1 |
IEEE Std 802.21TM-2008, IEEE Standard for Local and metropolitan area networks- Part 21: Media Independent Handover Services, January, 2009.
|
2 |
IEEE 802.21a, "Proactive Authentication and MIH Security," 21-09-0102-03-0Sec, November, 2009.
|
3 |
B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, and H. Levkowetz, Extensible Authentication Protocol (EAP), IETF RFC 3748, June, 2004.
|
4 |
IEEE Std 802.11iTM-2004, IEEE Standard for Information technology - Telecommunic- ations and information exchange between systems - Local and metropolitan area networks - Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) speci- fications Amendment 6: Medium Access Control (MAC) Security Enhancements, July, 2004.
|
5 |
S. Eum, and H. Choi, "EAP-Kerberos II: An Adaptation of Kerberos to EAP for Mutual Authentication," in Proc. ITST 2008, Oct., 2008.
|
6 |
V. Narayanan, and L. Dondeti, EAP Extensions for EAP Re-authentication Protocol (ERP), IETF RFC 5296, August, 2008.
|
7 |
J. Salowey, L. Dondeti, V. Narayanan, and M. Nakhjiri, Specification for the Drivation of Root Keys from an Extended Master Session Key (EMSK), IETF RFC 5295, August, 2008.
|
8 |
H. Sun, Y. Lin, S. Chen, and Y. Shen, "Secure and Fast Handover Scheme Based on Pre- Authentication method for 802.16 / WiMAX Infrastructure Networks," in Proc. TENCON 2007, Oct., 2007.
|
9 |
H. Krawczyk, and T. Rabin, "Chameleon Signatures," in Proc. NDSS 2000, pp.143-154, 2000.
|
10 |
J. Choi, and S. Jung, "A Handover Authentication Using Credentials Based on Chameleon Hashing," IEEE Communications Letters, Vol.14, No.1, Jan., 2010.
|
11 |
W. Diffie, and M. Hellman, "New Directions in Cryptograhpy," IEEE Transactions on Information Theory, Vol.22, No.6, pp.644-654, Nov., 1976.
DOI
|