|
[1] “Information technology– Telecommunications and information exchange between systems- Local and metropolitan area networks- Specific requirements- Part 11:Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications”, IEEE std 802.11-1997. [2] IETF, RFC 2865 “Remote Authentication Dial In User Service(RADIUS)”, June 2000 [3] IEEE std 802.1X-2001, “Local and metropolitan area networks – Port-Based Network Access Control”, Oct. 2001. [4] IETF, RFC 3748 “Extensible Authentication Protocol (EAP)”, June 2004. [5] IETF, RFC 2716 “PPP EAP TLS Authentication Protocol”, October 1999. [6] P. Funk, S. Blake-Wilson, “EAP Tunneled TLS Authentication Protocol”, Internet-Draft , April 2004. [7] A. Palekar, D. Simon, J. Salowey, H. Zhou, and G. Zorn, “Protected EAP Protocol (PEAP) Version 2”, INTERNET-DRAFT , 15 October 2004. [8] “IEEE Trial-Use Recommended Practice for Multi-Vendor Access Point Interoperability via an Inter-Access Point Protocol Across Distribution Systems Supporting IEEE 802.11 Operation”, 80211.f, 14 July 2003. [9] “Information technology– Telecommunications and information exchange between systems- Local and metropolitan area networks- Specific requirements- Part 11:Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, Amendment 6: Medium Access Control (MAC) Security Enhancements”, IEEE std 802.11i-2004. [10] N. Borisov, I. Goklberg, and D. Wagner, “Intercepting Mobil Communications: The Insecurity of 802.11.”, the proceedings of the seventh annual international conference on Mobile Computing and Networking, July 16-21, 2001 [11] W. A. Arbaugh, N. Shankar, and Y.C. J. Wan, “Your 802.11 Wireless Network has no Clothes.”, IEEE Wireless Communications Magazine, 2002, Vol. 9, No. 6, pp.44-51. [12] S. Pack and Y. Choi, “ Fast Inter-AP Handoff using Predictive Authentication Scheme in a Public Wireless LAN” in Proc. Of Networks 2002, Aug. 2002. [13] A. Miashra, M. Shin, N.L. Petroni Jr., T.C. Clancy and W. Arbaugh, “Proactive Key Distribution Using Neighbor Graphs” IEEE Wireless Comm. Magazine, Feb. 2004. [14] A. Mishra, M. Shin and W. Arbaugh, “Context Caching using Neighbor Graphs for Fast Handoffs in a Wireless Network”, in Proc of IEEE INFOCOM, Mar. 2004. [15] X. Zheng, C. Chen, C. T. Huang, M. M. Matthews, “A Dual Authentication Protocol for IEEE 802.11 Wireless LANS”, Wireless Communication Systems, 2005. 2nd International Symposium on 5-7 Sept. 2005 Page:565-569. [16] M. S. Bargh, R. J. Hulsebosch, E. H. Ertink, A. Prasad, H. Wang, P. Schoo, “Fast authentication methods for handovers between IEEE802.11 wireless LANS”, Proceedings of the 2nd ACM international workshop on Wireless mobile applications, 2004. [17] L Maccari, R Fantacci, T Pecorella, F Frosali, “Secure, fast handoff techniques for 802.1X based wireless network”, IEEE ICC 2006 proceedings. [18] P Kiratwintakorn, P Krishnamurthy, “An Energy Efficient Authentication and Key Management Protocol for 802.11 WLANs”, Information, Communications and Signal Processing, 2005 Fifth international Conference. Dec. 2005 pp 448-453. [19] S. Pack and Y. choi, “Fast handoff scheme based on mobility prediction in public wireless LAN systems”, communications IEE proceeding, 24 Oct 2004 pp 489-495. [20] A.R. Prasad and H. Wang “Roaming key based fast handover in WLANS”, Wireless Communications and Networking Conference, 2005 IEEE. [21] S. Pack, H. Jung, T. Kwon, and Y. Choi “A Selective Neighbor Caching Scheme for Fast Handoff in IEEE 802.11 Networks”, in Proc. IEEE ICC, May 2005. [22] P. J. Huang, Y. C. Tseng, K. C. Tsai “A fast Handoff Mechanism for IEEE 802.11 and IAPP Networks”, Vehicular Technology Conference, 2006. VTC 2006-Spring. IEEE 63rd Volume 2, pp.966-970, 2006. [23] H. Velayos, G. Karlsson “Techniques to reduce the IEEE 802.11b handoff time”, Proceedings of IEEE international Conference on Communications, vol.7, pp. 3844-3848, 2004. [24] M. Shin, A. Mishra, W. A. Arbuagh “Improving the latency of 802.11 hand-offs using neighbor graphs”, Proceedings of the 2nd international Conference on Mobile Systems, Applications, and Services, 2004, pp.70-83. [25] A.Mishra, M.Shin, and W.Arbaugh “An Empirical Analysis of the IEEE 802.11 MAC Layer Handoff Process”, ACM Computer Communication Review, 2003, pp.93-102. [26] International Telecommunication Union, “General Characteristics of International Telephone Connections and International Telephone Circuits.”, ITU-TG.114. 1988. [27] C. He and J.C. Mitchell “Analysis of the 802.11i 4-Way Handshake”, Proceedings of the 2004 ACM workshop on Wireless security, 2004 pp 43-50. [28] J. Bellardo, and S. Savage “Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions”, Proceedings of the USENIX Security Symposium, August 2003 pp 15-28. [29] J.C. Chen, M.C. Jiang, and Y.W Liu “Wireless LAN Security and IEEE 802.11i”, IEEE Wireless Communications, vol.12, no.1, pp. 27-36, Feb 2005. [30] A. Bhattacharya and S.K. Das “LeZi-Update: An Information-theoretic framework for personal mobility tracking in PCS networks”, in ACM/Kluwer Wireless Networks Journal, vol. 8, no. 2-3 pp.121-135, Mar. 2002. [31] T. Joshi, A. Mukherjee, and D.P. Agrawal “Exploiting Mobility Patterns to Reduce Re-Authentication Overheads in Infrastructure WLAN Networks” Electrical and Computer Engineering, Canadian Conference on 2006.
|