Special Issue: Computer Networks and Distributed Computing

• Articles • Previous Articles     Next Articles

Smart Proactive Caching Scheme for Fast Authenticated Handoff in Wireless LAN

Sin-Kyu Kim1, Jae-Woo Choi2, Dae-Hun Nyang2, Gene-Beck Hahn3, and Joo-Seok Song4   

  1. 1Electronics Telecommunications Research Institute, Daejeon, Korea 2Graduate School of Information Technology and Telecommunications, Inha University, Incheon, Korea 3Mobile Communication Technology Research Lab, LG Electronics, Anyang, Korea 4Department of Computer Science, Yonsei University, Seoul, Korea
  • Received:2005-12-02 Revised:2007-03-27 Online:2007-05-10 Published:2007-05-10

Handoff in IEEE 802.11 requires the repeated authentication and key exchange procedures, which will make the provision of seamless services in wireless LAN more difficult. To reduce the overhead, the proactive caching schemes have been proposed. However, they require too many control packets delivering the security context information to neighbor access points. Our contribution is made in two-fold: one is a significant decrease in the number of control packets for proactive caching and the other is a superior cache replacement algorithm.

Key words: connectivity; hypercube; interconnection network; routing algorithm;



[1] Amendment 6: Medium access control security enhancements. -IEEE Standard 802.11}, IEEE, July 2004.

[2] Port-based network access control. -IEEE Standard 802.1x-2001}, IEEE, June 2001.

[3] Recommended practice for multi-vendor access point interoperability via an IAPP across distribution systems supporting IEEE 802.11 operation. -IEEE Standard 802.11f}, IEEE, July 2003.

[4] Mishra A, Shin M, Arbaugh W A. Context caching using neighbor graphs for fast handoffs in a wireless network. In -\it Proc. IEEE Infocom 2004}, Hong Kong, Mar. 2004, Vol.1, pp.351$\sim$361.

[5] Sangheon Pack, Yanghee Choi. Fast inter-AP handoff using predictive-authentication scheme in a public wireless LAN. In -\it Proc. IEEE Networks 2002}, Atlanta, August 2002, pp.15$\sim$26.

[6] PPP EAP TLS authentication protocol. -\it RFC 2716}, IETF, October 1999.

[7] Mishra A, Shin M, Petroni N \it et al. \rm Proactive key distribution using neighbor graphs. -\it IEEE Wireless Communications}, Feb. 2004, 11(1): 26$\sim$36.

[8] Sangheon Pack, Yanghee Choi. Pre-authenticated fast handoff in a public wireless LAN based on IEEE 802.1x model. In -\it Proc. IFIP TC6 Personal Wireless Communications}, Singapore, October 2002, Vol. 234, pp.175$\sim$182.

[9] Arunesh Mishra, Minho Shin, William Arbaugh. An empirical analysis of the IEEE 802.11 MAC layer handoff process. -\it ACM Computer Communication Review}, Apr. 2003, 33(2): 93$\sim$102.
[1] Gui-Juan Wang, Cheng-Kuan Lin, Jian-Xi Fan, Jing-Ya Zhou, Bao-Lei Cheng. Fault-Tolerant Hamiltonicity and Hamiltonian Connectivity of BCube with Various Faulty Elements [J]. Journal of Computer Science and Technology, 2020, 35(5): 1064-1083.
[2] Wei-Bei Fan, Jian-Xi Fan, Cheng-Kuan Lin, Yan Wang, Yue-Juan Han, Ru-Chuan Wang. Optimally Embedding 3-Ary n-Cubes into Grids [J]. Journal of Computer Science and Technology, 2019, 34(2): 372-387.
[3] Xi Wang, Jian-Xi Fan, Cheng-Kuan Lin, Jing-Ya Zhou, Zhao Liu. BCDC: A High-Performance, Server-Centric Data Center Network [J]. , 2018, 33(2): 400-416.
[4] Dong-Fang Zhou, Jian-Xi Fan, Cheng-Kuan Lin, Bao-Lei Cheng, Jing-Ya Zhou, Zhao Liu. Optimal Path Embedding in the Exchanged Crossed Cube [J]. , 2017, 32(3): 618-629.
[5] Jin-Qi Zhu, Li Lu, Chun-Mei Ma. From Interest to Location: Neighbor-Based Friend Recommendation in Social Media [J]. , 2015, 30(6): 1188-1200.
[6] Wen-Tao Bao, Bin-Zhang Fu, Ming-Yu Chen, Li-Xin Zhang. A High-Performance and Cost-Effcient Interconnection Network for High-Density Servers [J]. , 2014, 29(2): 281-292.
[7] Jie-Yi Zhao (赵杰伊), Min Tang(唐敏), and Ruo-Feng Tong (童若锋), Member, CCF. Connectivity-Based Segmentation for GPU-Accelerated Mesh Decompression [J]. , 2012, 27(6): 1110-1118.
[8] Rong Yang (杨荣), Zhao-Lan Yang (杨兆兰), and He-Ping Zhang (张和平). Some Indices of Alphabet Overlap Graph [J]. , 2012, 27(4): 897-902.
[9] Hossein Ajorloo and Abolfazl Lakdashti. HBIR: Hypercube-Based Image Retrieval [J]. , 2012, 27(1): 147-162.
[10] Soon-Gyu Jeong and Sang-Jo Yoo. Distributed Coordinator Election Scheme for QoS Support and Seamless Connectivity in WPANs [J]. , 2009, 24(6): 1138-1148.
[11] Tiziana Calamoneri, Saverio Caminiti, and Rossella Petreschi. A General Approach to {\it\bfseries L$($h,k$)$}-Label Interconnection Networks [J]. , 2008, 23(4 ): 652-659 .
[12] You-Jian Zhao, Zu-Hui Yue, and Jian-Ping Wu. Research on Next-Generation Scalable Routers Implemented with H-Torus Topology [J]. , 2008, 23(4 ): 684-.
[13] Jaime Lloret, Miguel Garcia, Jesus Tomás, and Fernando Boronat. GBP-WAHSN: A Group-Based Protocol for Large Wireless Ad Hoc and Sensor Networks [J]. , 2008, 23(3): 461-480 .
[14] Shu-Ming Zhou and Wen-Jun Xiao. A New Family of Interconnection Networks of Fixed Degree Three [J]. , 2004, 19(2): 0-0.
[15] Gao-Cai Wang, Jian-Er Chen, and Guo-Jun Wang. On Fault Tolerance of 3-Dimensional Mesh Networks [J]. , 2004, 19(2): 0-0.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] Xiang Dong; Wei Daozheng;. GLOBAL: A Design for Random Testability Algorithm[J]. , 1994, 9(2): 182 -192 .
[2] Cao Cungen; Liu Wei;. A Three-Stage Knowledge Acquisition Method[J]. , 1995, 10(3): 274 -280 .
[3] Zhong Shaochun; Liu Dayou;. Processing of Uncertainty Temporal Relations[J]. , 1996, 11(1): 72 -82 .
[4] LIU Yunlong; CHEN Junliang;. Garbage Collection in Uncoordinated Checkpointing Algorithms[J]. , 1999, 14(3): 242 -249 .
[5] Zhi-Hua Zhou. Multi-Instance Learning from Supervised View[J]. , 2006, 21(5): 800 -809 .
[6] Jie Liang and Xue-Jia Lai. Improved Collision Attack on Hash Function MD5[J]. , 2007, 22(1): 79 -87 .
[7] Hao-Peng Lei, Xiao-Nan Luo, Shu-Jin Lin, and Jian-Qiang Sheng. Automatic 3D Shape Co-Segmentation Using Spectral Graph Method[J]. , 2013, 28(5): 919 -929 .
[8] Ke-Yan Cao, Guo-Ren Wang, Dong-Hong Han, Guo-Hui Ding, Ai-Xia Wang, and Ling-Xu Shi. Continuous Outlier Monitoring on Uncertain Data Streams[J]. , 2014, 29(3): 436 -448 .
[9] Ke Liu, Zhi-Yong Liu. Preface: Special Issue on Advances in Computer Science and Technology (Part 1) --- Current Advances in the Research of the NSFC Joint Research Fund for Overseas Chinese Scholars and Scholars in Hong Kong and Macao[J]. , 2014, 29(4): 547 -549 .
[10] Yun-Cen Huang, Jie-Qing Feng, Matthias NieBner, Yuan-Min Cui, Baoguang Yang . Feature-Adaptive Rendering of Loop Subdivision Surfaces on Modern GPUs[J]. , 2014, 29(6): 1014 -1025 .

ISSN 1000-9000(Print)

         1860-4749(Online)
CN 11-2296/TP

Home
Editorial Board
Author Guidelines
Subscription
Journal of Computer Science and Technology
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
Tel.:86-10-62610746
E-mail: jcst@ict.ac.cn
 
  Copyright ©2015 JCST, All Rights Reserved