02.11.2012 Views

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

REFERENCES<br />

[90] R. Verdone and A. Zanella, "Performance of received power and traffic-driven<br />

handover algorithms <strong>in</strong> urban cellular networks," Wireless Communications,<br />

IEEE [see also IEEE Personal Communications], vol. 9, pp. 60, 2002.<br />

[91] 3GPP, "Review of Network Selection Pr<strong>in</strong>ciples V7.2.0," <strong>in</strong> TR 22.811: 3rd<br />

Generation Partnership Project, 2006-06.<br />

[92] M. Li, K. Sandrasegaran, and T. Tung, "Performance Evaluation of A Multi-<br />

Interface Model for Media Independent <strong>Handover</strong>," presented at The 7th<br />

International Symposium on Communications and Information Technologies,<br />

Sydney, Australia, October, 2007.<br />

[93] 3GPP, "3G Security; Security architecture V7.1.0," <strong>in</strong> TS 33.102: 3rd Generation<br />

Partnership Project, 2006-12.<br />

[94] Y. Ohba, "EAP Pre-authentication Problem Statement," <strong>in</strong> draft-ietf-hokeypreauth-ps-00:<br />

IETF Network Work<strong>in</strong>g Group, September 2007, pp. IETF Draft.<br />

[95] M. Li, K. Sandrasegaran, and T. Tung, "A Multi-Interface Proposal for IEEE<br />

802.21 Media Independent <strong>Handover</strong>," presented at The Sixth International<br />

Conference on Mobile Bus<strong>in</strong>ess (ICMB), Toronto, Ontario, Canada, July 2007.<br />

[96] IEEE, "IEEE trial-use recommended practice for multi-vendor access po<strong>in</strong>t<br />

<strong>in</strong>teroperability via an <strong>in</strong>ter-access po<strong>in</strong>t protocol across distribution systems<br />

support<strong>in</strong>g ieee 802.11 operation," <strong>in</strong> IEEE Std. 802.11F: IEEE, June 2003.<br />

[97] J. Loughney, M. Nakhjiri, C. Perk<strong>in</strong>s, and R. Koodli, "RFC 4067 - Context<br />

Transfer Protocol (CXTP)," IETF Network Work<strong>in</strong>g Group, July 2005.<br />

[98] M. S. Bargh, R. J. Hulsebosch, E. H. Eert<strong>in</strong>k, A. Prasad, H. Wang, and P. Schoo,<br />

"Fast authentication methods for handovers between IEEE 802.11 <strong>wireless</strong><br />

LANs," presented at the 2nd ACM <strong>in</strong>ternational workshop on Wireless mobile<br />

applications and services on WLAN hotspots (WMASH), Philadelphia, PA,<br />

October 2004.<br />

[99] M. Long, C. H. Wu, and J. D. Irw<strong>in</strong>, "Localised authentication for <strong>in</strong>ter-network<br />

roam<strong>in</strong>g across <strong>wireless</strong> LANs," Communications, IEE Proceed<strong>in</strong>gs-, vol. 151,<br />

pp. 496-500, October 2004.<br />

[100] S. C.-H. Huang, H. Zhu, and W. Zhang, "SAP: seamless authentication protocol<br />

for vertical handoff <strong>in</strong> <strong>heterogeneous</strong> <strong>wireless</strong> networks," presented at the 3rd<br />

<strong>in</strong>ternational conference on Quality of service <strong>in</strong> <strong>heterogeneous</strong> wired/<strong>wireless</strong><br />

networks (QSh<strong>in</strong>e), Waterloo, ON, Canada, August 2006.<br />

[101] Y. Jiang, C. L<strong>in</strong>, X. S. Shen, and M. Shi, "Mutual Authentication and Key<br />

Exchange Protocols for Roam<strong>in</strong>g Services <strong>in</strong> Wireless Mobile Networks,"<br />

Wireless Communications, IEEE Transactions on, vol. 5, pp. 2569-2577, 2006.<br />

[102] O. Goldreich, S. Goldwasser, and S. Micali, "How to construct random<br />

functions," Journal of the ACM (JACM), vol. 33, pp. 792 - 807, October 1986.<br />

- 175 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!