Fast, secure handovers in 802.11: back to the basis
Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks
Using the EAP framework for fast media independent handover authentication
Proceedings of the 4th Annual International Conference on Wireless Internet
Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks
Computer Communications
Secure protocol for fast authentication in EAP-based wireless networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Analysis of Handover Key Management schemes under IETF perspective
Computer Standards & Interfaces
A lightweight fast handover authentication scheme in mobile networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Capauth: a capability-based handover scheme
INFOCOM'10 Proceedings of the 29th conference on Information communications
LTE key management analysis with session keys context
Computer Communications
Secure three-party key distribution protocol for fast network access in EAP-based wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A kerberized architecture for fast re-authentication in heterogeneous wireless networks
Mobile Networks and Applications
Wireless handoff optimization: a comparison of IEEE 802.11r and HOKEY
EUNICE'10 Proceedings of the 16th EUNICE/IFIP WG 6.6 conference on Networked services and applications: engineering, control and management
Analysis of mobile authentication protocols by SVO logic
Proceedings of the First International Conference on Security of Internet of Things
Hi-index | 0.00 |
When a wireless mobile user is moving across a mobile network or between co-operating networks, the network operators often want to verify the user's access rights before granting service. The security protocol causes a delay in the network access, which may be much longer than the typical delays caused by mobility management. An alternative would be to provide so called optimistic service before the user has been authenticated or paid for the access. Thus, there is a trade-off between the security of the access control and the quality of service observed by the user. Our aim is to reduce the authentication delay and to enable optimistic access without opening a window for fraudulent access. We present a protocol for the reauthentication of a mobile node when it repeatedly connects to different access points or cooperating wireless networks. The protocol is based on credentials which the mobile receives from access points as a proof of past honest behavior and which it presents when associating with a new access point. It can be implemented with keyed one-way functions that result in low computation and communication overhead both for the mobile and for the network.