Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Provably secure key exchange: an engineering approach
ACSW Frontiers '03 Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003 - Volume 21
Authentication platform for seamless handover in heterogeneous environments
ICAS-ICNS '05 Proceedings of the Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services
SAP: seamless authentication protocol for vertical handoff in heterogeneous wireless networks
QShine '06 Proceedings of the 3rd international conference on Quality of service in heterogeneous wired/wireless networks
Battery efficient wireless system discovery scheme for inter-system handover
PDCN'07 Proceedings of the 25th conference on Proceedings of the 25th IASTED International Multi-Conference: parallel and distributed computing and networks
A Vertical Handoff Decision Algorithm for Next Generation Wireless Networks
BROADCOM '08 Proceedings of the 2008 Third International Conference on Broadband Communications, Information Technology & Biomedical Applications
Secure media independent handover message transport in heterogeneous networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
IEEE Communications Surveys & Tutorials
Vertical handoffs in fourth-generation multinetwork environments
IEEE Wireless Communications
A framework for seamless roaming across cellular and wireless local area networks
IEEE Wireless Communications
Handoffs in fourth generation heterogeneous networks
IEEE Communications Magazine
Hi-index | 0.00 |
Seamless handover across different access technologies is very important in the future wireless networks. To optimize vertical handover in heterogeneous networks, IEEE 802.21 standard defines Media Independent Handover (MIH) services. The MIH services can be a new target to attackers, which will be the main concern for equipment vendors and service providers. In this paper, we focus specifically on security of Media Independent Information Service (MIIS) and present a new access authentication scheme with user anonymity for MIIS. The protocol can be used to establish a secure channel between the mobile node and the information server. Security and performance of the protocol are also analyzed in this paper.