About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
4th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services

Research Article

Network-Layer Assisted Mechanism to Optimize Authentication Delay during Handoff in 802.11 Networks

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/MOBIQ.2007.4451014,
        author={Rafa M. Lopez and Ashutosh Dutta and Yoshihiro Ohba and Henning Schulzrinne and Antonio F. Gomez Skarmeta},
        title={Network-Layer Assisted Mechanism to Optimize Authentication Delay during Handoff in 802.11 Networks},
        proceedings={4th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services},
        publisher={IEEE},
        proceedings_a={MOBIQUITOUS},
        year={2008},
        month={2},
        keywords={Handoff  Mobility  Optimization  Security},
        doi={10.1109/MOBIQ.2007.4451014}
    }
    
  • Rafa M. Lopez
    Ashutosh Dutta
    Yoshihiro Ohba
    Henning Schulzrinne
    Antonio F. Gomez Skarmeta
    Year: 2008
    Network-Layer Assisted Mechanism to Optimize Authentication Delay during Handoff in 802.11 Networks
    MOBIQUITOUS
    IEEE
    DOI: 10.1109/MOBIQ.2007.4451014
Rafa M. Lopez1, Ashutosh Dutta2, Yoshihiro Ohba1, Henning Schulzrinne3, Antonio F. Gomez Skarmeta4
  • 1: Toshiba America Research Inc., Piscataway, New Jersey, USA.
  • 2: Telcordia Technologies, Piscataway, New Jersey, USA
  • 3: Columbia University, New York, NY 10027
  • 4: University of Murcia, Spain.

Abstract

Secured and seamless mobility across heterogeneous access networks needs optimization at all layers. Authentication and security association at the link layer is one of the major components of delay during handoff. We propose a network- layer assisted proactive handoff scheme that helps to optimize the handoff process involving link-layer security across multiple subnets. We demonstrate this proactive scheme and analyze the results for IEEE 802.11-based networks for both roaming and non-roaming scenarios. We then compare these results with the pre-authentication techniques offered by IEEE 802.11i.

Keywords
Handoff Mobility Optimization Security
Published
2008-02-12
Publisher
IEEE
Modified
2011-08-08
http://dx.doi.org/10.1109/MOBIQ.2007.4451014
Copyright © 2007–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL