Proceedings of the 2nd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots 2004
DOI: 10.1145/1024733.1024741
|View full text |Cite
|
Sign up to set email alerts
|

Fast authentication methods for handovers between IEEE 802.11 wireless LANs

Abstract: Improving authentication delay is a key issue for achieving seamless handovers across networks and domains. This paper presents an overview of fast authentication methods when roaming within or across IEEE 802.11 Wireless-LANs. Besides this overview, the paper analyses the applicability of IEEE 802.11f and Seamoby solutions to enable fast authentication for inter-domain handovers. The paper proposes a number of possible changes to these solutions (typically in terms of network architectures and/or required tru… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
34
0

Year Published

2006
2006
2020
2020

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 58 publications
(34 citation statements)
references
References 8 publications
0
34
0
Order By: Relevance
“…This process of communication handover is simply known as handoff. It essentially incorporates a number of message exchanges among the mobile node, the old AP and the new AP which results in physical connection and state transfer from the old AP to the new AP [4]. During this period of handoff from the old AP to the new AP, the mobile station is potentially unable to communicate any type of data traffic.…”
Section: 11 Handoffsmentioning
confidence: 99%
See 3 more Smart Citations
“…This process of communication handover is simply known as handoff. It essentially incorporates a number of message exchanges among the mobile node, the old AP and the new AP which results in physical connection and state transfer from the old AP to the new AP [4]. During this period of handoff from the old AP to the new AP, the mobile station is potentially unable to communicate any type of data traffic.…”
Section: 11 Handoffsmentioning
confidence: 99%
“…The handoff process is performed in three basic stages: detection, search and execution [4]. As its name implies, 'detection' phase is the phase when the MN detects a need for handoff.…”
Section: 11 Handoffsmentioning
confidence: 99%
See 2 more Smart Citations
“…The AAA server, being aware of the neighbor graph, predistributes MKs to potential next APs, significantly reducing authentication latency. Bargh et al [60] discusses the extension of intradomain proactive context distribution for interdomain handoffs. With the proposed scheme, typical message flow is as follows [see Fig.…”
Section: Centralized Internetwork Authenticationmentioning
confidence: 99%