Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Security Challenges in Seamless Mobility - How to ``Handover'' the Keys?

Published

Author(s)

Katrin Hoeper, Lidong Chen, Antonio Izquierdo Manzanares, Nada T. Golmie

Abstract

In this paper, we discuss key management challenges for seamless handovers across heterogeneous wireless networks. We focus on fast access authentication protocols that allow expedited network entry by utilizing existing keying material from previous access authentications. For a seamless handover, keys must be available at the target network at the time of the handover. This paper identifies the challenges of securely deriving and timely distributing such keys. We discuss solutions for intra and inter-technology handovers within the same network and between networks with roaming agreements. The presented solutions include different types of handover key hierarchies and key distribution protocols. In addition, we analyze the security performance trade-offs of the discussed solutions.
Conference Dates
November 17-19, 2008
Conference Location
Maui, HI
Conference Title
The Fourth International Wireless Internet Conference (WICON 2008)

Keywords

wireless network, security, handovers, cryptographic keys

Citation

Hoeper, K. , Chen, L. , Izquierdo, A. and Golmie, N. (2008), Security Challenges in Seamless Mobility - How to ``Handover'' the Keys?, The Fourth International Wireless Internet Conference (WICON 2008), Maui, HI (Accessed June 25, 2024)

Issues

If you have any questions about this publication or are having problems accessing it, please contact reflib@nist.gov.

Created November 30, 2008, Updated February 19, 2017