Security Challenges in Seamless Mobility - How to ``Handover'' the Keys?
Katrin Hoeper, Lidong Chen, Antonio Izquierdo Manzanares, Nada T. Golmie
In this paper, we discuss key management challenges for seamless handovers across heterogeneous wireless networks. We focus on fast access authentication protocols that allow expedited network entry by utilizing existing keying material from previous access authentications. For a seamless handover, keys must be available at the target network at the time of the handover. This paper identifies the challenges of securely deriving and timely distributing such keys. We discuss solutions for intra and inter-technology handovers within the same network and between networks with roaming agreements. The presented solutions include different types of handover key hierarchies and key distribution protocols. In addition, we analyze the security performance trade-offs of the discussed solutions.
November 17-19, 2008
The Fourth International Wireless Internet Conference (WICON 2008)
, Chen, L.
, Izquierdo, A.
and Golmie, N.
Security Challenges in Seamless Mobility - How to ``Handover'' the Keys?, The Fourth International Wireless Internet Conference (WICON 2008), Maui, HI
(Accessed November 29, 2023)