strong institutions |
| citation_normalized_percentile.value | 0.24812723 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |