In this paper we compare different authentication techniques that may be used in order to reduce the time and resources required to perform a handover, namely, re-authentication and pre-authentication. We provide a detailed analysis of each mechanism, and highlight key performance trade-offs for select scenarios and parameters of interest.
Proceedings Title: International Wireless Internet Conference (WICON 2008)
Conference Dates: November 17-19, 2008
Conference Location: Maui, HI
Pub Type: Conferences
authentication, EAP, handover, performance, pre-authentication, re-authentication