Skip to main content

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

  • 578 Accesses

Abstract

In this chapter, we further discuss the security mechanisms to enhance seamless roaming over heterogeneous wireless networks. The existing security solutions in current cellular networks and IEEE 802.11 WLAN are first introduced in Sect. 4.1. Some related work on security-enabled seamless roaming is briefly summarized in Sect. 4.2. Finally, our recent work on secure enhancement in seamless roaming, based on our SHAWK platform, is presented in Sect. 4.3, including a unified access test-bed and a VCL/VAS-based security scheme for fast handover.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. 3GPP: Ts 133 234 v8.1.0 universal mobile telecommunications system (umts);lte;3g security;wireless local area network (wlan) interworking security (2009)

    Google Scholar 

  2. Aura, T., Roe, M.: Reducing reauthentication delay in wireless networks. In: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SECURECOMM ’05, pp. 139–148. IEEE Computer Society, Washington, DC, USA (2005). DOI 10.1109/SECURECOMM.2005.58. URL http://dx.doi.org/10.1109/SECURECOMM.2005.58

  3. Braun, T., Kim, H.: Efficient authentication and authorization of mobile users based on peer-to-peer network mechanisms. In: Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences – Volume 09, HICSS ’05, pp. 306.2–. IEEE Computer Society, Washington, DC, USA (2005). DOI 10.1109/HICSS.2005.226. URL http://dx.doi.org/10.1109/HICSS.2005.226

  4. Cao, J., Zhang, C., Zhang, J., Deng, Y., Xiao, X., Xiong, M., Zhou, J., Zou, Y., Yao, G., Feng, W., Yang, L., Yu, Y.: Shawk: Platform for secure integration of heterogeneous advanced wireless networks. In: AINA Workshops, pp. 13–18 (2012)

    Google Scholar 

  5. Deng, Y., Wang, G., Cao, J.: Practical unified authentication for 3g-wlan interworking. Journal of Information & Computational Science 9: 7 9(7), 1–9 (2012)

    Google Scholar 

  6. Deng, Y., Wang, G., Cao, J., Xiao, X.: Practical secure and fast handoff framework for pervasive wi-fi access. Information Security, IET 7(1), 22–29 (2013). DOI 10.1049/iet-ifs.2012.0092

    Article  Google Scholar 

  7. Georgiades, M., Akhtar, N., Politis, C., Tafazolli, R.: Aaa context transfer for seamless and secure multimedia services over all-ip infrastructures. In: Fifth European Wireless Conference – Mobile and Wireless Systems beyond 3G. Barcelona, Spain (2004)

    Google Scholar 

  8. IEEE: Rfc 3374 – problem description: Reasons for performing context transfers between nodes in an ip access network (2002). URL http://www.ietf.org/rfc/rfc3374.txt

  9. IRTF, I.R.T.F.: Rfc 6252: A framework of media-independent pre-authentication (mpa) for inter-domain handover optimization (2011). URL http://tools.ietf.org/html/rfc6252

  10. Kwon, H., Cheon, K., Roh, K., Park, A.: Usim based authentication test-bed for umts-wlan handover. In: Proc. of INFOCOM’06, Poster and Demo Session. Citeseer, Barcelona, Spain (2006)

    Google Scholar 

  11. Saxena, N., Roy, A.: Novel framework for proactive handover with seamless multimedia over wlans. Communications, IET 5(9), 1204–1212 (2011). DOI 10.1049/iet-com.2010.0004

    Article  Google Scholar 

  12. Tews, E., Beck, M.: Practical attacks against wep and wpa. In: Proceedings of the second ACM conference on Wireless network security, WiSec ’09, pp. 79–86. ACM, New York, NY, USA (2009). DOI 10.1145/1514274.1514286. URL http://doi.acm.org/10.1145/1514274.1514286

  13. Wikipedia: Wired equivalent privacy (2012). URL http://en.wikipedia.org/wiki/Wired_Equivalent_Privacy#Flaws

  14. Yao, G., Cao, J., Yan, Y., Ji, Y.: Secured fast handoff in 802.11-based wireless mesh networks for pervasive internet access. IEICE Transactions 93-D(3), 411–420 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2014 The Author(s)

About this chapter

Cite this chapter

Cao, J., Zhang, C. (2014). Secure Enhanced Seamless Roaming. In: Seamless and Secure Communications over Heterogeneous Wireless Networks. SpringerBriefs in Computer Science. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-0416-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-1-4939-0416-7_4

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4939-0415-0

  • Online ISBN: 978-1-4939-0416-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics