Overview of IEEE 802.16 Security
IEEE Security and Privacy
Personal AP Protocol for Mobility Management in IEEE 802.11 Systems
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
Security issues in privacy and key management protocols of IEEE 802.16
Proceedings of the 44th annual Southeast regional conference
A seamless handover mechanism for IEEE 802.16e broadband wireless access
ICCS'05 Proceedings of the 5th international conference on Computational Science - Volume Part II
Operational semantics of security protocols
SMTT'03 Proceedings of the 2003 international conference on Scenarios: models, Transformations and Tools
Hi-index | 0.00 |
An overview of the EAP-based handover procedures of the IEEE 802.16e standard is introduced and their security vulnerabilities are analyzed. Possible solutions for secure handover in IEEE 802.16e networks that guarantee a backward and forward secrecy are described and formally verified using Scyther, a specialized model checker for security protocols. These solutions showed a few drawbacks in the verified procedure and some modifications are proposed for a more secure and efficient handover protocol.