WOWMOM '99 Proceedings of the 2nd ACM international workshop on Wireless mobile multimedia
Secure authentication system for public WLAN roaming
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Proactive key distribution using neighbor graphs
IEEE Wireless Communications
SAP: seamless authentication protocol for vertical handoff in heterogeneous wireless networks
QShine '06 Proceedings of the 3rd international conference on Quality of service in heterogeneous wired/wireless networks
Optimized ticket distribution scheme for fast re-authentication protocol (fap)
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Fast pre-authentication with minimized overhead and high security for WLAN handoff
WSEAS Transactions on Computers
Predictive channel scanning over WLAN
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A proxy based authentication localisation scheme for handover between non trust-associated domains
ACM SIGMOBILE Mobile Computing and Communications Review
Wireless handoff optimization: a comparison of IEEE 802.11r and HOKEY
EUNICE'10 Proceedings of the 16th EUNICE/IFIP WG 6.6 conference on Networked services and applications: engineering, control and management
A hash-chain based authentication scheme for fast handover in wireless network
WISA'05 Proceedings of the 6th international conference on Information Security Applications
SP 800-48 Rev. 1. Guide to Securing Legacy IEEE 802.11 Wireless Networks
SP 800-48 Rev. 1. Guide to Securing Legacy IEEE 802.11 Wireless Networks
SP 800-97. Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i
SP 800-97. Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i
International Journal of Information Security and Privacy
Hi-index | 0.00 |
Improving authentication delay is a key issue for achieving seamless handovers across networks and domains. This paper presents an overview of fast authentication methods when roaming within or across IEEE 802.11 Wireless-LANs. Besides this overview, the paper analyses the applicability of IEEE 802.11f and Seamoby solutions to enable fast authentication for inter-domain handovers. The paper proposes a number of possible changes to these solutions (typically in terms of network architectures and/or required trust relationships) for inter-domain operation. In addition, the paper identifies the crucial research issues therein. Possible solutions and directions for future research include: update to security infrastructure, inter-layer communication and discovery of appropriate networks.