Publication detail

Security issues of roaming in wireless networks

KADLEC, J. KUCHTA, R. VRBA, R.

Original Title

Security issues of roaming in wireless networks

English Title

Security issues of roaming in wireless networks

Type

conference paper

Language

en

Original Abstract

This paper is focused on the secure roaming problematic in wireless automation applications. Description of a roaming procedure and security issues is presented along with the newest techniques for fast roaming according to prepared network roaming standard IEEE802.11r and security trends defined in IEEE802.11i. Methods for minimizing handoff delay for wireless automation applications and requirements on the sufficient security level are also presented in this paper.

English abstract

This paper is focused on the secure roaming problematic in wireless automation applications. Description of a roaming procedure and security issues is presented along with the newest techniques for fast roaming according to prepared network roaming standard IEEE802.11r and security trends defined in IEEE802.11i. Methods for minimizing handoff delay for wireless automation applications and requirements on the sufficient security level are also presented in this paper.

Keywords

Wireless networks, roaming, handoff, security

RIV year

2007

Released

01.09.2007

Publisher

Springer

Location

Praha

ISBN

978-0-387-74158-1

Book

Personal Wireless Communication

Edition number

1

Pages from

349

Pages to

354

Pages count

6

BibTex


@inproceedings{BUT27864,
  author="Jaroslav {Kadlec} and Radek {Kuchta} and Radimír {Vrba}",
  title="Security issues of roaming in wireless networks",
  annote="This paper is focused on the secure roaming problematic in wireless automation applications. Description of a roaming procedure and security issues is presented along with the newest techniques for fast roaming according to prepared network roaming standard IEEE802.11r and security trends defined in IEEE802.11i. Methods for minimizing handoff delay for wireless automation applications and requirements on the sufficient security level are also presented in this paper.",
  address="Springer",
  booktitle="Personal Wireless Communication",
  chapter="27864",
  institution="Springer",
  year="2007",
  month="september",
  pages="349--354",
  publisher="Springer",
  type="conference paper"
}