{"id":"https://openalex.org/W2154136718","doi":"https://doi.org/10.1145/1454586.1454592","title":"Fast, secure handovers in 802.11","display_name":"Fast, secure handovers in 802.11","publication_year":2008,"publication_date":"2008-10-27","ids":{"openalex":"https://openalex.org/W2154136718","doi":"https://doi.org/10.1145/1454586.1454592","mag":"2154136718"},"language":"en","primary_location":{"id":"doi:10.1145/1454586.1454592","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1454586.1454592","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063058508","display_name":"Rodolphe Marques","orcid":null},"institutions":[{"id":"https://openalex.org/I60858718","display_name":"University of Aveiro","ror":"https://ror.org/00nt41z93","country_code":"PT","type":"education","lineage":["https://openalex.org/I60858718"]}],"countries":["PT"],"is_corresponding":true,"raw_author_name":"Rodolphe Marques","raw_affiliation_strings":["IEETA/University of Aveiro, Aveiro, Portugal"],"affiliations":[{"raw_affiliation_string":"IEETA/University of Aveiro, Aveiro, Portugal","institution_ids":["https://openalex.org/I60858718"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031097493","display_name":"Andr\u00e9 Z\u00faquete","orcid":"https://orcid.org/0000-0002-9745-4361"},"institutions":[{"id":"https://openalex.org/I60858718","display_name":"University of Aveiro","ror":"https://ror.org/00nt41z93","country_code":"PT","type":"education","lineage":["https://openalex.org/I60858718"]}],"countries":["PT"],"is_corresponding":false,"raw_author_name":"Andr\u00e9 Z\u00faquete","raw_affiliation_strings":["IT/IEETA/University of Aveiro, Aveiro, Portugal"],"affiliations":[{"raw_affiliation_string":"IT/IEETA/University of Aveiro, Aveiro, Portugal","institution_ids":["https://openalex.org/I60858718"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5063058508"],"corresponding_institution_ids":["https://openalex.org/I60858718"],"apc_list":null,"apc_paid":null,"fwci":1.3318,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.8267393,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"27","last_page":"34"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.9894999861717224,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/roaming","display_name":"Roaming","score":0.8903287053108215},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7958470582962036},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7290317416191101},{"id":"https://openalex.org/keywords/handover","display_name":"Handover","score":0.6722001433372498},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.6367288827896118},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5801074504852295},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5533878803253174},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5473976731300354},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.43376433849334717},{"id":"https://openalex.org/keywords/ieee-802.1x","display_name":"IEEE 802.1X","score":0.41241714358329773},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40036648511886597},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.22698837518692017},{"id":"https://openalex.org/keywords/ieee-802.11","display_name":"IEEE 802.11","score":0.19038408994674683},{"id":"https://openalex.org/keywords/wireless-lan","display_name":"Wireless lan","score":0.14772534370422363},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09913823008537292},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09625351428985596},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.08899980783462524}],"concepts":[{"id":"https://openalex.org/C194498986","wikidata":"https://www.wikidata.org/wiki/Q680016","display_name":"Roaming","level":2,"score":0.8903287053108215},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7958470582962036},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7290317416191101},{"id":"https://openalex.org/C111852164","wikidata":"https://www.wikidata.org/wiki/Q1414679","display_name":"Handover","level":2,"score":0.6722001433372498},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.6367288827896118},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5801074504852295},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5533878803253174},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5473976731300354},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.43376433849334717},{"id":"https://openalex.org/C28722885","wikidata":"https://www.wikidata.org/wiki/Q1428844","display_name":"IEEE 802.1X","level":5,"score":0.41241714358329773},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40036648511886597},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.22698837518692017},{"id":"https://openalex.org/C185298936","wikidata":"https://www.wikidata.org/wiki/Q193228","display_name":"IEEE 802.11","level":4,"score":0.19038408994674683},{"id":"https://openalex.org/C2985434377","wikidata":"https://www.wikidata.org/wiki/Q212607","display_name":"Wireless lan","level":3,"score":0.14772534370422363},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09913823008537292},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09625351428985596},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.08899980783462524},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1454586.1454592","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1454586.1454592","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44999998807907104,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"},{"score":0.4000000059604645,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W17933574","https://openalex.org/W79339258","https://openalex.org/W610187338","https://openalex.org/W2002327788","https://openalex.org/W2096050738","https://openalex.org/W2109706816","https://openalex.org/W2121670402","https://openalex.org/W2123461227","https://openalex.org/W2131665531","https://openalex.org/W2132147947","https://openalex.org/W2138584883","https://openalex.org/W2138849175","https://openalex.org/W2142614777","https://openalex.org/W2148006270","https://openalex.org/W2150855956","https://openalex.org/W2235027254","https://openalex.org/W2237140505","https://openalex.org/W2238416618","https://openalex.org/W2241519935","https://openalex.org/W2288885870","https://openalex.org/W6677936465"],"related_works":["https://openalex.org/W2538615287","https://openalex.org/W3150869463","https://openalex.org/W2099275250","https://openalex.org/W2149879515","https://openalex.org/W2244007585","https://openalex.org/W1970027746","https://openalex.org/W2281332095","https://openalex.org/W2351645295","https://openalex.org/W2113742215","https://openalex.org/W2058385658"],"abstract_inverted_index":{"This":[0],"article":[1],"presents":[2],"a":[3,21,57,71,98],"fast,":[4,153],"secure":[5,154],"handover":[6,120],"protocol":[7,12,24,33,140],"for":[8,103,152],"802.11":[9,37,50],"networks.":[10],"The":[11,31,112],"keeps":[13],"the":[14,35,67,95,108],"security":[15],"functionalities":[16],"of":[17,70,110,114],"802.1X":[18,62,73,130],"but":[19],"uses":[20],"new":[22,49,90],"reauthentication":[23,32,109],"that":[25,83,117],"promotes":[26],"fast":[27,131],"handovers":[28],"during":[29],"reassociations.":[30],"recovers":[34],"original":[36],"paradigm:":[38],"authenticate":[39],"first,":[40],"reassociate":[41],"next.":[42],"Following":[43],"this":[44],"paradigm,":[45],"we":[46],"conceived":[47],"two":[48],"authentication":[51],"and":[52,145],"reassociation":[53,76],"protocols,":[54],"which":[55],"allow":[56],"mobile":[58],"station":[59],"to":[60,119,125],"perform":[61],"reauthentications":[63],"before":[64],"reassociations":[65],"with":[66],"same":[68],"functionality":[69],"complete":[72],"authentication.":[74],"Furthermore,":[75],"protocols":[77],"are":[78,84],"authenticated,":[79],"preventing":[80],"denial-or-service":[81],"scenarios":[82],"not":[85],"handled":[86],"by":[87,148],"802.11i.":[88],"Our":[89],"approach":[91],"requires":[92],"little":[93],"from":[94],"environment,":[96],"namely":[97],"new,":[99],"central":[100],"Reauthentication":[101],"Service,":[102],"storing":[104],"data":[105],"used":[106],"in":[107,156],"stations.":[111],"time":[113],"security-related":[115],"tasks":[116],"contribute":[118],"delays":[121],"was":[122],"dramatically":[123],"reduced":[124],"1.5":[126],"ms,":[127],"while":[128],"an":[129],"resume":[132],"takes":[133],"more":[134],"than":[135],"150":[136],"ms.":[137],"Finally,":[138],"our":[139],"addresses":[141],"most":[142],"design":[143],"goals":[144],"problems":[146],"stated":[147],"standards'":[149],"working":[150],"groups":[151],"roaming":[155],"802.11.":[157]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
