Proceedings of the 1st ACM Workshop on Wireless Multimedia Networking and Performance Modeling 2005
DOI: 10.1145/1089737.1089746
|View full text |Cite
|
Sign up to set email alerts
|

Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks

Abstract: Recently, user mobility in wireless data networks is increasing because of the popularity of portable devices and the desire for voice and multimedia applications. These applications, however, require fast handoffs among base stations to maintain the quality of the connections. Re-authentication during handoff procedures causes a long handoff latency which affects the flow and service quality especially for multimedia applications. Therefore minimizing re-authentication latency is crucial in order to support r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
50
0

Year Published

2008
2008
2016
2016

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 61 publications
(50 citation statements)
references
References 12 publications
0
50
0
Order By: Relevance
“…Celia and et al in [6] divide the authentication protocols in wireless networks into three categories: a) Multi-hop authentication [7], b) Pro-active authentication [8], and c) Ticket-based authentication [5, 9, and 10]. Multi-hop authentication protocols require that the MS must return to the AS server each time of hop for re-authentication, which may be existed very far from the MS.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Celia and et al in [6] divide the authentication protocols in wireless networks into three categories: a) Multi-hop authentication [7], b) Pro-active authentication [8], and c) Ticket-based authentication [5, 9, and 10]. Multi-hop authentication protocols require that the MS must return to the AS server each time of hop for re-authentication, which may be existed very far from the MS.…”
Section: Related Workmentioning
confidence: 99%
“…The PMK is the necessary key for the MS and Target Base Stations (TBSs) for encrypting the upcoming messages exchanged between each other. In [8], new proactive authentication methods are proposed. They use the Inter Access Point Protocol (IAPP) [11].…”
Section: Related Workmentioning
confidence: 99%
“…Kassab et al [6] propose two fast re-authentication methods: ''PKD with IAPP cashing'' and ''PKD with anticipated 4-way Handshake''. In the ''PDK with IAPP cashing'' method, the current access point calculates PMK and PTK for its neighbors, and then pre-distributes these keys to each one using the IAPP.…”
Section: Related Workmentioning
confidence: 99%
“…In [12] and [13] the authors propose mobility prediction algorithms based on the pre-authentication of wireless stations on multiple APs.…”
Section: Analysis and Reduction Of Handoff Latenciesmentioning
confidence: 99%