Access Control in Wireless Local Area Networks: Fast Authentication Schemes
(2008) p.710-722- Abstract
- Wireless local area networks (WLAN) are rapidly becoming a core part of network access. Supporting user mobility, more specifically session continuation in changing network access points, is becoming an integral part of wireless network services. This is because of the popularity of emerging real-time streaming applications that can be commonly used when the user is mobile, such as voice-over-IP and Internet radio. However, mobility introduces a new set of problems in wireless environments because of handoffs between network access points (APs). The IEEE 802.11i security standard imposes an authentication delay long enough to hamper real-time applications. This chapter will provide a comprehensive study on fast authentication solutions... (More)
- Wireless local area networks (WLAN) are rapidly becoming a core part of network access. Supporting user mobility, more specifically session continuation in changing network access points, is becoming an integral part of wireless network services. This is because of the popularity of emerging real-time streaming applications that can be commonly used when the user is mobile, such as voice-over-IP and Internet radio. However, mobility introduces a new set of problems in wireless environments because of handoffs between network access points (APs). The IEEE 802.11i security standard imposes an authentication delay long enough to hamper real-time applications. This chapter will provide a comprehensive study on fast authentication solutions found in the literature as well as the industry that address this problem. These proposals focus on solving the mentioned problem for intradomain handoff scenarios where the access points belong to the same administrative domain or provider. Interdomain roaming is also becoming common-place for wireless access. We need fast authentication solutions for these environments that are managed by independent administrative authorities. We detail such a solution that explores the use of local trust relationships to foster fast authentication. (Less)
Please use this url to cite or link to this publication:
https://lup.lub.lu.se/record/3129997
- author
- Hassan, Jahan ; Landfeldt, Björn LU and Zomaya, Albert Y.
- publishing date
- 2008
- type
- Chapter in Book/Report/Conference proceeding
- publication status
- published
- subject
- host publication
- Handbook of Research on Wireless Security
- editor
- Zhang, Yan ; Zheng, Jun and Ma, Miao
- pages
- 710 - 722
- ISBN
- 9781599048994
- DOI
- 10.4018/978-1-59904-899-4.ch044
- language
- English
- LU publication?
- no
- id
- f81c1a46-7434-4ed3-8ec5-0a5a404c77bb (old id 3129997)
- date added to LUP
- 2016-04-04 13:43:42
- date last changed
- 2018-11-21 21:15:53
@inbook{f81c1a46-7434-4ed3-8ec5-0a5a404c77bb, abstract = {{Wireless local area networks (WLAN) are rapidly becoming a core part of network access. Supporting user mobility, more specifically session continuation in changing network access points, is becoming an integral part of wireless network services. This is because of the popularity of emerging real-time streaming applications that can be commonly used when the user is mobile, such as voice-over-IP and Internet radio. However, mobility introduces a new set of problems in wireless environments because of handoffs between network access points (APs). The IEEE 802.11i security standard imposes an authentication delay long enough to hamper real-time applications. This chapter will provide a comprehensive study on fast authentication solutions found in the literature as well as the industry that address this problem. These proposals focus on solving the mentioned problem for intradomain handoff scenarios where the access points belong to the same administrative domain or provider. Interdomain roaming is also becoming common-place for wireless access. We need fast authentication solutions for these environments that are managed by independent administrative authorities. We detail such a solution that explores the use of local trust relationships to foster fast authentication.}}, author = {{Hassan, Jahan and Landfeldt, Björn and Zomaya, Albert Y.}}, booktitle = {{Handbook of Research on Wireless Security}}, editor = {{Zhang, Yan and Zheng, Jun and Ma, Miao}}, isbn = {{9781599048994}}, language = {{eng}}, pages = {{710--722}}, title = {{Access Control in Wireless Local Area Networks: Fast Authentication Schemes}}, url = {{http://dx.doi.org/10.4018/978-1-59904-899-4.ch044}}, doi = {{10.4018/978-1-59904-899-4.ch044}}, year = {{2008}}, }