2008
DOI: 10.1109/mwc.2008.4492978
|View full text |Cite
|
Sign up to set email alerts
|

Media-independent pre-authentication supporting secure interdomain handover optimization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0
1

Year Published

2010
2010
2019
2019

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 61 publications
(26 citation statements)
references
References 10 publications
0
25
0
1
Order By: Relevance
“…In interlay mode, both PUs and SUs can transmit concurrently in the same area, without limiting the transfer power of SUs in the PN. In the proposed algorithm PUs and SUs cooperatively share the spectrum provided by PN [3,[10][11][12][13][14][18][19][20].…”
Section: Spectrum Sharing Modes Overviewmentioning
confidence: 99%
“…In interlay mode, both PUs and SUs can transmit concurrently in the same area, without limiting the transfer power of SUs in the PN. In the proposed algorithm PUs and SUs cooperatively share the spectrum provided by PN [3,[10][11][12][13][14][18][19][20].…”
Section: Spectrum Sharing Modes Overviewmentioning
confidence: 99%
“…In [2], proposed a Media Independent Pre-Authentication handover optimization framework. It provide optimization for inter domain and inter technology handover, and also achieve significant reduction in handover delay for both network and application layer.…”
Section: Surveymentioning
confidence: 99%
“…Network layer solutions (Y. Ohba and A. Yegin (2010), R. M. Lopez et al (2007), A. Dutta et al (2008) have the advantage of being capable to work independent of the underlying access technologies and with authenticators located in different networks or domains.…”
Section: Fig 10 Pre-authentication Mechanismmentioning
confidence: 99%
“…The handoff process requires the execution of several tasks (N. Nasser et al (2006)) that negatively affect the handoff latency. In particular, the authentication and key distribution processes have been proven to be one of the most critical components since they require considerable time (A. Dutta et al (2008); Badra et al (2007); C. Politis et al (2004); Marin-Lopez et al (2010); R. M. Lopez et al (2007)). The implantation of these processes during the network access control demanded by network operators is destined to ensure that only allowed users can access the network resources in a secure manner.…”
Section: Introductionmentioning
confidence: 99%