M. Bargh, R. Hulsebosch, H. Eertink, A. Prasad, Hu Wang, P. Schoo
{"title":"IEEE 802.11无线局域网之间切换的快速认证方法","authors":"M. Bargh, R. Hulsebosch, H. Eertink, A. Prasad, Hu Wang, P. Schoo","doi":"10.1145/1024733.1024741","DOIUrl":null,"url":null,"abstract":"Improving authentication delay is a key issue for achieving seamless handovers across networks and domains. This paper presents an overview of fast authentication methods when roaming within or across IEEE 802.11 Wireless-LANs. Besides this overview, the paper analyses the applicability of IEEE 802.11f and Seamoby solutions to enable fast authentication for inter-domain handovers. The paper proposes a number of possible changes to these solutions (typically in terms of network architectures and/or required trust relationships) for inter-domain operation. In addition, the paper identifies the crucial research issues therein. Possible solutions and directions for future research include: update to security infrastructure, inter-layer communication and discovery of appropriate networks.","PeriodicalId":441921,"journal":{"name":"Wireless Mobile Applications and Services on WLAN Hotspots","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"103","resultStr":"{\"title\":\"Fast authentication methods for handovers between IEEE 802.11 wireless LANs\",\"authors\":\"M. Bargh, R. Hulsebosch, H. Eertink, A. Prasad, Hu Wang, P. Schoo\",\"doi\":\"10.1145/1024733.1024741\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Improving authentication delay is a key issue for achieving seamless handovers across networks and domains. This paper presents an overview of fast authentication methods when roaming within or across IEEE 802.11 Wireless-LANs. Besides this overview, the paper analyses the applicability of IEEE 802.11f and Seamoby solutions to enable fast authentication for inter-domain handovers. The paper proposes a number of possible changes to these solutions (typically in terms of network architectures and/or required trust relationships) for inter-domain operation. In addition, the paper identifies the crucial research issues therein. Possible solutions and directions for future research include: update to security infrastructure, inter-layer communication and discovery of appropriate networks.\",\"PeriodicalId\":441921,\"journal\":{\"name\":\"Wireless Mobile Applications and Services on WLAN Hotspots\",\"volume\":\"49 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"103\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Wireless Mobile Applications and Services on WLAN Hotspots\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/1024733.1024741\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Wireless Mobile Applications and Services on WLAN Hotspots","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1024733.1024741","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Fast authentication methods for handovers between IEEE 802.11 wireless LANs
Improving authentication delay is a key issue for achieving seamless handovers across networks and domains. This paper presents an overview of fast authentication methods when roaming within or across IEEE 802.11 Wireless-LANs. Besides this overview, the paper analyses the applicability of IEEE 802.11f and Seamoby solutions to enable fast authentication for inter-domain handovers. The paper proposes a number of possible changes to these solutions (typically in terms of network architectures and/or required trust relationships) for inter-domain operation. In addition, the paper identifies the crucial research issues therein. Possible solutions and directions for future research include: update to security infrastructure, inter-layer communication and discovery of appropriate networks.