Secure Enhanced Seamless Roaming

  • Jiannong Cao
  • Chisheng Zhang
Part of the SpringerBriefs in Computer Science book series (BRIEFSCOMPUTER)


In this chapter, we further discuss the security mechanisms to enhance seamless roaming over heterogeneous wireless networks. The existing security solutions in current cellular networks and IEEE 802.11 WLAN are first introduced in Sect. 4.1. Some related work on security-enabled seamless roaming is briefly summarized in Sect. 4.2. Finally, our recent work on secure enhancement in seamless roaming, based on our SHAWK platform, is presented in Sect. 4.3, including a unified access test-bed and a VCL/VAS-based security scheme for fast handover.


Access Point Mobile Station Mobile Terminal Heterogeneous Wireless Network Handover Latency 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    3GPP: Ts 133 234 v8.1.0 universal mobile telecommunications system (umts);lte;3g security;wireless local area network (wlan) interworking security (2009)Google Scholar
  2. 2.
    Aura, T., Roe, M.: Reducing reauthentication delay in wireless networks. In: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SECURECOMM ’05, pp. 139–148. IEEE Computer Society, Washington, DC, USA (2005). DOI 10.1109/SECURECOMM.2005.58. URL
  3. 3.
    Braun, T., Kim, H.: Efficient authentication and authorization of mobile users based on peer-to-peer network mechanisms. In: Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences – Volume 09, HICSS ’05, pp. 306.2–. IEEE Computer Society, Washington, DC, USA (2005). DOI 10.1109/HICSS.2005.226. URL
  4. 4.
    Cao, J., Zhang, C., Zhang, J., Deng, Y., Xiao, X., Xiong, M., Zhou, J., Zou, Y., Yao, G., Feng, W., Yang, L., Yu, Y.: Shawk: Platform for secure integration of heterogeneous advanced wireless networks. In: AINA Workshops, pp. 13–18 (2012)Google Scholar
  5. 5.
    Deng, Y., Wang, G., Cao, J.: Practical unified authentication for 3g-wlan interworking. Journal of Information & Computational Science 9: 7 9(7), 1–9 (2012)Google Scholar
  6. 6.
    Deng, Y., Wang, G., Cao, J., Xiao, X.: Practical secure and fast handoff framework for pervasive wi-fi access. Information Security, IET 7(1), 22–29 (2013). DOI 10.1049/iet-ifs.2012.0092CrossRefGoogle Scholar
  7. 7.
    Georgiades, M., Akhtar, N., Politis, C., Tafazolli, R.: Aaa context transfer for seamless and secure multimedia services over all-ip infrastructures. In: Fifth European Wireless Conference – Mobile and Wireless Systems beyond 3G. Barcelona, Spain (2004)Google Scholar
  8. 8.
    IEEE: Rfc 3374 – problem description: Reasons for performing context transfers between nodes in an ip access network (2002). URL
  9. 9.
    IRTF, I.R.T.F.: Rfc 6252: A framework of media-independent pre-authentication (mpa) for inter-domain handover optimization (2011). URL
  10. 10.
    Kwon, H., Cheon, K., Roh, K., Park, A.: Usim based authentication test-bed for umts-wlan handover. In: Proc. of INFOCOM’06, Poster and Demo Session. Citeseer, Barcelona, Spain (2006)Google Scholar
  11. 11.
    Saxena, N., Roy, A.: Novel framework for proactive handover with seamless multimedia over wlans. Communications, IET 5(9), 1204–1212 (2011). DOI 10.1049/iet-com.2010.0004CrossRefGoogle Scholar
  12. 12.
    Tews, E., Beck, M.: Practical attacks against wep and wpa. In: Proceedings of the second ACM conference on Wireless network security, WiSec ’09, pp. 79–86. ACM, New York, NY, USA (2009). DOI 10.1145/1514274.1514286. URL
  13. 13.
    Wikipedia: Wired equivalent privacy (2012). URL
  14. 14.
    Yao, G., Cao, J., Yan, Y., Ji, Y.: Secured fast handoff in 802.11-based wireless mesh networks for pervasive internet access. IEICE Transactions 93-D(3), 411–420 (2010)Google Scholar

Copyright information

© The Author(s) 2014

Authors and Affiliations

  • Jiannong Cao
    • 1
  • Chisheng Zhang
    • 1
  1. 1.Department of ComputingHong Kong Polytechnic UniversityKowloonHong Kong SAR

Personalised recommendations