Seamless Handoff Scheme Based on Pre-registration and Pre-authentication for UMTS-WLAN Interworking
Wireless Personal Communications: An International Journal
Fast and Secure Mobility for IEEE 802.16e Broadband Wireless Networks
ICPPW '07 Proceedings of the 2007 International Conference on Parallel Processing Workshops
A Unified Architecture and Key Techniques for Interworking between WiMAX and Beyond 3G/4G Systems
Wireless Personal Communications: An International Journal
A Secure Handover Protocol Design in Wireless Networks with Formal Verification
WWIC '07 Proceedings of the 5th international conference on Wired/Wireless Internet Communications
Fast, secure handovers in 802.11: back to the basis
Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks
Dual home agent (DHA)-based location management scheme in integrated cellular-WLAN networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Fast Intra-Network and Cross-Layer Handover (FINCH) for WiMAX and Mobile Internet
IEEE Transactions on Mobile Computing
IEEE Transactions on Wireless Communications
3-party approach for fast handover in EAP-based wireless networks
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
Security analysis and enhancements of 3GPP authentication and key agreement protocol
IEEE Transactions on Wireless Communications
IEEE Communications Magazine
Hi-index | 0.00 |
Interworking UMTS and WiMAX networks offers global roaming and cost effective broadband wireless Internet access. Designing efficient Intra and Inter WiMAX handovers in the interworking architecture is a challenging problem. Handovers must be instantaneous and secure at the same time. We attempt to solve this problem by designing Intra and Inter WiMAX handover protocols which are capable of operating in the UMTS-WiMAX interworking architecture and perform mutual pre-authentication between the mobile station and the target network prior to handover. Due to the pre-authentication procedure, our proposed handover protocols outperform standard handover protocols by dispatching fewer handover signaling messages, experiencing less handover delay and preserving computation resources of critical nodes in the interworking architecture. Furthermore, our proposed handover protocols meet essential security requirements and defend against common attacks affecting handover protocols.