Pro-active Key Distribution using Neighbor Graphs

dc.contributor.authorMishra, Aruneshen_US
dc.contributor.authorShin, Min-hoen_US
dc.contributor.authorArbaugh, William A.en_US
dc.date.accessioned2004-05-31T23:33:41Z
dc.date.available2004-05-31T23:33:41Z
dc.date.created2003-09en_US
dc.date.issued2003-11-25en_US
dc.description.abstractUser mobility in wireless data networks is increasing because of technological advances, and the desire for voice and multimedia applications. These applications, however, require handoffs between base stations (or access points) to be fast to maintain the quality of the connections. In this paper, we introduce a novel data structure, the Neighbor Graph, which dynamically captures the mobility topology of the network, and we show how neighbor graphs can be utilized to reduce the authentication time of an IEEE 802.11 hand-off from 1.1 seconds (full EAP/TLS) to 50 ms without loss of security. (UMIACS-TR-2003-106)en_US
dc.format.extent236519 bytes
dc.format.mimetypeapplication/postscript
dc.identifier.urihttp://hdl.handle.net/1903/1322
dc.language.isoen_US
dc.relation.isAvailableAtDigital Repository at the University of Marylanden_US
dc.relation.isAvailableAtUniversity of Maryland (College Park, Md.)en_US
dc.relation.isAvailableAtTech Reports in Computer Science and Engineeringen_US
dc.relation.isAvailableAtUMIACS Technical Reportsen_US
dc.relation.ispartofseriesUM Computer Science Department; CS-TR-4538en_US
dc.relation.ispartofseriesUMIACS; UMIACS-TR-2003-106en_US
dc.titlePro-active Key Distribution using Neighbor Graphsen_US
dc.typeTechnical Reporten_US

Files

Original bundle
Now showing 1 - 2 of 2
No Thumbnail Available
Name:
CS-TR-4538.ps
Size:
230.98 KB
Format:
Postscript Files
Loading...
Thumbnail Image
Name:
CS-TR-4538.pdf
Size:
119.12 KB
Format:
Adobe Portable Document Format
Description:
Auto-generated copy of CS-TR-4538.ps