3rd International ICST Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications

Research Article

Efficient Authenticated Wireless Roaming via Tunnels

Download
465 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-10625-5_47,
        author={Andreas Noack},
        title={Efficient Authenticated Wireless Roaming via Tunnels},
        proceedings={3rd International ICST Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications},
        proceedings_a={AAA-IDEA},
        year={2012},
        month={10},
        keywords={Wireless networks security key agreement mutual authentication accounting},
        doi={10.1007/978-3-642-10625-5_47}
    }
    
  • Andreas Noack
    Year: 2012
    Efficient Authenticated Wireless Roaming via Tunnels
    AAA-IDEA
    Springer
    DOI: 10.1007/978-3-642-10625-5_47
Andreas Noack1
  • 1: Ruhr University Bochum

Abstract

Wireless roaming means that a mobile device is able to switch from one network cell to another while keeping the link to active services. Recent researches [13] showed that it increases the security to establish an authenticated and confidential tunnel directly to a home network which then acts as service provider respectively proxy server for further external services. In this paper we extend the trust assumptions and formal security goals for (WRT) that were given by Manulis et al.[7].