Published: November 30, 2008
Author(s)
Katrin Hoeper, Lily Chen, A. Izquierdo Manzanares, N. Golmie
Conference
Name: 4th International ICST Conference on Wireless Interet (WICON 2008)
Dates: November 17-19, 2008
Location: Maui, Hawaii, United States
Citation: Proceedings of the 4th Annual International Conference on Wireless Internet (WICON '08), pp. 30:1-30:9
Announcement
In this paper, we discuss key management challenges for seamless handovers across heterogeneous wireless networks. We focus on fast access authentication protocols that allow expedited network entry by utilizing existing keying material from previous access authentications. For a seamless handover, keys must be available at the target network at the time of the handover. This paper identifies the challenges of securely deriving and timely distributing such keys. We discuss solutions for intra and inter-technology handovers within the same network and between networks with roaming agreements. The presented solutions include different types of handover key hierarchies and key distribution protocols. In addition, we analyze the security performance trade-offs of the discussed solutions.
In this paper, we discuss key management challenges for seamless handovers across heterogeneous wireless networks. We focus on fast access authentication protocols that allow expedited network entry by utilizing existing keying material from previous access authentications. For a seamless handover,...
See full abstract
In this paper, we discuss key management challenges for seamless handovers across heterogeneous wireless networks. We focus on fast access authentication protocols that allow expedited network entry by utilizing existing keying material from previous access authentications. For a seamless handover, keys must be available at the target network at the time of the handover. This paper identifies the challenges of securely deriving and timely distributing such keys. We discuss solutions for intra and inter-technology handovers within the same network and between networks with roaming agreements. The presented solutions include different types of handover key hierarchies and key distribution protocols. In addition, we analyze the security performance trade-offs of the discussed solutions.
Hide full abstract
Keywords
key management; seamless mobility; security
Control Families
None selected