Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Access Control in Wireless Local Area Networks: Fast Authentication Schemes

Access Control in Wireless Local Area Networks: Fast Authentication Schemes
View Sample PDF
Author(s): Jahan Hassan (The University of Sydney, Australia), Björn Landfeldt (The University of Sydney, Australia) and Albert Y. Zomaya (The University of Sydney, Australia)
Copyright: 2008
Pages: 13
Source title: Handbook of Research on Wireless Security
Source Author(s)/Editor(s): Yan Zhang (Simula Research Laboratory, Norway), Jun Zheng (City University of New York, USA) and Miao Ma (National Institute of Information & Communications Tech, Singapore)
DOI: 10.4018/978-1-59904-899-4.ch044


View Access Control in Wireless Local Area Networks: Fast Authentication Schemes on the publisher's website for pricing and purchasing information.


Wireless local area networks (WLAN) are rapidly becoming a core part of network access. Supporting user mobility, more specifically session continuation in changing network access points, is becoming an integral part of wireless network services. This is because of the popularity of emerging real-time streaming applications that can be commonly used when the user is mobile, such as voice-over-IP and Internet radio. However, mobility introduces a new set of problems in wireless environments because of handoffs between network access points (APs). The IEEE 802.11i security standard imposes an authentication delay long enough to hamper real-time applications. This chapter will provide a comprehensive study on fast authentication solutions found in the literature as well as the industry that address this problem. These proposals focus on solving the mentioned problem for intradomain handoff scenarios where the access points belong to the same administrative domain or provider. Interdomain roaming is also becoming common-place for wireless access. We need fast authentication solutions for these environments that are managed by independent administrative authorities. We detail such a solution that explores the use of local trust relationships to foster fast authentication.

Related Content

Regner Sabillon. © 2022. 18 pages.
Jeffrey S. Zanzig, Guillermo A. Francia III. © 2022. 20 pages.
Gregory B. White, Natalie Sjelin. © 2022. 17 pages.
Baris Cimen, Meltem Mutluturk, Esra Kocak, Bilgin Metin. © 2022. 21 pages.
Regner Sabillon. © 2022. 63 pages.
Gregory B. White, Natalie Sjelin. © 2022. 16 pages.
Aristides Dasso, Ana Funes. © 2022. 17 pages.
Body Bottom