The Research about Fast Re-Authentication Technology Based Mobility Model

Article Preview

Abstract:

In accordance with the existing problems in the process of fast re-authentication, tabled a fast re-authentication scheme based on the mobility model and dynamic network access identification (DNAI), also simulated and analyzed of the performance of both existing programs and new programs. Research shows that the scheme can greatly increase the switching re-authentication performance of the outer area, and resolve the privacy problem of the mobile terminal position.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1960-1967

Citation:

Online since:

February 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] V. Narayanan, L. Dondeti, EAP Re-authentication Extensions, draft-ietf-hokey-erx-03, IETF, July (2007).

Google Scholar

[2] B. Aboba Et al, Extensible Authentication Protocol(EAP), RFC3748, IETF, June (2004).

Google Scholar

[3] Draft Standard for Information Technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements, IEEE P802. 11r/D5. 0, March (2007).

DOI: 10.3403/30346514

Google Scholar

[4] B. Aboba, Et Al, The Network Access Identifier, RFC4282, IETF, December (2005).

Google Scholar

[5] I. E Akyildiz, J. S. M. Ho and Y. B. Lin, Movement-Based Location Update and SelectivePaging Schemes, IEEE/ACM Transactions on Networking, vol. 4, no. 4, (1996).

Google Scholar

[6] Ken Murray & Dirk Pesch, Mobility Modelling using Attraction Points for Cellular Network Environments", Christian Bettstetter, "Mobility Modeling in Wireless Networks: Categorization, Smooth Movement, and Border Effects, Mobile Computing and Communications Review, Volume 5, Number 3.

DOI: 10.1145/584051.584056

Google Scholar

[7] Chiu-Ching Tuan, Chen-Chau Yang, A New Normal Walk Model for Mesh PCS Networks", Proceedings of the 18th International Conference on Advanced Information Networking and Application (AINA, 04) (2004).

DOI: 10.1109/aina.2004.1283958

Google Scholar

[8] IEEE Standard for Information technology—Telecommunications and information exchange between systems—Local and metropolitan area networks—Specific requirements, IEEE 802. 11i, (2004).

DOI: 10.3403/30346514

Google Scholar

[9] WiMAX End-to-End Network Systems Architecture, draft wimax forum NWG Stage-3, April (2006).

Google Scholar

[10] 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Security architecture, 3GPP TS 33. 102, December (2007).

Google Scholar

[11] Karuh, J.: On the Chapman-Kolmogorov equation, Ann. Math. statist, voi. 32, (1961).

Google Scholar

[12] Burrows M, Abadi M, Needham R, A logic of authentication. ACM Trans on Computer Systems, Vol. 8, No. 1, Feb. (1990).

Google Scholar