02.11.2012 Views

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

REFERENCES<br />

[52] M. Sh<strong>in</strong>, J. Ma, A. Mishra, and W. A. Arbaugh, "Wireless network security and<br />

<strong>in</strong>terwork<strong>in</strong>g," Proceed<strong>in</strong>gs of the IEEE, vol. 94, pp. 455-466, 2006.<br />

[53] L. Salgarelli, M. Buddhikot, J. Garay, S. Patel, and S. Miller, "Efficient<br />

authentication and key distribution <strong>in</strong> <strong>wireless</strong> IP networks," Wireless<br />

Communications, IEEE [see also IEEE Personal Communications], vol. 10, pp.<br />

52, 2003.<br />

[54] C. d. Laat, G. Gross, L. Gommans, J. Vollbrecht, and D. Spence, "RFC 2903 -<br />

Generic AAA Architecture," IETF Network Work<strong>in</strong>g Group, August 2000.<br />

[55] S. Yan L<strong>in</strong>dsay, Y. Wei, H. Zhu, and K. J. R. A. L. K. J. R. Liu, "Information<br />

theoretic framework of trust model<strong>in</strong>g and evaluation for ad hoc networks,"<br />

Selected Areas <strong>in</strong> Communications, IEEE Journal on, vol. 24, pp. 305-317, 2006.<br />

[56] C. E. Perk<strong>in</strong>s, "Mobile IP jo<strong>in</strong>s forces with AAA," Personal Communications,<br />

IEEE [see also IEEE Wireless Communications], vol. 7, pp. 59-61, 2000.<br />

[57] W. Wang, "Authentication for Inter-Doma<strong>in</strong> Roam<strong>in</strong>g <strong>in</strong> Wireless IP Networks,"<br />

<strong>in</strong> Security And Rout<strong>in</strong>g <strong>in</strong> Wireless Networks, Y. Xiao, J. Li, and Y. Pan, Eds.:<br />

Nova Publishers, 2005, pp. 21-54.<br />

[58] G. M. Koien and T. Haslestad, "Security aspects of 3G-WLAN <strong>in</strong>terwork<strong>in</strong>g,"<br />

Communications Magaz<strong>in</strong>e, IEEE, vol. 41, pp. 82-88, November 2003.<br />

[59] B. Aboba and P. Calhoun, "RFC 3579 - RADIUS (Remote Authentication Dial<br />

In User Service) Support For Extensible Authentication Protocol (EAP)," IETF<br />

Network Work<strong>in</strong>g Group, September 2003.<br />

[60] B. Aboba and J. Vollbrecht, "RFC 2607 - Proxy Cha<strong>in</strong><strong>in</strong>g and Policy<br />

Implementation <strong>in</strong> Roam<strong>in</strong>g," IETF Network Work<strong>in</strong>g Group, June 1999.<br />

[61] B. Aboba et al., "RFC 2989 - Criteria for Evaluat<strong>in</strong>g AAA Protocols for<br />

Network Access," IETF Network Work<strong>in</strong>g Group, November 2000.<br />

[62] P. Calhoun, J. Loughney, E. Guttman, G. Zorn, and J. Arkko, "RFC 3588 -<br />

Diameter Base Protocol," IETF Network Work<strong>in</strong>g Group, September 2003.<br />

[63] P. Calhoun, G. Zorn, D. Spence, and D. Mitton, "RFC 4005 - Diameter Network<br />

Access Server Application," IETF Network Work<strong>in</strong>g Group, August 2005.<br />

[64] B. Aboba and M. Beadles, "RFC 2486 - The Network Access Identifier," IETF<br />

Network Work<strong>in</strong>g Group, January 1999.<br />

[65] P. Eronen, T. Hiller, and G. Zorn, "RFC 4072 - Diameter Extensible<br />

Authentication Protocol (EAP) Application," IETF Network Work<strong>in</strong>g Group,<br />

August 2005.<br />

[66] V. K. Varma, S. Ramesh, K. D. Wong, M. Barton, G. Hayward, and J. A.<br />

Friedhoffer, "Mobility management <strong>in</strong> <strong>in</strong>tegrated UMTS/WLAN networks,"<br />

- 172 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!