An empirical analysis of the IEEE 802.11 MAC layer handoff process

A Mishra, M Shin, W Arbaugh - ACM SIGCOMM Computer …, 2003 - dl.acm.org
IEEE 802.11 based wireless networks have seen rapid growth and deployment in the recent
years. Critical to the 802.11 MAC operation, is the handoff function which occurs when a …

SyncScan: practical fast handoff for 802.11 infrastructure networks

I Ramani, S Savage - … IEEE 24th Annual Joint Conference of …, 2005 - ieeexplore.ieee.org
Wireless access networks scale by replicating base stations geographically and then
allowing mobile clients to seamlessly" hand off" from one station to the next as they traverse …

Reducing MAC layer handoff latency in IEEE 802.11 wireless LANs

S Shin, AG Forte, AS Rawat… - Proceedings of the second …, 2004 - dl.acm.org
With the growth of IEEE 802.11-based wireless LANs, VoIP and similar applications are now
commonly used over wireless networks. Mobile station performs a handoff whenever it …

Context caching using neighbor graphs for fast handoffs in a wireless network

A Mishra, M Shin, WA Arbaush - IEEE INFOCOM 2004, 2004 - ieeexplore.ieee.org
User mobility in wireless data networks is increasing because of technological advances,
and the desire for voice and multimedia applications. These applications, however, require …

Proactive key distribution using neighbor graphs

A Mishra, MH Shin, NL Petroni… - IEEE Wireless …, 2004 - ieeexplore.ieee.org
User mobility in wireless data networks is increasing because of technological advances,
and the desire for voice and multimedia applications. These applications, however, require …

Location-based fast handoff for 802.11 networks

CC Tseng, KH Chi, MD Hsieh… - IEEE Communications …, 2005 - ieeexplore.ieee.org
This paper presents a location-based approach that reduces handoff overhead in IEEE
802.11 networks. With this approach, a mobile station (MS) can derive the prospective …

[PDF][PDF] Selective channel scanning for fast handoff in wireless LAN using neighbor graph

HS Kim, SH Park, CS Park, JW Kim, SJ Ko - ITC-CSCC, 2004 - researchgate.net
Handoff at the link layer 2 (L2) consists of three phases including scanning, authentication,
and reassociation. Among the three phases, scanning is dominant in terms of time delay …

Security vulnerabilities in handover authentication mechanism of 5G network

S Gupta, BL Parne… - 2018 First International …, 2018 - ieeexplore.ieee.org
The main objective of the Third Generation Partnership Project (3GPP) is to fulfill the
increasing security demands of IoT-based applications with the evolution of Fifth Generation …

[图书][B] Security of mobile communications

N Boudriga - 2009 - taylorfrancis.com
The explosive demand for mobile communications is driving the development of wireless
technology at an unprecedented pace. Unfortunately, this exceptional growth is also giving …

Secure session keys context

D Forsberg - US Patent 8,027,304, 2011 - Google Patents
Handoffs must be fast for wireless mobile nodes without sacrificing the security between a
mobile node and wireless access points in an access network. A secure session keys …