DocumentCode :
1201574
Title :
Handover keying and its uses
Author :
Zheng, Xiao ; Sarikaya, Behcet
Volume :
23
Issue :
2
fYear :
2009
fDate :
3/1/2009 12:00:00 AM
Firstpage :
27
Lastpage :
34
Abstract :
Mobile nodes must authenticate themselves in order to use network services. When mobile nodes roam into a new cell, they must re-authenticate to the new layer 2 and 3 devices. This re-authentication process can take as long as two seconds, which is unacceptable for applications such as voice over IP. In this article we present several recently developed authentication protocols that can reduce the reauthentication delay. Both intra-domain and inter-domain handover scenarios are discussed. We mainly focus on two protocols - 802.11r and EAP Re-authentication protocol for handover keying. These two protocols use security key hierarchies to avoid full authentication. An application of these protocols is presented for the control and provisioning of a wireless access-point network.
Keywords :
cellular radio; message authentication; protocols; radio access networks; wireless LAN; IEEE 802.11r standard; authentication protocol; cellular radio; handover keying technique; mobile node; re-authentication process; wireless access-point network; Access protocols; Authentication; Authorization; Communication system security; Delay; File servers; Internet telephony; Local area networks; Network servers; Wireless application protocol;
fLanguage :
English
Journal_Title :
Network, IEEE
Publisher :
ieee
ISSN :
0890-8044
Type :
jour
DOI :
10.1109/MNET.2009.4804333
Filename :
4804333
Link To Document :
بازگشت