2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking &Amp; Services (MobiQuitous) 2007
DOI: 10.1109/mobiq.2007.4451014
|View full text |Cite
|
Sign up to set email alerts
|

Network-Layer Assisted Mechanism to Optimize Authentication Delay during Handoff in 802.11 Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2010
2010
2013
2013

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(13 citation statements)
references
References 7 publications
0
13
0
Order By: Relevance
“…The ITU-T G.114 recommendation (ITU-T Recommendation G.114 (1998)) indicates, for Voice over IP applications, an end-to-end delay of 150 ms as the upper limit and rates 400 ms as a generally unacceptable delay. Similarly, a streaming application has tolerable packet-error rates ranging from 0.1 to 0.00001 with a transfer delay of less than 300 ms. As has been proved in (R. M. Lopez et al (2007)), a full EAP authentication 2 based on a typical EAP method such as EAP-TLS can provoke an unacceptable handoff interruption of about 600 milliseconds (or even in some cases several seconds) for these kind of applications.…”
Section: Fast Re-authentication To Optimize the Network Access Controlmentioning
confidence: 92%
See 2 more Smart Citations
“…The ITU-T G.114 recommendation (ITU-T Recommendation G.114 (1998)) indicates, for Voice over IP applications, an end-to-end delay of 150 ms as the upper limit and rates 400 ms as a generally unacceptable delay. Similarly, a streaming application has tolerable packet-error rates ranging from 0.1 to 0.00001 with a transfer delay of less than 300 ms. As has been proved in (R. M. Lopez et al (2007)), a full EAP authentication 2 based on a typical EAP method such as EAP-TLS can provoke an unacceptable handoff interruption of about 600 milliseconds (or even in some cases several seconds) for these kind of applications.…”
Section: Fast Re-authentication To Optimize the Network Access Controlmentioning
confidence: 92%
“…Network layer solutions (Y. Ohba and A. Yegin (2010), R. M. Lopez et al (2007), A. Dutta et al (2008) have the advantage of being capable to work independent of the underlying access technologies and with authenticators located in different networks or domains.…”
Section: Fig 10 Pre-authentication Mechanismmentioning
confidence: 99%
See 1 more Smart Citation
“…Following a successful EAP authentication, a secure association procedure is typically performed between the mobile device and the TAP to derive a new set of link-layer encryption keys from EAP keying material such as the MSK. The handover latency introduced by full EAP authentication has proven to be higher than that which is acceptable for real-time application scenarios [MQ7]; hence, reduction in handover latency due to EAP is a necessary objective for such scenarios. access networks and the Evolved Packet System (EPS).…”
Section: Handover Executionmentioning
confidence: 99%
“…In some cases, the central authority may be distant from the mobile device. The delay introduced due to such an authentication and authorization procedure adds to the handover latency and consequently affects ongoing application sessions [MQ7]. The discussion in this document is focused on mitigating delay due to EAP authentication.…”
Section: Introductionmentioning
confidence: 99%