The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness &Amp; Worksho 2007
DOI: 10.1145/1577222.1577284
|View full text |Cite
|
Sign up to set email alerts
|

Secured fast link-layer handover protocols for 3G-WLAN interworking architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2008
2008
2012
2012

Publication Types

Select...
2
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…UE might reauthenticate with the same AP (i.e., without handover) or with a target AP (TAP) during a handover. In this paper we focus on re-authentications with the same AP only; handover-initiated re-authentications are discussed in details in Reference [15]. A new UE local identity (ID) is included in the authentication challenge message generated by HAAA and WAAA in the modified EAP-AKA full authentication and LFR, respectively.…”
Section: Assumptionsmentioning
confidence: 99%
See 2 more Smart Citations
“…UE might reauthenticate with the same AP (i.e., without handover) or with a target AP (TAP) during a handover. In this paper we focus on re-authentications with the same AP only; handover-initiated re-authentications are discussed in details in Reference [15]. A new UE local identity (ID) is included in the authentication challenge message generated by HAAA and WAAA in the modified EAP-AKA full authentication and LFR, respectively.…”
Section: Assumptionsmentioning
confidence: 99%
“…Since EMSK usage is not specified by EAP-AKA, we propose using it in handover re-authentication. The keys derived from EMSK are the handover root key (HOK), the domain-level handover key (DHOK), and the local-level handover key (LHOK) [15]. Figure 3 shows the proposed extensions to the key hierarchy.…”
Section: Extensions To the Key Hierarchymentioning
confidence: 99%
See 1 more Smart Citation
“…This includes VH situations when the VE detaches from a UMTS network and attaches to an AP it was previously associated with. DHOK is used in horizontal WLAN handovers [11]. VE and WAAA needs to generate an additional key, K WAAA -UE , to protect the communications between them.…”
Section: Local Fast Re-authentication Protocolmentioning
confidence: 99%