2011
DOI: 10.1109/tdsc.2010.39
|View full text |Cite
|
Sign up to set email alerts
|

Fast and Secure Reauthentications for 3GPP Subscribers during WiMAX-WLAN Handovers

Abstract: Abstract-Wireless technologies such as the Wireless Local Area Network (WLAN), the Worldwide Interoperability for Microwave Access (WiMAX), and the Third-Generation (3G) mobile communications system complement each other to support a variety of services suited for the home, urban, and global environments. As roaming users expect a seamless handover (HO) experience when switching from one wireless network to another, fast and secure HO operations must be supported by the networks. In this paper, we present and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(27 citation statements)
references
References 21 publications
0
27
0
Order By: Relevance
“…Wireless broadband technologies can provide ubiquitous access to MTC devices, particularly, interworking between 3GPP Long Term Evolution (LTE) and the Worldwide Interoperability for Microwave Access (WiMAX) for MTC is attractive [5], [6], [7], [8]. When a group of MTC devices roam from 3GPP network to WiMAX network which belongs to different operator domains, or vice versa, the access authentication must be performed by the corresponding access networks which are regulated by their respective home authentication servers.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Wireless broadband technologies can provide ubiquitous access to MTC devices, particularly, interworking between 3GPP Long Term Evolution (LTE) and the Worldwide Interoperability for Microwave Access (WiMAX) for MTC is attractive [5], [6], [7], [8]. When a group of MTC devices roam from 3GPP network to WiMAX network which belongs to different operator domains, or vice versa, the access authentication must be performed by the corresponding access networks which are regulated by their respective home authentication servers.…”
Section: Introductionmentioning
confidence: 99%
“…When a group of MTC devices roam from 3GPP network to WiMAX network which belongs to different operator domains, or vice versa, the access authentication must be performed by the corresponding access networks which are regulated by their respective home authentication servers. Numerous authentication protocols dedicated for 3GPP-WLAN or WiMAX-WLAN interworking architecture have been proposed, such as [5], [9], [10], [11], [12], [13]. However, there is few research work dealing with authentication issues for 3GPP-WiMAX interworking architecture; moreover, most of the existing protocols are based on symmetric cryptosystem (e.g., EAP-based authentication and key agreement).…”
Section: Introductionmentioning
confidence: 99%
“…The SC-based secure roaming schemes, e.g., EAP-based authentication and key agreement protocols [5], [27], [28], [29], [30], [31], are designed based on standard protocols [32], [33]. SC-based schemes are widely accepted because they are compatible with standard protocols.…”
Section: Related Workmentioning
confidence: 99%
“…Usually hexagonal structure is used in the wireless network performance evaluation [8]. We use the same network model as [21][22][23]. Figure 7 illustrates the proposed network model.…”
Section: Ue Movement In Network Modelmentioning
confidence: 99%