Hong et al., 2010 - Google Patents
Authentication mechanism for fast handoff in cdma2000-WiBro interworkingHong et al., 2010
- Document ID
- 8950034854477161095
- Author
- Hong D
- Kim J
- Shin S
- Publication year
- Publication venue
- Science in China Series F: Information Sciences
External Links
Snippet
In this paper, we propose the authentication mechanism for a handoff in cdma2000-WiBro interworking environment. In the interworking environment, the handoff procedure requires the authentication on MS for the access control and the accounting. In the handoff …
- 238000000034 method 0 abstract description 63
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shin et al. | Wireless network security and interworking | |
CA2642822C (en) | System and method for optimizing authentication procedure during inter access system handovers | |
CA2679378C (en) | Kerberized handover keying optimized for reactive operation | |
Tang et al. | WiMAX security and quality of service: an end-to-end perspective | |
US20080165735A1 (en) | Handoff method of mobile device utilizing dynamic tunnel | |
EP1414262A1 (en) | Authentication method for fast handover in a wireless local area network | |
CA2675961A1 (en) | Kerberized handover keying | |
KR20090066116A (en) | An integrated handover authentication scheme for ngn with wireless access technologies and mobile ip based mobility control | |
El Bouabidi et al. | Secure handoff protocol in 3GPP LTE networks | |
Hong et al. | Authentication mechanism for fast handoff in cdma2000-WiBro interworking | |
Al Shidhani et al. | Reducing re-authentication delays during UMTS-WLAN vertical handovers | |
WO2008091517A1 (en) | Kerberized handover keying | |
Alizadeh et al. | Security and privacy criteria to evaluate authentication mechanisms in proxy mobile ipv6 | |
Chu et al. | Secure data transmission with cloud computing in heterogeneous wireless networks | |
Khan | Secure and efficient vertical handover in heterogeneous wireless networks | |
Othmen et al. | Re-authentication protocol from WLAN to LTE (ReP WLAN-LTE) | |
Ouyang et al. | A secure context transfer scheme for integration of UMTS and 802.11 WLANs | |
Krishnamurthi et al. | Using the liberty alliance architecture to secure IP-level handovers | |
Li et al. | A proxy based authentication localisation scheme for handover between non trust-associated domains | |
Yang et al. | A robust authentication protocol with non-repudiation service for integrating WLAN and 3G network | |
Al Shidhani et al. | Secured fast link-layer handover protocols for 3G-WLAN interworking architecture | |
Lim et al. | A Fast and Efficient Authentication Protocol for a Seamless Handover between a WLAN and WiBro | |
Zhang | Interworking security in heterogeneous wireless IP networks | |
Manjaragi et al. | Survey of Security Models in Heterogeneous Wireless Networks | |
Idrissi et al. | A new authentication method for vertical and horizontal handover in 3G-WLAN interworking architecture |