CapAuth: A Capability-Based Handover Scheme

Download Now
Provided by: University of Calgary
Topic: Security
Format: PDF
Existing handover schemes in wireless LANs, 3G/4G networks, and femtocells rely upon protocols involving centralized authentication servers and one or more access points. These protocols are invariably complex and use extensive signaling on the wireless backhaul since they aim to be efficient (minimal handover latency) without sacrificing robustness. However, the mobile user has little involvement especially with the so-called context transfer stage; this stage involves the transfer of necessary state to the new access point as well as the enforcement of security goals such as user authentication and single point of access.
Download Now

Find By Topic