02.11.2012 Views

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

REFERENCES<br />

[37] Wi-Fi Alliance, "Wi-Fi Alliance 2006 Annual Report," http://www.wi-fi.org/,<br />

2006.<br />

[38] M. Audeh, "Metropolitan-scale Wi-Fi mesh networks," Computer, vol. 37, pp.<br />

119-121, December 2004.<br />

[39] FON, "What's FON?," http://www.fon.com, 2008.<br />

[40] M. Nakhjiri and M. Nakhjiri, AAA and Network Security for Mobility Access:<br />

Radius, Diameter, EAP, PKI and IP Mobility: John Wiley & Sons, 2005.<br />

[41] C. Kaufman, "RFC 4306 - Internet Key Exchange (IKEv2) Protocol," IETF<br />

Network Work<strong>in</strong>g Group, December 2005.<br />

[42] IEEE, "Part 11: Wireless LAN Medium Access Control (MAC) and Physical<br />

Layer (PHY) specifications - Amendment 6: Medium Access Control (MAC)<br />

Security Enhancements," <strong>in</strong> IEEE Std 802.11i: IEEE, July 2004.<br />

[43] R. Housley and B. Aboba, "RFC 4962 - Guidance for Authentication,<br />

Authorization, and Account<strong>in</strong>g (AAA) Key Management," IETF Network<br />

Work<strong>in</strong>g Group, July 2007.<br />

[44] K. Boman, G. Horn, P. Howard, and V. Niemi, "UMTS security," Electronics &<br />

Communication Eng<strong>in</strong>eer<strong>in</strong>g Journal, vol. 14, pp. 191, 2002.<br />

[45] 3GPP, "Specification of the MILENAGE Algorithm Set: An example algorithm<br />

set for the 3GPP authentication and key <strong>generation</strong> functions f1, f1*, f2, f3, f4,<br />

f5 and f5*," <strong>in</strong> TS 35.205: 3rd Generation Partnership Project, 2007-06.<br />

[46] IEEE, "Wireless LAN Medium Access Control (MAC) and Physical Layer<br />

(PHY) Specifications," <strong>in</strong> IEEE Standard 802.11, 1999 Edition: IEEE, June<br />

2003.<br />

[47] IEEE, "IEEE standard for local and metropolitan area networks - Port-based<br />

network access control," <strong>in</strong> IEEE Std. 802.1X: IEEE, October 2001.<br />

[48] J.-C. Chen, M.-C. Jiang, and Y.-w. Liu, "Wireless LAN security and IEEE<br />

802.11i," Wireless Communications, IEEE [see also IEEE Personal<br />

Communications], vol. 12, pp. 27-36, February 2005.<br />

[49] C. Rigney, S. Willens, A. Rubens, and W. Simpson, "RFC 2865 - Remote<br />

Authentication Dial In User Service (RADIUS)," IETF Network Work<strong>in</strong>g Group,<br />

June 2000.<br />

[50] B. Aboba and D. Simon, "RFC 2716 - PPP EAP TLS Authentication Protocol,"<br />

IETF Network Work<strong>in</strong>g Group, October 1999.<br />

[51] C. Rens<strong>in</strong>g, M. Karsten, and B. Stiller, "AAA: a survey and a policy-based<br />

architecture and framework," Network, IEEE, vol. 16, pp. 22-27, November<br />

2002.<br />

- 171 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!