Entity authentication and key distribution
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Provably secure session key distribution: the three party case
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
Towards a completeness result for model checking of security protocols
Journal of Computer Security
Timestamps in key distribution protocols
Communications of the ACM
Protocols for Key Establishment and Authentication
Protocols for Key Establishment and Authentication
On the security of public key protocols
SFCS '81 Proceedings of the 22nd Annual Symposium on Foundations of Computer Science
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
The AVISPA tool for the automated validation of internet security protocols and applications
CAV'05 Proceedings of the 17th international conference on Computer Aided Verification
Fast, secure handovers in 802.11: back to the basis
Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks
A transport-based architecture for fast re-authentication in wireless networks
SARNOFF'09 Proceedings of the 32nd international conference on Sarnoff symposium
Analysis of Handover Key Management schemes under IETF perspective
Computer Standards & Interfaces
Privacy-enhanced fast re-authentication for EAP-based next generation network
Computer Communications
Secure three-party key distribution protocol for fast network access in EAP-based wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A kerberized architecture for fast re-authentication in heterogeneous wireless networks
Mobile Networks and Applications
Vertical handover security in 4G heterogeneous networks: threat analysis and open challenges
FGIT'12 Proceedings of the 4th international conference on Future Generation Information Technology
Hi-index | 0.00 |
In this paper we present a solution for reducing the time spent on providing network access in mobile networks which involve an authentication process based on the Extensible Authentication Protocol. The goal is to provide fast handover and smooth transition by reducing the impact of authentication processes when mobile user changes of authenticator. We propose and describe an architecture based on a secure 3-party key distribution protocol which reduces the number of roundtrips during authentication phase, and verify its secure properties with a formal tool.