ABSTRACT
Improving authentication delay is a key issue for achieving seamless handovers across networks and domains. This paper presents an overview of fast authentication methods when roaming within or across IEEE 802.11 Wireless-LANs. Besides this overview, the paper analyses the applicability of IEEE 802.11f and Seamoby solutions to enable fast authentication for inter-domain handovers. The paper proposes a number of possible changes to these solutions (typically in terms of network architectures and/or required trust relationships) for inter-domain operation. In addition, the paper identifies the crucial research issues therein. Possible solutions and directions for future research include: update to security infrastructure, inter-layer communication and discovery of appropriate networks.
- R. Stewart et.al, "Stream Control Transmission Protocol," IETF RFC 2960, Oct. 2000.Google Scholar
- J. Rosenberg et.al., "Session Initiation Protocol, baseline spec", IETF RFC3261, Jun. 2002.Google Scholar
- Y. Matsunage, A.S. Merino, T. Suzuki, R.H. Katz, "Secure Authentication System for Public WLAN Roaming", in Proc. of WMASH'03, San Diego, California, USA, Sep. 2003. Google ScholarDigital Library
- M. Liebsch, A. Singh (Editors), H. Chaskar, D. Funato, and E. Shim, "Candidate Access Router Discovery", IETF draft <draft-ietf-seamoby-card-protocol-06.txt>, exp. Jun. 2004.Google Scholar
- Port-Based Network Access Control, IEEE 802.1X, 2001.Google Scholar
- Draft Amendment to .. Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Medium Access Control (MAC) Security Enhancement, IEEE Std 802.11i/D10.0, work in progress, July 2003.Google Scholar
- B. Aboba, D. Simon, J. Arkko and H. Levkowetz (Ed.), "EAP Key Management framework", IETF draft <draft-ietf-eap-keying-01.txt>, work in progress, expires: Apr. 2004.Google Scholar
- J. O. Vatn, "An experimental study of IEEE 802.11b handover performance and its effect on voice traffic," Telecommunication Systems Laboratory, Department of Microelectronics and Information Technology, KTH, Royal Institute of Technology, Stockholm, Sweden, Rep. TRITA-IMIT-TSLAB R 03:01, Jul. 2003.Google Scholar
- Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE 802.11, 1999.Google Scholar
- B. Aboba. (2002, Jun. 17). "IEEE 802.1X Pre-authentication" {online}. Available <http://www.drizzle.com/~aboba/IEEE/11-02-TBDr0-I-Pre-Authentication.doc>.Google Scholar
- J. Manner AND M. Kojo, "Mobility Related Terminology", IETF draft <draft-ietf-seamoby-mobility-terminology-06.txt>, expires: Feb. 2004.Google Scholar
- O. Vatn and G.Q. Maguire Jr., "The effect of using co-located care-of addresses on macro handover latency," in Proc. of 14th Nordic Tele-traffic Seminar (NTS 14), Lyngby, Denmark, Aug. 1998.Google Scholar
- D. Johnson, C. Perkins, and J. Arkko, "Mobility Support in IPv6", IETF draft <draft-ietf-mobileip-ipv6-24.txt>, work in progress, Expires: Jun. 2003.Google Scholar
- E. Wedlund, and H. Schulzrinne, "Mobility Support Using SIP," in Proc of 2nd ACM/IEEE International Conference on Wireless and Mobile Multimedia (WoWMoM'99), Seattle, USA, Aug. 1999. Google ScholarDigital Library
- S. Pack and Y. Choi, "Fast Inter-AP Handoff using Predictive-Authentication Scheme in a Public Wireless LAN," in Proc. of Networks 2002 (Joint ICN 2002 and ICWLHN 2002), Aug. 2002.Google Scholar
- P. McCann, "Mobile Ipv6 fast handovers for 802.11 networks", IETF draft <draft-ietf-mipshop-80211fh-00.txt>, work in progress, expires: Aug. 2004.Google Scholar
- IEEE Trial-Use Recommended Practice for Multi-Vendor Access Point Interoperability via an Inter-Access Point Protocol Across Distribution Systems Supporting IEEE 802.11 Operation, IEEE Std 802.11f, Jul. 2003.Google Scholar
- J. Loughney (editor), M. Nakhjiri, C. Perkins, and R. Koodli, "Context Transfer Protocol", Internet draft <draft-ietf-seamoby-ctp-08.txt>, work in progress, expires: Jul. 2004.Google Scholar
- W. Arbaugh and B. Aboba, "Experimental Handoff Extension to RADIUS," IETF draft <draft-irtf-aaaarch-handoff-01.txt>, work in progress, expires: Apr. 2003.Google Scholar
- A. Mishra, M. Shin, N.L. Petroni Jr., T.C. Clancy and W. Arbaugh, "Pro-active Key distribution using Neighbor Graphs," IEEE Wireless Comm. Magazine, Feb. 2004. Google ScholarDigital Library
- A. Mishra, M.H. Shin and W. A. Arbaugh, "Context Caching using Neighbour Graphs for Fast Handoffs in a Wireless Network," in Proc of IEEE INFOCOM, Hong Kong, Mar. 2004.Google Scholar
Index Terms
- Fast authentication methods for handovers between IEEE 802.11 wireless LANs
Recommendations
Fast and Secure Reauthentications for 3GPP Subscribers during WiMAX-WLAN Handovers
Wireless technologies such as the Wireless Local Area Network (WLAN), the Worldwide Interoperability for Microwave Access (WiMAX), and the Third-Generation (3G) mobile communications system complement each other to support a variety of services suited ...
A cross-layer partner-based fast handoff mechanism for IEEE 802.11 wireless networks
In wireless-mobile networks, users freely and frequently change their access points (APs) while they are communicating with other users. To support the mobility of mobile nodes (MNs), Mobile IPv6 (MIPv6) is used to inform the information of MN's home ...
Fast re-authentication for handovers in wireless communication networks
NETWORKING'06: Proceedings of the 5th international IFIP-TC6 conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications SystemsThe evolution of wireless access technologies and the capabilities of today’s mobile devices lead to an increasing demand of communication bandwidth. More and more packet-switched wireless access networks like Wireless Local Area Networks (WLANs) and ...
Comments