2011
DOI: 10.1186/1687-1499-2011-124
|View full text |Cite
|
Sign up to set email alerts
|

A fast iterative localized re-authentication protocol for UMTS-WLAN heterogeneous mobile communication networks

Abstract: UMTS-WLAN heterogeneous mobile networks allow a single mobile user with different radio technologies to access different mobile networks, but how to secure such interworking networks and provide a seamless service is a new challenge. Even if EAP-AKA protocol provides authentication services in UMTS-WLAN interworking networks, a fast re-authentication of EAP-AKA protocol still cannot overcome high re-authentication delays and delaysensitive applications. Because a mobile user is authenticated by a remote RADIUS… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 22 publications
0
6
0
Order By: Relevance
“…After a successful Intra-HO Pre-Auth, if MS acquires an authentication with the current TAP again, FIL Re-authentication referred to [13] is immediately invoked for supporting stationary user re-authentication. On the other hand, if the MS roams to other TAP within the same WLAN domain, Intra-HO Pre-Auth will be invoked again.…”
Section:  Step 1-3mentioning
confidence: 99%
See 4 more Smart Citations
“…After a successful Intra-HO Pre-Auth, if MS acquires an authentication with the current TAP again, FIL Re-authentication referred to [13] is immediately invoked for supporting stationary user re-authentication. On the other hand, if the MS roams to other TAP within the same WLAN domain, Intra-HO Pre-Auth will be invoked again.…”
Section:  Step 1-3mentioning
confidence: 99%
“…Thereby the ex- Where it encompasses processing delay (DProc), transmission delay (DT) and propagation delay (DProp). The definition of those elements may refer to [10] [13]. According to the trajectory of MS movement model in Figure 7, MS initially at location ○ 1 must acquire a full authentication via the AP1 resided in WLAN1 domain, and then a re-authentication is invoked with the AP1.…”
Section: Performance Evaluationmentioning
confidence: 99%
See 3 more Smart Citations