References
- IEEE Std 802.11f, IEEE Trial-Use Recommended Practice for Multi-Vendor Access Point Interoperability via an Inter-Access Point Protocol Across Distribution Systems Supporting IEEE 802.11 Operation. 2003.
- IEEE Std 802.11i, IEEE Standard for Wireless LAN Medium Access Control and Physical Layer Specifications (Amendment 6: Medium Access Control Security Enhancements), 2004
- R. Koodli, "Fast Handovers for Mobile IPv6," RFC 4068, 2005.
- J. Xie and I. Shibeika, "IEEE 802.11-based Mobile lP Fast Handoff Latency Analysis," Proc. of IEEE ICC 2007, Dec. 2007.
- S. Mohanty and I. F. Akyildiz, "A cross-layer handoff management protocol for next generation wireless systems," IEEE Trans. Mobile Computing, Vol.5, No. 10, pp. 1347-1360, Oc. 2006. https://doi.org/10.1109/TMC.2006.142
- D. Su and S.-J. Yoo, "Fast handover failure-case analysis in hierarchical Mobile IPv6 networks," IEICE Trans. Communications, Vol.E89-B, No.6, pp.1892-1895, June 2006. https://doi.org/10.1093/ietcom/e89-b.6.1892
- A Mishra, M.H. Shin, N.L. Petroni Jr., T.C. Clancy, and W.A Arbaugh, "Proactive Key Distribution Using Neighbor Graphs," IEEE Wireless Comm, Vol.11, No.1, pp. 26-36, Feb. 2004. https://doi.org/10.1109/MWC.2004.1269714
- S. Pack and Y. Choi, "Fast Inter-AP Handoff using Predictive-Authentication Scheme in a Public Wireless LAN," IEEE Networks, pp. 15-26, Aug. 2002.
- A.Mishra M. Shin and W. Arbaugh, "Context Caching using Neighbor Graphs for Fast Handoffs in a Wireless Network," IEEE INFOCOM conference, Hong Kong, Mar. 2004.
- S. Pack and Y. Choi, "Pre-Authenticated Fast Handoff in a Public Wireless LAN based on IEEE 802.1x Model," IFIP TC6 Personal Wireless Communications, pp. 175-182, Oct. 2002.
- J. Kempf and R. Koodli, "Bootstrapping a Symmetric IPv6 Handover Key from SEND," draft-kempf-mobopts - handover-key-01, 2005.
- H.S. Kang and C.S. Park, "MIPv6 Binding Update Protocol Secure Against Both Redirect and DoS Attacks," CISC, Lecture Notes in Computer Science, vol.3822 of LNCS, Springer-Verlag, pp. 407-418, 2005.
- H. Wassim and K. Suresh, "Combining Cryptographically Generated Address and Crypto- Based Identifiers to Secure HMIPv6," lnternet Draft, draft-haddad-mipshop-hmipv6-security-06, 2006.
- Arkko, J., Devarapalli, V. and F. Dupont, "Using IPsec to Protect Mobile IPv6 Signaling between Mobile Nodes and Home Agents," RFC 3776, June 2004.
- G. O'Shea and M. Roe, "Child-proof Authentication for MIPv6," ACM Computer Communications Review, 31 (2), pp. 4-8, July 2001. https://doi.org/10.1145/505666.505668
- V. Narayanan, "Handover Keys Using AAA," drajt-vidya-mipshop-handover-keys-aaa-01, 2005.
- S. Jung, "Access Authentication Protocol in FMIP6," draft-mipshop-access-auth-00, 2006.
- M. Nakhjiril, "A Keying hierarchy for managing Wireless Handover security," draft-nakhjiri-hokey-hierachy-01, 2006.
- T. Charles "Secure Handover in Enterprise WLANs:CAPWAP, HOKEY, and IEEE 802.11r," IEEE Wireless Communication, pp. 80-85. Oct. 2008.
- P. Nickander, "lPv6 Neighbor Discovery Trust Models and Threats," RFC 3756, 2004.
- P. McCann, "Mobile IPv6 Fast Handovers for 802.11 Networks," RFC 4260, 2005.
- Ian F., Akyildiz, Joseph, S.H "Mobile user location update and paging under delay constraints," ACM-Baltzer J. Wireless Networks, Vol.1, pp. 413-425, Dec. 1995. https://doi.org/10.1007/BF01985754
- Yi-Bing, Lin "Reducing location update cost in a PCS network," IEEE/ACM Trans. Networking, Vol.5, pp. 25-33, Feb. 1997. https://doi.org/10.1109/90.554719
- Ian F., Akyildiz, Wenye, W. "A dynamic location management scheme for next-generation multitier PCS systems," IEEE Trans. Wireless Commu, Vol.1, No.1, pp. 178-189, Jan. 2002. https://doi.org/10.1109/7693.975456
- Sangheon, P., Yanghee, C. "A study on performance of hierarchical mobile IPv6 in IP-based cellular networks," IEICE Tran. Commun., Vol.E87-B, No.3, pp. 462-469, Mar. 2004.
- Antoon, B., Ren, G., Joos, V. "Fast hashing on the Pentium," In N. Koblitz, editor, Advances III cryptology, Proceedings Crypto'96, Springer. Vol.1109, pp. 298-312. 1996.