AAA in vehicular communication on highways with ad hoc networking support: a proposed architecture
Proceedings of the 2nd ACM international workshop on Vehicular ad hoc networks
MPA assisted Optimized Proactive Handoff Scheme
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
Improving Cross-domain Authentication overWireless Local Area Networks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Reducing Reauthentication Delay in Wireless Networks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
EAP methods for wireless networks
Computer Standards & Interfaces
Kerberized handover keying: a media-independent handover key management architecture
Proceedings of 2nd ACM/IEEE international workshop on Mobility in the evolving internet architecture
Network-Layer Assisted Mechanism to Optimize Authentication Delay during Handoff in 802.11 Networks
MOBIQUITOUS '07 Proceedings of the 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking&Services (MobiQuitous)
3-party approach for fast handover in EAP-based wireless networks
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
Protocols for Authentication and Key Establishment
Protocols for Authentication and Key Establishment
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Fast re-authentication for handovers in wireless communication networks
NETWORKING'06 Proceedings of the 5th international IFIP-TC6 conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems
Proactive key distribution using neighbor graphs
IEEE Wireless Communications
Hybrid multilayer mobility management with AAA context transfer capabilities for all-IP networks
IEEE Wireless Communications
Secure three-party key distribution protocol for fast network access in EAP-based wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A fast handover authentication mechanism based on ticket for IEEE 802.16m
IEEE Communications Letters
GHAP: An Efficient Group-based Handover Authentication Mechanism for IEEE 802.16m Networks
Wireless Personal Communications: An International Journal
Improved migration for mobile computing in distributed networks
Computer Standards & Interfaces
Hi-index | 0.00 |
The Extensible Authentication Protocol (EAP) has been standardized within the Internet Engineering Task Force (IETF) in order to provide flexible mechanisms for authentication and key management for network access control. However, some deficiencies have been revealed and recognized as a major obstacle to achieving secure and seamless handover in mobile scenarios. HOKEY (Handover Keying) Working Group in IETF is standardizing low-latency EAP re-authentication and key distribution protocols to address these deficiencies. This paper provides a critical analysis of the on-going work.