• 1
    LAN/MAN Standards Committee of the IEEE Computer Society. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, 1999.
  • 2
    Wi-Fi Alliance. WPATM Deployment Guidelines for Public Access Wi-Fi® Networks, October 2004.
  • 3
    LAN/MAN Standards Committee of the IEEE Computer Society. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Amendment 6: Medium Access Control (MAC) Security Enhancements, July 2004.
  • 4
    LAN/MAN Standards Committee of the IEEE Computer Society. 802.1X: Port-Based Network Access Control, December 2004.
  • 5
    Hoeper K, Ohba Y. Distribution of EAP based keys for handover and re-authentication. IETF Network Working Group Internet-Draft, October 2009. Draft-ietf-hokey-key-mgm-01.
  • 6
    Salowey J, Dondeti L, Narayanan V, Nakhjiri M. Specification for the derivation of root keys from an Extended Master Session Key (EMSK). IETF, August 2008.
  • 7
    Marques R, Zúquete A. Fast, Secure Handovers in 802.11: Back to the Basis. 4th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet 2008), Vancouver, BC, Canada, 2008.
  • 8
    Wierenga K, Florio L. Eduroam: past, present and future. TERENA Networking Conference, Poznan, Poland, 2005.
  • 9
    Winter S, Engel T. Location-based services for scientists in NRENs. International Workshop on Location- and Context-Aware Applications (LoCA'05), LNCS 3479. Springer, Berlin, 2005; 341349.
  • 10
    Clancy T, Nakhjiri M, Narayanan V, Dondeti L. Handover key management and re-authentication problem statement. RFC 5169, IETF, March 2008.
  • 11
    LAN/MAN Standards Committee of the IEEE Computer Society. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Amendment 2: Fast Basic Service Set (BSS) Transition, July 2008.
  • 12
    Kaufman C. Internet Key Exchange (IKEv2) Protocol. RFC 4306, IETF, December 2005.
  • 13
    Pack S, Choi Y. Fast inter-AP handoff using predictive-authentication scheme in a public wireless LAN. IEEE Networks Conference (Joint IEEE ICN 2002 and IEEE ICWLHN), 2002.
  • 14
    Mishra A, Shin M, Arbaugh WA. An empirical analysis of the IEEE 802.11 MAC layer handoff process. Computer Communication Review 2003; 33(2): 93102.
  • 15
    Velayos H, Karlsson G. Techniques to reduce IEEE 802.11b MAC layer handover time. Technical Report TRITA-IMIT-LCN R 03:02, Kungliga Tekniska Hogskolen, Stockholm, Sweden, April 2003.
  • 16
    Ramani I, Savage S. Syncscan: practical fast handoff for 802.11 infrastructure networks. Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2005), Miami, FL, USA, 2005; 675684.
  • 17
    Aboba B, Simon D, Eronen P. Extensible authentication protocol (EAP) key management framework. IETF, August 2008.
  • 18
    The Avispa Team. Automated Validation of Internet Security Protocols and Applications (AVISPA) v1.1 User Manual, June 2006.
  • 19
    Alimian A, Aboba B. Analysis of roaming techniques. IEEE 802.11 WG document 802.11-04/0377r1 2004.
  • 20
    Chen J, Tseng Y, Lee H. A Seamless Handoff Mechanism for DHCP-Based IEEE 802.11 WLANs. IEEE Communications Letters 2007; 11(8): 665667.
  • 21
    Marin R, Fernandez PJ, Gomez AF. 3-Party approach for fast handover in EAP-based wireless networks. Proceedings of OTM Conferences, 2nd International Symposium on Information Security (IS'07), LNCS 4804. Springer: Vilamoura, Portugal, 2007; 17341751.
  • 22
    Huang CM, Li JW. An IEEE 802.11 Fast Reassociation and Pairwise Transient Key establishment based on the Dynamic Cluster Method. Workshop of Computer Networks and Wireless Communications, International Computer Symposium (ICS 2006), Taipei, Taiwan, 2006.
  • 23
    Prasad AR, Wang H. Roaming key based fast handover in WLANs. IEEE Wireless Communications and Networking Conference (WCNC 2005), Vol. 3, 2005; 15701576.
  • 24
    Kassab M, Belghith A, Bonnin J, Sassi S. Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks. 1st ACM Workshop on Wireless Multimedia Networking and Performance Modelling (WMuNeP'05), Montreal, Canada, 2005.
  • 25
    Sarikaya B, Zheng X. CAPWAP Handover Protocol. IEEE International Conference on Communications (ICC'06), Vol. 4, 2006; 19331938.
  • 26
    Zan L, Wang J, Bao L. Personal AP Protocol for Mobility Management in IEEE 802.11 Systems. Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MOBIQUITOUS'05). IEEE Computer Society: Washington, DC, USA, 2005; 418425.
  • 27
    Govindan S, Cheng H, Yao ZH, Zhou WH, Yang L. Objectives for control and provisioning of wireless access points (CAPWAP). RFC 4564, IETF, July 2006.
  • 28
    Pack S, Choi Y. Pre-authenticated fast handoff in a public wireless LAN based on IEEE 802.1x Model. Mobile and Wireless Communications, IFIP TC6/WG6.8 Working Conference on Personal Wireless Communications (PWC'2002), IFIP Conference Proceedings, Vol. 234, OmidyarCG (ed.). Kluwer: Singapore, 2002; 175182.
  • 29
    Narayanan V, Dondeti L. EAP Extensions for EAP Re-authentication Protocol (ERP). IETF, August 2008.
  • 30
    Aura T, Roe M. Reducing reauthentication delay in wireless networks. Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks (SECURECOMM '05). IEEE Computer Society: Washington, DC, USA, 2005; 139148.
  • 31
    Mishra A, Shin MH, Petroni N L, Jr, Clancy TC, Arbaugh WA. Proactive key distribution using neighbor graphs. IEEE Wireless Communication 2004; 11(1): 2636.
  • 32
    Greenlaw R, Goransson P. Secure Roaming in 802.11 Networks. Newnes, 2007. ISBN-13 978-0-7506-8211-4