2012
DOI: 10.17487/rfc6697
|View full text |Cite
|
Sign up to set email alerts
|

Handover Keying (HOKEY) Architecture Design

Abstract: Handover Keying (HOKEY) Architecture Design AbstractThe Handover Keying (HOKEY) Working Group seeks to minimize handover delay due to authentication when a peer moves from one point of attachment to another. Work has progressed on two different approaches to reduce handover delay: early authentication (so that authentication does not need to be performed during handover), and reuse of cryptographic material generated during an initial authentication to save time during re-authentication. A basic assumption is … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…An example is Handover Keying (HOKEY) proposed by Internet Engineering Task Force (IETF) Working Group [18]. It is based on modified Extensible Authentication Protocol (EAP), with decreased number of messages sent between parties.…”
Section: Handover Vs Securitymentioning
confidence: 99%
“…An example is Handover Keying (HOKEY) proposed by Internet Engineering Task Force (IETF) Working Group [18]. It is based on modified Extensible Authentication Protocol (EAP), with decreased number of messages sent between parties.…”
Section: Handover Vs Securitymentioning
confidence: 99%