[1]
|
3GPP TS 23.234, Rel. 6, v6.3.0 (2004) 3GPP System to Wireless Local Area Network (WLAN) Interworking; System Description.
|
[2]
|
Ahmavaara, K., et al. (2003) Interworking Architecture between 3GPP and WLAN Systems. IEEE Communication Magazine, 41, 74-81.
|
[3]
|
Mingozzi, E., Stea, G. and Callejo-Rodríguez, M.A., et al. (2009) EuQoS: End-to-End Quality of Service over Heterogeneous Networks. Computer Communications, 32, 1355-1370. http://dx.doi.org/10.1016/j.comcom.2008.12.013
|
[4]
|
Koien, G.M. and Haslestad, T. (2003) Security aspects of 3G-WLAN interworking. IEEE Communication Magazine, 41, 82-88. http://dx.doi.org/10.1109/MCOM.2003.1244927
|
[5]
|
Choi, H.H., Song, O. and Cho, D.H. (2004) A Seamless Handoff Scheme for UMTS-WLAN Interworking. Proceedings of IEEE Globalcom, 3, 559-1564.
|
[6]
|
Cao, J., Li, H., Ma, M., et al. (2012) A Simple and Robust Handover Authentication between HeNB and eNB in LTE Networks. Journal Computer Networks: The International Journal of Computer and Telecommunications Networking, 56, 2119-2131.
|
[7]
|
3rd Generation Partnership Project (2006) 3G security; WLAN Interworking Security (Release 7). 3GPP Technical Specifications TS 33.234 v7.0.0, 3GPP, Valbonne.
|
[8]
|
Arkko, J. and Haverinen, H. (2006) Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA). IETF, RFC 4187.
|
[9]
|
Aboba, B., et al. (2003) RADIUS (Remote Authentication Dial In User Service) Support For Extensible Authentication Protocol (EAP). RFC 3576.
|
[10]
|
Lin, S.-H., Chiu, J.-H. and Lee, G.-R. (2010) A Fast Iterative Localized Re-authentication Protocol for Heterogeneous Mobile Networks. IEEE Transaction on Consumer Electronic, 56, 2267-2276. http://dx.doi.org/10.1109/TCE.2010.5681099
|
[11]
|
Lin, S.H., Chiu, J.H. and Shen, S.S. (2010) Performance Evaluation of the Fast Authentication Schemes in GSMWLAN Heterogeneous Networks. Journal of Networks, 5, 956-963. http://dx.doi.org/10.4304/jnw.5.8.956-963
|
[12]
|
Lin, S.-H., Chiu, J.-H. and Shen, S.-S. (2011) The Performance Evaluation of Fast Iterative Localized Re-Authentication for 3G/UMTS-WLAN Interworking Networks. Journal of Ambient Intelligence and Humanized Computing, 4, 209-221.
|
[13]
|
Lin, S.-H., Chiu, J.-H. and Shen, S.-S. (2011) A Fast Iterative Localized Re-authentication Protocol for UMTS-WLAN Heterogeneous Mobile Communication Networks. EURASIP Journal on Wireless Communications and Networking, 2011, 124.
|
[14]
|
IEEE (2004) Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 6: Medium Access Control (MAC) Security Enhancements,” IEEE Std 802.11.
|
[15]
|
Pack, S. and Choi, Y. (2004) Fast Handoff Scheme based on Mobility Prediction in Public Wireless LAN Systems. IEEE Proceedings Communications, 151, 489-495. http://dx.doi.org/10.1049/ip-com:20040834
|
[16]
|
Mukherjee, A., Joshi, T. and Agrawal, D.P. (2005) Minimizing Re-Authentication Overheads in Infrastructure IEEE 802.11 WLAN Networks. Proceedings of IEEE Wireless Communications and Networking Conference (WCNC’05), 4, 2344-2349.
|
[17]
|
Hur, J., Park, C. and Yoon, H. (2007) An Efficient Pre-Authentication Scheme for IEEE 802.11-Based Vehicular Networks. Advances in Information and Computer Security, 4752, 121-136. http://dx.doi.org/10.1007/978-3-540-75651-4_9
|
[18]
|
Lee, M., Kim, G. and Park, S. (2005) Seamless and Secure Mobility Management with Location-Aware Service (LAS) Broker for Future Mobile Interworking Networks. Journal of Communications and Networks, 7, 207-221. http://dx.doi.org/10.1109/JCN.2005.6387867
|
[19]
|
Arbaugh, W., Mishra, A. and Shin, M. (2004) Context Caching Using Neighbor Graphs for Fast Handoffs in a Wireless Network. IEEE INFOCOM. 23rd Annual Joint Conference of the IEEE Computer and Communications Societies, 1, 11.
|
[20]
|
Mishra, A., Shin, M., Petroni Jr., N.L., Clancy, T.C. and Arbaugh, W.A. (2004) Proactive Key Distribution Using Neighbor Graphs. IEEE Wireless Communications, 11, 26-36. http://dx.doi.org/10.1109/MWC.2004.1269714
|
[21]
|
Kassab, M., Belghith, A., Bonnin, J.M. and Sassi, S. (2005) Fast Pre-Authentication Based on Proactive Key Distribution for 802.11 Infrastructure Networks. Proceedings of the 1st ACM International Workshop on Wireless Multimedia Networking and Performance Modeling (WMuNeP’05), Montreal, 13 October 2005, 46-53.
|
[22]
|
Al Shidhani, A. and Leung, V.C.M. (2009) Pre-Authentication Schemes for UMTS-WLAN Interworking. EURASIP Journal on Wireless Communications and Networking, 2009, Article ID: 806563.
|
[23]
|
Abiona, O., Oluwaranti, A., Oluwatope, A., Bello, S., Onime, C., Sanni, M. and Kehinde, L. (2013) Wireless Network Security: The Mobile Agent Approach. International Journal of Communications, Network and System Sciences, 6, 443-450. http://dx.doi.org/10.4236/ijcns.2013.610046
|