Research Article
Efficient Authenticated Wireless Roaming via Tunnels
477 downloads
@INPROCEEDINGS{10.1007/978-3-642-10625-5_47, author={Andreas Noack}, title={Efficient Authenticated Wireless Roaming via Tunnels}, proceedings={3rd International ICST Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications}, proceedings_a={AAA-IDEA}, year={2012}, month={10}, keywords={Wireless networks security key agreement mutual authentication accounting}, doi={10.1007/978-3-642-10625-5_47} }
- Andreas Noack
Year: 2012
Efficient Authenticated Wireless Roaming via Tunnels
AAA-IDEA
Springer
DOI: 10.1007/978-3-642-10625-5_47
Abstract
Wireless roaming means that a mobile device is able to switch from one network cell to another while keeping the link to active services. Recent researches [13] showed that it increases the security to establish an authenticated and confidential tunnel directly to a home network which then acts as service provider respectively proxy server for further external services. In this paper we extend the trust assumptions and formal security goals for (WRT) that were given by Manulis et al.[7].
Copyright © 2009–2024 ICST