Selecting transition process for WLAN security
نویسندگان
چکیده
In wireless local area network (WLAN), a station (STA) accesses the Internet through an access point (AP). When switching from one AP to another, the STA executes the transition process, which may incur long delay and result in force-termination for real-time applications. The IEEE 802.11r proposes the fast basic service set (BSS) transition to speed up the transition process for a STA moving within the same mobility domain (MD). This scheme requires unique MD assignment so that the STA knows whether it should conduct fast BSS transition process (for intra-MD scenario) or the expensive initial MD association process (for inter-MD scenario). However, how to guarantee unique MD identifier (MDID) assignment is not mentioned in the specification. This paper proposes a mechanism for IEEE 802.11r fast transition without using MDID, and therefore eliminates the cost for MDID management. Copyright # 2007 John Wiley & Sons, Ltd.
منابع مشابه
An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks
The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...
متن کاملProcess algebraic modeling of authentication protocols for analysis of parallel multi-session executions
Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...
متن کاملA Survey of WPA and 802.11i RSN Authentication Protocols
In the new standards for WLAN security, many choices exist for the authentication process. In this paper, we list eight desired properties of WLAN authentication protocols, survey eight recent authentication protocols, and analyze the protocols according to the desired properties.
متن کاملWireless LAN: Security Issues and Solutions
Wireless local area network (WLAN) has been widely used in many sectors. The popularity gained is due to many reasons, such as ease of installation, installation flexibility, mobility, reduced cost-of-ownership, and scalability. However, regardless of the benefits, WLAN have some security threats. This paper begins by introducing the concept of WLAN. The introductory section gives brief informa...
متن کاملCorporate wireless LAN security: threats and an effective security assessment framework for wireless information assurance
In this paper, we propose the necessary steps in implementing strong WLAN security for companies using our visual security assessment framework for wireless information assurance. Through real case studies on the organisations with various security measures and by showing complete execution paths of our framework, we suggest the importance of continual assessment of the WLAN for strong corporat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Wireless Communications and Mobile Computing
دوره 8 شماره
صفحات -
تاریخ انتشار 2008