2005
DOI: 10.1002/wcm.335
|View full text |Cite
|
Sign up to set email alerts
|

Integration of authentication and mobility management in third generation and WLAN data networks

Abstract: The successful deployment of wireless local area networks (WLAN) for high speed data transmission and cellular systems for wide coverage and global roaming has emerged to be a complementary platform for wireless data communications. In order to fully exploit potentials in 3G/WLAN integration, authentication of roaming users crossing different networks, must be coupled with mobility management, which is a challenging, yet not resolved issue. The focus of this paper is on state‐of‐art solutions to Wi‐Fi and cell… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2006
2006
2010
2010

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…For example, mobile ad hoc networks have been used to extend the coverage and improve the bandwidth usage of cellular systems (Bhargava et al, 2004;Lin and Hsu, 2000;Luo et al, 2003;Wu et al, 2001). Internet-based mobile ad hoc networks take advantage of the fixed infrastructure to provide ubiquitous communication services to users (Corson et al, 1999;Lim et al, 2006); and 3G/WLAN integration provides both high speed data transmission and wide coverage (Wang et al, 2005). Although this diversity enables users to access network resources ubiquitously, it generates new challenges in enforcing security and preserving privacy in such heterogeneous systems.…”
Section: Heterogeneity and Security In Wireless Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, mobile ad hoc networks have been used to extend the coverage and improve the bandwidth usage of cellular systems (Bhargava et al, 2004;Lin and Hsu, 2000;Luo et al, 2003;Wu et al, 2001). Internet-based mobile ad hoc networks take advantage of the fixed infrastructure to provide ubiquitous communication services to users (Corson et al, 1999;Lim et al, 2006); and 3G/WLAN integration provides both high speed data transmission and wide coverage (Wang et al, 2005). Although this diversity enables users to access network resources ubiquitously, it generates new challenges in enforcing security and preserving privacy in such heterogeneous systems.…”
Section: Heterogeneity and Security In Wireless Networkmentioning
confidence: 99%
“…Therefore, authentication architectures based on Static Security Associations (SSA) do not satisfy the security requirements in these systems. To compensate for this disadvantage, researchers have proposed flexible SAs (FSAs) (Wang et al, 2005) that are created on demand to provide temporary security services. This scheme can drastically reduce the number of SAs among wireless networks, which has been identified as an important factor for security and manageability (Aboba and Vollbrecht, 1999).…”
Section: Authentication In Heterogeneous Networkmentioning
confidence: 99%