File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: CapAuth: A capability-based handover scheme

TitleCapAuth: A capability-based handover scheme
Authors
Issue Date2010
Citation
Proceedings - IEEE INFOCOM, 2010, article no. 5462208 How to Cite?
AbstractExisting handover schemes in wireless LANs, 3G/4G networks, and femtocells rely upon protocols involving centralized authentication servers and one or more access points. These protocols are invariably complex and use extensive signaling on the wireless backhaul since they aim to be be efficient (minimal handover latency) without sacrificing robustness. However, the mobile user has little involvement especially with the so-called context transfer stage; this stage involves the transfer of necessary state to the new access point as well as the enforcement of security goals such as user authentication and single point of access. We propose the incorporation of user capabilities, network-asserted proofs of user identity and access control, as a general mechanism to simplify the context transfer stage. To this end, we have designed CapAuth, a capability-based scheme that has reduced complexity, low overhead, high level of fault tolerance and is general enough to implement a range of security policies. ©2010 IEEE.
Persistent Identifierhttp://hdl.handle.net/10722/346555
ISSN
2023 SCImago Journal Rankings: 2.865

 

DC FieldValueLanguage
dc.contributor.authorCai, Liang-
dc.contributor.authorMachiraju, Sridhar-
dc.contributor.authorChen, Hao-
dc.date.accessioned2024-09-17T04:11:42Z-
dc.date.available2024-09-17T04:11:42Z-
dc.date.issued2010-
dc.identifier.citationProceedings - IEEE INFOCOM, 2010, article no. 5462208-
dc.identifier.issn0743-166X-
dc.identifier.urihttp://hdl.handle.net/10722/346555-
dc.description.abstractExisting handover schemes in wireless LANs, 3G/4G networks, and femtocells rely upon protocols involving centralized authentication servers and one or more access points. These protocols are invariably complex and use extensive signaling on the wireless backhaul since they aim to be be efficient (minimal handover latency) without sacrificing robustness. However, the mobile user has little involvement especially with the so-called context transfer stage; this stage involves the transfer of necessary state to the new access point as well as the enforcement of security goals such as user authentication and single point of access. We propose the incorporation of user capabilities, network-asserted proofs of user identity and access control, as a general mechanism to simplify the context transfer stage. To this end, we have designed CapAuth, a capability-based scheme that has reduced complexity, low overhead, high level of fault tolerance and is general enough to implement a range of security policies. ©2010 IEEE.-
dc.languageeng-
dc.relation.ispartofProceedings - IEEE INFOCOM-
dc.titleCapAuth: A capability-based handover scheme-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1109/INFCOM.2010.5462208-
dc.identifier.scopuseid_2-s2.0-77953311942-
dc.identifier.spagearticle no. 5462208-
dc.identifier.epagearticle no. 5462208-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats