Using the EAP framework for fast media independent handover authentication

نویسندگان

  • Antonio Izquierdo Manzanares
  • Nada Golmie
  • Katrin Hoeper
  • Lidong Chen
چکیده

In this paper we compare different authentication techniques that may be used in order to reduce the time and resources required to perform a handover: namely, reauthentication and pre-authentication. We provide a detailed analysis of each mechanism, and highlight key performance trade-offs for select scenarios and parameters of interest.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Handover Key Management and Re-Authentication Problem Statement

This document describes the Handover Keying (HOKEY) re-authentication problem statement. The current Extensible Authentication Protocol (EAP) keying framework is not designed to support re-authentication and handovers without re-executing an EAP method. This often causes unacceptable latency in various mobile wireless environments. This document details the problem and defines design goals for ...

متن کامل

EAP Re - authentication Protocol Extensions for Authenticated Anticipatory

The Extensible Authentication Protocol (EAP) is a generic framework supporting multiple types of authentication methods. The EAP Re-authentication Protocol (ERP) specifies extensions to EAP and the EAP keying hierarchy to support an EAP method-independent protocol for efficient re-authentication between the peer and an EAP re-authentication server through any authenticator. Authenticated Antici...

متن کامل

EAP Re-authentication Protocol Extensions for Authenticated Anticipatory Keying (ERP/AAK)

The Extensible Authentication Protocol (EAP) is a generic framework supporting multiple types of authentication methods. The EAP Re-authentication Protocol (ERP) specifies extensions to EAP and the EAP keying hierarchy to support an EAP method-independent protocol for efficient re-authentication between the peer and an EAP re-authentication server through any authenticator. Authenticated Antici...

متن کامل

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

Fast and Secure Handover Schemes Based on Proposed WiMAX over EPON Network Security Architecture

In recent years, the integration of Worldwide Interoperability for Microwave Access (WiMAX) and Ethernet Passive Optical Network (EPON) has become one of the most promising broadband access solutions. The EPON network provides tremendous bandwidth while the WiMAX network can support mobility. Integration of PON and WiMAX combines the best of both technologies. However, the integration requires ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008