The beacon at the time of the negotiation of the
Robust Security Network Information Element
(RSN IE) to notify the client 802.1x that wireless
infrastructure supports the negotiation of the
tokens signed.
The requests of (re)-association: the STA 802.11
must notify its choice of security policy by RSN
IE included in these requests.
The Access.Accept method to sign the token and
transfer it to the STA and the AP.
7 CONCLUSIONS AND
PERSPECTIVES
This text describes the impact of security on the
mobility and session continuity. We have identified
the limitations of the EAP protocol in combination
with the AAA Framework. This standard is used in
the access control to different network technologies.
Several stages of the Handover process can be
improved. In this paper, we proposed a fast
Handover scheme; taking into consideration only
delays in re-authentication during a transition in the
same VESS.
To do this, we identified our needs in terms of
security in relation to mobility. Thus we proposed to
implement security components at the APs, to
delegate the re-authentication service to APs in the
VESS infrastructure.
In our scheme, the AAA Framework is ignored
during the process of re-authentication. Therefore,
we use a signed token that ensures trust in the VESS
and manages mobility and continuity of the single
session of STA. This proposition can solve the
problem of intercellular delays (see Section II A).
In the next step, our main focus will be to resolve
all technical barriers, evaluate the pertinence of our
approach to meet the constraints of real-time
applications. Finally, we propose improvements to
the EAP protocol and we implement the new
methods for managing virtual organizations with our
signed tokens.
REFERENCES & STANDARDS
Bangolae, S., Bell, C. & Qi, E., 2006, ‘Performance study
of fast BSS transition using IEEE 802.11r’, IWCMC
'06 Proceedings of the 2006 international conference
on Wireless communications and mobile computing
pp. 737-742, 2006.
Da Conceicão, A. F., Li, J., Florêncioy, D. A., & Kon, F.,
2006, ‘Is IEEE 802.11 ready for VoIP?’, Department
of Computer Science, Institute of Mathematics and
Statistics, University of Sào Paulo, Communication
and Collaboration Systems, Microsoft Research.
Menezes, A. J., Van Oorschot, P. C., &Vanstone, S. A.,
2001, ‘Handbook of Applied Cryptography’, Chapter
11, CRC Press, Fifth Printing August 2001, freely
available at <http://cacr.uwaterloo.ca/hac/>.
Mishra, A., Shin, M. & Arbaugh, W., 2003, ‘An empirical
analysis of the IEEE 802.11 mac layer handoff
process’ SIGCOMM Comput. Commun. Rev., vol. 33,
no. 2, pp. 93–102, 2003.
Velayos, H., & Karlsson, G., 2004, ‘Techniques to reduce
the IEEE 802.11b handoff time’ Tech. Rep., 20-24
June 2004.
Zrelli, S. & Shinoda, Y., 2007, ‘Experimental evaluation
of EAP performance in roaming scenarios’, AINTEC
'07 Proceedings of the 3rd Asian conference on
Internet Engineering: Sustainable Internet, pp. 86-98,
2007.
AAA Authorization Framework, 2000, IETF RFC 2904,
August 2000, <http://tools.ietf.org/html/rfc2904>.
EAP, 2004, ‘Extensible Authentication Protocol’, IETF
RFC 3748, <http://tools.ietf.org/html/rfc3748>, Jun.
2004.
IAPP, 2003, IEEE std 802.11F-2003, ‘IEEE Trial-Use
Recommended Practice for Multi Vendor Access Point
Interoperability Via an Inter Access Point Protocol
(IAPP) Across Distribution Systems Supporting IEEE
802.11 Operation’.
IEEE 802.1X, 2001, IEEE Std 802.1X, ‘Standards for
Local and Metropolitan Area Networks: Port Based
Access Control’, June 14, 2001.
ISO 7498-2, 1989, ‘Information processing systems --
Open Systems Interconnection--Basic Reference
Model’ Part 2: Security Architecture.
RADIUS, 2000, ‘Remote Authentication Dial In User
Service’, IETF Std RADIUS RFC 2865, June 2000,
<http://tools.ietf.org/html/rfc2865>.
RFC 2548, 1999, IETF RFC 2548, March 1999,
‘Microsoft Vendor-Specific RADIUS Attributes’,
<https://tools.ietf.org/html/rfc2548>.
RFC 3078, 2001, IETF RFC 3078, March 2001,
‘Microsoft Point-To-Point Encryption (MPPE)
Protocol’, <http://www.ietf.org/rfc/rfc3078.txt>.
WLAN, 1997, IEEE std 802.11, ‘WIRELESS LOCAL
AREA NETWORKS’, The Working Group for
WLAN Standards, <http://www.ieee802.org/11/>.
WINSYS2013-InternationalConferenceonWirelessInformationNetworksandSystems
254