The KryptoKnight family of light-weight protocols for authentication and key distribution
IEEE/ACM Transactions on Networking (TON)
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Protocols for Key Establishment and Authentication
Protocols for Key Establishment and Authentication
The Dolev-Yaho Intruder is the Most Powerful Attacker
LICS '01 Proceedings of the 16th Annual IEEE Symposium on Logic in Computer Science
Improving Cross-domain Authentication overWireless Local Area Networks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Reducing Reauthentication Delay in Wireless Networks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Improved EAP keying framework for a secure mobility access service
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Analytical modeling of random waypoint mobility patterns
Proceedings of the 3rd ACM international workshop on Performance evaluation of wireless ad hoc, sensor and ubiquitous networks
EAP methods for wireless networks
Computer Standards & Interfaces
Kerberized handover keying: a media-independent handover key management architecture
Proceedings of 2nd ACM/IEEE international workshop on Mobility in the evolving internet architecture
Network-Layer Assisted Mechanism to Optimize Authentication Delay during Handoff in 802.11 Networks
MOBIQUITOUS '07 Proceedings of the 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking&Services (MobiQuitous)
Automated Security Protocol Analysis With the AVISPA Tool
Electronic Notes in Theoretical Computer Science (ENTCS)
3-party approach for fast handover in EAP-based wireless networks
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
Secure protocol for fast authentication in EAP-based wireless networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Analysis of Handover Key Management schemes under IETF perspective
Computer Standards & Interfaces
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Authentication in fast handover of mobile IPv6 applying AAA by using hash value
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
The AVISPA tool for the automated validation of internet security protocols and applications
CAV'05 Proceedings of the 17th international conference on Computer Aided Verification
A provable-security treatment of the key-wrap problem
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Proactive key distribution using neighbor graphs
IEEE Wireless Communications
Hybrid multilayer mobility management with AAA context transfer capabilities for all-IP networks
IEEE Wireless Communications
Media-independent pre-authentication supporting secure interdomain handover optimization
IEEE Wireless Communications
Authentication of mobile users
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
In this paper, we present a solution that reduces the time spent on providing network access in multi-domain mobile networks where the authentication process is based on the Extensible Authentication Protocol (EAP). The goal is to achieve fast and smooth handoffs by reducing the latency added by the authentication process. This process is typically required when a mobile user moves from one authenticator to another regardless of whether the new authenticator is in the same domain (intra-domain) or different domain (inter-domain). To achieve an efficient solution to this problem, it has been generally recognized that a fast and secure key distribution process is required. We propose a new fast re-authentication architecture that employs a secure three-party key distribution protocol which reduces the number of message exchanges during the network access control process. Our approach is proved to preserve security and verified by means of a formal tool. The resulting performance benefits are shown through our extensive simulations.